
Search results for 'Education' - Page: 3
| RadioNZ - 4 Sep (RadioNZ) Principals and teachers have repeatedly told RNZ there have been noticeably fewer Maori words and Treaty references. Read...Newslink ©2025 to RadioNZ |  |
|  | | RadioNZ - 4 Sep (RadioNZ) Two historians who teach thousands of children about the New Zealand Wars, Gallipoli and Vietnam are losing their jobs at the nation`s war memorial education centre. Read...Newslink ©2025 to RadioNZ |  |
|  | | PC World - 2 Sep (PC World)Windows 11 version 25H2 will be officially available in Fall 2025 and marks the next major feature update for Microsoft’s current operating system. The new features are already available for Insiders and can be tested in the current Windows 11 25H2 Insider Preview. Despite being categorized as an “enablement update”, the scope of the changes is considerable. The basic architecture remains identical to version 24H2, which means there are no new hardware requirements.
If you don’t already have Windows 11, or just need a new license, you can grab it for 50 percent off on the PCWorld Software store right now.
For all systems that are already running on 24H2, the upgrade requires minimal effort. A small enablement package activates the new functions without the need for a complete reinstallation or in-place upgrade.
This procedure not only saves time, but also significantly reduces downtime, both in private households and in corporate environments. For Home and Pro editions, support is extended with the release by a further 24 months until 2027, for Enterprise and Education versions it’s even extended by 36 months until 2028. Devices with older versions such as 23H2 or Windows 10, on the other hand, must go through the classic, more extensive upgrade process.
Windows Latest
Thanks to the “Shared Servicing Branch”, many new features are already distributed in 24H2, but are deactivated until the Enablement Package activates them. Users benefit from around 40 percent smaller update packages thanks to the combination of servicing stack updates and other cumulative updates, which further shortens the installation time.
New start menu with extended control options
The revised start menu is one of the most visible changes in 25H2. It shows the pinned apps at the top, a section with recommended content such as recently used documents or programs in the middle and the complete app list below. The latter can be displayed in three modes, as a category view, as a compact grid, or as a classic list. Users can control the scope dynamically using buttons such as “Show all” or “Show less”.
New personalization settings allow more pinned apps to be displayed by default or recommendations to be hidden completely. Frequently used and recently installed apps can also be displayed or hidden as desired. Companies benefit from the largely retained basic structure, as adjustments to documentation and training material are minimal.
Restrictions still exist. Categories cannot yet be renamed or created, drag & drop currently only works from “All” to “Pinned”, and touch navigation currently lacks support for swipe up gestures. The start menu is supplemented by the option to display system folders such as “Settings” or “Explorer” as fixed icons in the bottom bar, which enables quick access to frequently used functions.
Direct integration of smartphones via Phone Link
With the new start menu integration of “Phone Link”, the connection between PC and smartphone takes center stage even more. Users can exchange files between PC and mobile devices via drag & drop, send images from Explorer directly “to my phone” or retrieve messages and content from the Start menu. The setup requires a Microsoft account for the app, but not for the Windows login.
In private households, this simplifies the management of media and documents; in companies, it enables uncomplicated connection of service devices. Content can be synchronized via local networks or even mobile data connections. The implementation is considered to be more stable than in previous pre-release versions, in which Phone Link was often prone to errors.
Windows
Customizable widgets on the lock screen
The lock screen display can be expanded with widgets, including weather, stock market prices, countdown counters or customized information sources. These elements can be customized to keep important data directly in view without unlocking the desktop. A new feature is the “Discover widgets” function, which displays suggestions for other available widgets and simplifies the selection process.
For companies, this can be a way of providing employees with status information or appointments, while private users can keep an eye on birthdays or deadlines, for example. Currently, changes only take effect after a restart, which is likely to be optimized in the final version.
Optimized energy management and performance diagnostics
A new mechanism for throttling the CPU during idle phases reduces power consumption and extends battery life, which particularly affects mobile work devices and notebooks. In addition, Windows automatically records diagnostic data when the system reacts slowly. These logs can be sent to Microsoft via the feedback hub in order to identify the causes of performance problems more quickly. For the user, these are stored locally in the system under “%systemRoot%\Temp\DiagOutputDir\Whesvc” and are only transmitted when feedback is active.
Extensions in the file explorer and in the search
The File Explorer displays person icons in the “Recommended” area under the “Activity” column to make it easier to recognise who has recently worked on a file, but only when using a business or school account. In the search options, the direct link to the Bing search history has been removed; instead, access is centralised via the data protection dashboard. This change reduces redundant menu items and bundles data protection controls in one place.
Higher quality system drivers through CodeQL analysis
Higher quality standards will apply to driver signing in the future. Every kernel-mode driver (except graphics drivers) must pass a CodeQL scan before WHCP certification. This analysis uncovers potential errors or security gaps at an early stage and forces manufacturers to rectify them before the driver is released for Windows. This means more stable systems for OEM manufacturers and companies and a lower crash and incompatibility rate for private users.
AI-supported functions and Copilot optimizations
New functions are activated on devices with NPU, the so-called Copilot PCs. These include image descriptions for screen readers, live subtitles with translation options (currently still with crash problems), and intelligent text actions in “Click to Do”. The latter enables context-dependent processing of text content, such as recognizing and automatically processing certain entries. In addition, the search field in the top bar of “Click to Do” has been removed to simplify the interface.
Users report long waiting times when using the app for the first time after model or build updates, which must be taken into account in corporate environments during rollouts. A new addition is the option to enter your own words in the Windows dictionary, which offers clear benefits for both private writers and companies with industry-specific vocabulary.
Quick Machine Recovery and gamepad control of the on-screen keyboard
With version 25H2, Windows 11 will receive an extended self-repair function, which will be introduced under the name “Quick Machine Recovery”. It builds on the Windows Recovery Environment, but extends it with the ability to automatically obtain updates or repair scripts from the Internet to resolve boot problems. If the system recognizes repeated boot errors, it automatically switches to the recovery environment, establishes a network connection and searches for suitable corrections via Windows Update.
Administrators can specify whether this process should take place completely without user intervention. Activation is possible both locally, for example via configuration using Reagentc and XML files, and centrally via Intune policies. Parameters for waiting time, restart intervals and even WLAN login data can be predefined so that devices without a LAN connection can also be integrated.
In Home editions, cloud-supported repair will be active by default in the future; in Pro and Enterprise environments, it must be specifically enabled. After a successful repair, Windows restarts automatically; if the repair is unsuccessful, the cycle is repeated according to the defined specifications. Thanks to this automation, Quick Machine Recovery reduces the administration effort and significantly shortens downtimes in both company networks and private installations.
Thomas Joos
New data protection dialogues and administrator protection
25H2 comes with revised data protection dialogues that offer more transparency when applications access data and system functions. An additional protection mechanism has been introduced for administrators, which makes unauthorized changes to the system more difficult and provides greater protection for security-critical actions. This gives companies an additional layer of security without having to resort to third-party solutions.
Thomas Joos
Further functional improvements and known problems
Taskbar scaling adapts better to different display sizes and DPI settings. Context menus in Explorer have been optimized, new sharing options have been added, and Voice Access has been further developed. Support for Chinese and Japanese has been expanded, and in the settings under “Privacy and security” you can now see which applications are accessing Windows generative AI models. In current builds, this display is already visible in the user interface, but the full functionality will only be activated in a later update. Further adjustments relate to the toolbox, which has been improved in terms of its operation and integration.
Microsoft has also fixed several bugs, such as truncated content in the notification center when the clock display is activated or a problem with dbgcore.dll, which could cause explorer.exe and other applications to crash. Known problems still exist, however: the Xbox controller can trigger a bug check on some systems when connected via Bluetooth.
The Microsoft Changjie input method currently works incorrectly, which can be avoided by resetting to the previous IME version. In addition, Windows 11 25H2 supports touch keyboard control with a gamepad for the first time. This function, originally planned for 24H2, allows the on-screen keyboard to be operated without a mouse or touchscreen, which can be relevant in special application scenarios, such as on console-based workstations or for accessibility adaptations.
Update strategy, insider options and rollback
Microsoft emphasizes stability in 25H2. Many functions are already included in 24H2 and are only activated with the Enablement Package. For private users, this means a smooth upgrade without long installation times; for companies, it means the option to test only the new functions instead of recertifying the entire system environment. The update follows the shared servicing branch approach, which has also been used for previous upgrades, for example from 22H2 to 23H2.
Mark Hachman
After the official release, Microsoft offers a time window to leave the Windows Insider program and receive regular updates again. It’s also possible to completely reset 25H2 to 24H2 by uninstalling the Enablement Package without reinstalling the operating system; all 25H2 functions will then be deactivated immediately. Read...Newslink ©2025 to PC World |  |
|  | | Stuff.co.nz - 2 Sep (Stuff.co.nz) Government cash coming to create walls in open-plan classrooms Read...Newslink ©2025 to Stuff.co.nz |  |
|  | | BBCWorld - 31 Aug (BBCWorld)Latvia`s Jelena Ostapenko says `English is not my first language` after telling American opponent Taylor Townsend she has `no education`. Read...Newslink ©2025 to BBCWorld |  |
|  | | BBCWorld - 29 Aug (BBCWorld)Naomi Osaka says Jelena Ostapenko`s comments to Taylor Townsend about her having `no class` and `no education` was `one of the worst things you could say to a black tennis player`. Read...Newslink ©2025 to BBCWorld |  |
|  | | Stuff.co.nz - 29 Aug (Stuff.co.nz) Healthcare and education workers gathered at Wellington’s High Court, alleging the Government is breaching human rights with its pay equity change. Read...Newslink ©2025 to Stuff.co.nz |  |
|  | | Stuff.co.nz - 29 Aug (Stuff.co.nz) Taylor Townsend is being applauded for her composed response to Jelena Ostapenko’s heated remarks during their US Open match. Read...Newslink ©2025 to Stuff.co.nz |  |
|  | | PC World - 29 Aug (PC World)Mobile devices sometimes get lost. A laptop bag gets left on the bus or train, a smartphone slips out of your pocket, or a USB flash drive falls to the ground unnoticed. Losing a notebook or phone this way means a serious financial hit. In many cases, however, the loss of data is even more serious.
Important and confidential documents, such as tax documents, are often stored on laptops. In some cases, even sensitive company papers may even be stored there. And a smartphone stores doesn’t just hold emails, but also contact lists and WhatsApp chats.
Although access to a laptop is password-protected, the files are freely accessible. If the device is booted via a live system, they can be easily read and copied.
USB drives usually only need to be connected to a computer to reveal their contents. With smartphones, on the other hand, the file system is always securely encrypted.
However, if the device has just been used, the screen lock may not yet be reactivated and the finder can read the stored data and send it by email or chat program.
The loss of a device gets especially tricky when the device is deliberately stolen. This usually happens because the thief is after confidential company documents or credit card data. This is why important documents should always be encrypted.
Encryption options
When encrypting the SSD of a laptop or an external hard drive, you have the choice between two methods:
Full Disk Encryption (FDE)
File Level Encryption (FLE)
With Full Disk Encryption, the software encrypts the entire data carrier, including the operating system. The scope of delivery of Windows Pro and Education also includes FDE encryption with BitLocker.
You can find the function in the category view of the Control Panel under “System and Security > BitLocker Drive Encryption.” Once you activate it, every user must enter the defined BitLocker password when starting up the computer.
After encryption, it’s no longer possible to access the files on the SSD without this password. BitLocker encryption utilizes the functions of the computer’s TPM chip and is considered to be very secure.
However, full disk encryption has a limitation: data is only protected when the laptop is powered off or you’re not logged into Windows.
As soon as you have unlocked the SSD by entering the password, hackers can access the stored files via the network or the internet. The same applies if a criminal gets hold of a switched-on device.
Notebooks: Encrypt with EFS
The alternative to FDE is File Level Encryption (FLE). It only encrypts selected files and folders. The advantage of FLE is that it’s continuously active. In order to access the data, a password usually needs to be entered.
Windows FLE is an exception to this rule. Microsoft calls its file encryption EFS (aka Encrypting File System) and it’s integrated directly into the NTFS file system.
You can enable it by right-clicking on a file or folder, selecting “Properties,” clicking the “Advanced” button under the “Attributes” section, checking “Encrypt contents to secure data,” and confirming with “OK.”
However, Microsoft decrypts this data as soon as you log in with your user account. The problems here are the same as with Full Disk Encryption. In addition, decryption is linked to the password of your user account; if you forget it or if the user account is deleted, access to the data is lost.
Encrypt entire drives with VeraCrypt
Encryption with the EFS is simple and effective, but it has the disadvantage of file names remaining visible, allowing others to infer their contents. To avoid this, you can use the open source software VeraCrypt free of charge.
The program works slightly differently to the functions presented so far. On the one hand, it can encrypt entire drives, but it also offers to create an encrypted container in the form of a mounted drive, into which you copy or move the files and folders you want to be encrypted.
Other users will then only see the name of the container, but not its contents. VeraCrypt container encryption is primarily suitable for notebook SSDs.
VeraCrypt can encrypt entire drives, but can also create an encrypted container in the form of a virtual drive. Files and folders can be securely stored in this container.IDG
Open VeraCrypt, select “Create volume.” This starts a wizard. In the first window, select “Create encrypted container file.” Click “Next” and select “Standard VeraCrypt volume.” Click “Next > File” and enter the path and file name for the container. Confirm with “Save.”
“Next” takes you to the encryption settings. Click “Next” and enter the size of the container that VeraCrypt should create.
At this point, the program shows you how much space is still available on the selected drive. Decide on a suitable size and click on “Next.” VeraCrypt will now ask you for a password.
Type in a long and complex combination of letters, numbers, and characters and click “Next.” You can skip the “Large files” window by clicking “Next.”
In the “Volume format” window, select “NTFS” as the file system. Move the mouse pointer back and forth for at least 30 seconds until the color of the progress bar has changed from red to yellow to green.
Click on “Format” to create the container file. As soon as the process is complete, the wizard window should close.
By moving the mouse, you create a random value for the encryption. The longer you move the mouse back and forth, the better.
IDG
The VeraCrypt start window now opens again next to the wizard.
Select a drive letter, under which the container file should be accessible. Next, click “File” and navigate to the file on your desktop. Click “Mount,” enter the password for the container, and confirm with “OK.”
The container now appears under the selected drive letter in the Explorer. Everything you copy into it is automatically encrypted.
Secure folder for smartphones
The data storage on smartphones and tablets is already securely encrypted with a function of the operating system out of the box. However, this offers limited protection if the device is lost or stolen and the screen lock hasn’t yet reactivated.
Since Android 8, the system has included a vault feature for storing confidential data. This vault is called “Secure Folder” and is part of the Google Files file manager, which is already installed on many smartphones and tablets.
If you the app isn’t available on your device, you can install it via the PlayStore.
The Google Files file manager app includes a function for creating a secure, encrypted folder for confidential data.
IDG
In Google Files, go to “Collections > Secure folder.” Set a PIN or pattern for access, both of which should be different from the one you use to log in to your device.
To move files into the folder, press and hold your finger on the file, then tap the three dots and select “Move to secure folder.”
To retrieve a file, open “Collections > Secure folder” in Google Files, enter the PIN or pattern, tap the file, and select “More > Remove from secure folder.”
Note: If you forget the PIN or pattern, there is no way to open the vault.
External SSDs: Encrypt with BitLocker To Go
VeraCrypt is particularly suitable for permanent installation on the SSD of a laptop. For external discs, it’s best to use BitLocker To Go, which is included in the Home version of Windows.
Type BitLocker into the search field in the taskbar and click “Manage BitLocker.” This opens a Control Panel window in which the drive letter of the USB stick will appear under “Removable drives > BitLocker to Go” with the status “BitLocker disabled.”
Click the link, go to “Turn on BitLocker” and tick the box “Use password to unlock the drive.” Enter a password and click “Save to file” to save the recovery key in a TXT file on your desktop PC’s SSD.
Depending on whether the stick already contains data or not, select “Encrypt only used storage space” or “Encrypt entire drive.”
To use the stick on other Windows computers, select “Compatible mode” in the following window and click “Start encryption” in the last window. If you connect the stick to a computer, Windows will prompt you to enter the password each time.
USB sticks: Encrypt with 7-Zip
Finally, the freeware packing program 7-Zip (free) is ideal for quickly encrypting files and folders on a USB stick. You can use this tool to encrypt ZIP files with the AES-256 algorithm, protecting them with a password. Then all you need to do is enter the password to open and unzip the file.
You can also securely encrypt ZIP files with the 7-Zip packing program. Make sure that AES-256 is set as the encryption method.IDG
This is how you proceed: Select the files in Windows Explorer, right-click, and go to “Show more options > 7-Zip > Add to an archive.” Give the archive file a name, but keep the extension as “zip.”
Select a secure and complex password in the “Encryption” section at the bottom right, repeat it one line below, and–this is important–set the “Method” option to “AES-256.”
Finally, confirm the encryption with “OK.” After double-clicking on the ZIP file, the Explorer will now display the contents, but an error message will pop up when you try to extract the files.
The contents can only be read if you open the ZIP file with 7-Zip and enter the password.
As soon as the container has been created, mount it as a separate drive in the file system via the VeraCrypt start window.IDG
Hardware-based encryption
Encryption and decryption are handled by the CPU during read and write operations. There is also hardware-based encryption, which is mainly used today for external USB hard drives
These devices have their own AES encryption chip, which is positioned between the system BIOS and the operating system.
This chip handles all encryption and decryption processes on the drive during data access, meaning the entire storage device remains continuously encrypted.
Access is only possible after entering a password, which is stored on the external hard drive.
Hard drives with built-in hardware encryption are typically available as external USB drives with an AES chip.IDG Read...Newslink ©2025 to PC World |  |
|  | | BBCWorld - 28 Aug (BBCWorld)Taylor Townsend says Jelena Ostapenko told her she has `no class` and `no education` after the American beat her in the US Open second round. Read...Newslink ©2025 to BBCWorld |  |
|  |  |
|
 |
 | Top Stories |

RUGBY
Kyle Preston is happy to wait for his next opportunity to wear an All Blacks jersey More...
|

BUSINESS
A belief the economic savings from Transmission Gully come from people taking quicker, more efficient trips More...
|

|

 | Today's News |

 | News Search |
|
 |