
Best apps that use the NPU on a Snapdragon Windows laptop
Thankfully, there are a bunch of apps that utilise the NPU in your Snapdragon Windows laptop. No matter which Snapdragon X series laptop you buy, all of them have the same NPU capable of 45 TOPS. This means, whether you get an entry-level model or the highest end one, AI performance should stay consistent throughout. This is all mainly thanks to Microsoft's guidelines for what qualifies as a Copilot+ PC, as it requires an NPU of a minimum of 40 TOPS performance.
28% OFF 41% OFF 33% OFF 14% OFF 55% OFF
Blender was one of the first apps to natively work on Qualcomm Windows laptops, and is one of the best for animators and graphic designers. You can download the native Arm version of Blender from the website, which is available as an installer as well as portable ZIP file. There's a free NPU-powered plugin that's been created that runs on the chip's dedicated neural processor. With it, you can simulate rendering using the NPU at faster speeds, and use the text-to-image AI to enhance your 3D object in a high-res 2D image in a much quicker time.
Not sure which
laptop to buy? • Moises
If you're into music production then you've no donut heard of Moises. Widely known for its great music separation features using AI, you can isolate various stems of the song like the drums, guitar, vocals, etc., in order to create your own custom track. It's a very handy tool for anyone learning to play an instrument, for when they need to play along to their favourite song. In November 2024, Moises announced that their app now uses the Snapdragon's NPU on Windows to help with instrument and vocal isolation, making the process quicker and at real-time speeds. According to a release from Moises, the AI workloads on the app were 35 percent faster when using the NPU, thereby providing a more seamless experience. • Affinity Photo 2
The entire Affinity suite has been optimized for Windows on Snapdragon,and there are certain tools in Affinity Photo 2 that are optimised to run on the NPU. Features like Object Selection and Subject Selection now get the NPU boost, allowing you to quickly select objects and adjust various parameters like colour and tint at rapid speeds. • Capture One
Capture One is a highly popular photo editing tool used by many professional photographers, which is now optimised to take advantage of the NPU in Snapdragon laptops. Certain features are said to use the NPU like AI cropping, which manages to apply a consistent crop to a batch of photos so that all subjects have the same amount of head room. There's also AI-assisted colour-grading which instantly applies styles of a reference image to a batch of photos. • DAWs like Reaper and Cubase
A Digital Audio Workstation or DAW is the most essential tool when recording music in a studio or home. It essentially allows you to create a recording by mixing MIDI inputs, vocals, and backing tracks into a final audio track. The cool thing is that many popular DAWs now have native support for Snapdragon Windows PCs, and don't have to rely on emulation. This is mainly thanks to Microsoft for releasing a dedicated MIDI stack and low-latency ASIO audio drivers in collaboration with Yamaha.
First Published Date: 30 Apr, 16:27 IST

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Time of India
3 hours ago
- Time of India
US lawmakers raise 'China-Russia Alert'; send letter to Google, Facebook, Microsoft and Amazon: Tell us by August 8 ...
Three prominent Republican House lawmakers have reportedly raised national security concerns about the network of more than 400 subsea cables that handle 99% of international internet traffic and about threats from China and Russia. According to a report by Reuters, these lawmakers have pressed the CEOs of Alphabet, Meta, and Microsoft on the security of critical submarine communications cables, citing escalating national security concerns. The move comes as Washington raises alarms about potential threats from China and Russia to the vast network of over 400 subsea cables that carry an estimated 99% of global internet traffic. What the letter from Republican lawmakers to Google, Facebook, Microsoft and Amazon says In a letter sent Monday (July 21), Representatives John Moolenaar (Chair of the House panel on China), Carlos Gimenez (Chair of a relevant subcommittee), and Keith Self (Chair of another relevant subcommittee) voiced particular apprehension regarding the continued involvement of "China-affiliated entities such as SBSS, Huawei Marine, China Telecom, and China Unicom" in the maintenance and servicing of cable systems in which the tech giants hold direct or indirect operational involvement or ownership. The lawmakers stated their committees are "examining the extent to which foreign adversarial actors are positioning themselves, both overtly and covertly, to compromise subsea cable systems at key points of vulnerability." They have given the companies until August 8 to disclose any instances of suspected hardware tampering, optical signal tapping, unexpected signal distortion, or other operational irregularities observed during cable repair or maintenance. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like A genetic disorder that is damaging his organs. Help my son Donate For Health Donate Now Undo "A growing body of evidence points to a pattern of coordinated malign activity linked to the People's Republic of China and the Russian Federation targeting subsea infrastructure in the Baltic Sea, Indo-Pacific, and other strategic regions," the letter asserted. Letter follows attack on subsea infrastructure This congressional inquiry follows recent actions and incidents highlighting the vulnerability of subsea infrastructure. Recently, Federal Communications Commission (FCC) Chair Brendan Carr announced the agency's plan to implement rules prohibiting companies from connecting undersea submarine communication cables to the United States if they incorporate Chinese technology or equipment. Since 2020, U.S. regulators have been instrumental in blocking four proposed cable projects intended to link the United States with Hong Kong. More recently, in November 2024, two fiber-optic undersea telecommunication cables in the Baltic Sea were severed, prompting sabotage investigations. In 2023, Taiwan accused two Chinese vessels of cutting the only two cables providing internet access to the Matsu Islands. Additionally, Houthi attacks in the Red Sea have been implicated in the severing of three cables vital for internet service to Europe and Asia. AI Masterclass for Students. Upskill Young Ones Today!– Join Now


Time of India
4 hours ago
- Time of India
Malaysia to establish data centre framework to streamline policies
Malaysia will establish a data centre framework in October to streamline policies and development in the sector, the trade and digital ministries said on Tuesday. The Malaysian Investment Development Authority will be the main agency to approve all new data centre projects and investments, as well as the expansion of existing projects, the ministries said in a joint statement. Malaysia has recently seen a boom in data centres , driven by growing demand for artificial intelligence, with technology giants like Microsoft, Nvidia, Alphabet's Google and ByteDance announcing billions of dollars of investments in the country since the beginning of last year. Data centre facilities in the Southeast Asian country are projected to quadruple in the next decade from the current 18. The government's framework will ensure that policies are aligned with data centre planning in a way that will drive the growth of Malaysia's digital economy, the ministries said. "Transparent and thorough policies are important to continue reassuring investors about the goals of sustainable growth in the country's digital economy for the benefit of the Malaysian people and business sectors," Digital Minister Gobind Singh Deo said in the statement.


Time of India
5 hours ago
- Time of India
Microsoft knew of SharePoint security flaw but failed to effectively patch it, timeline shows
A Microsoft spokesperson confirmed on Tuesday that its initial solution did not work. The spokesperson added that Microsoft had released further patches that fixed the issue. It remains unclear who is behind the ongoing operation, which targeted around 100 organisations over the weekend and is expected to escalate as other hackers join the fray. Tired of too many ads? Remove Ads Tired of too many ads? Remove Ads A security patch released by Microsoft earlier this month failed to fully fix a critical flaw in the US tech company's SharePoint server software that had been identified at a hacking competition in May, opening the door to a sweeping global cyber espionage operation , according to a timeline of events reviewed by Reuters.A Microsoft spokesperson confirmed on Tuesday that its initial solution did not work. The spokesperson added that Microsoft had released further patches that fixed the issue. It remains unclear who is behind the ongoing operation, which targeted around 100 organisations over the weekend and is expected to escalate as other hackers join the fray. Microsoft said in a blog post that two allegedly Chinese hacking groups , dubbed " Linen Typhoon " and "Violet Typhoon," were exploiting the vulnerabilities, along with another China-based hacking and Alphabet's Google have said that China-linked hackers were likely behind the first wave of hacks. Chinese government-linked operatives are regularly implicated in cyberattacks, but Beijing routinely denies carrying out hacking operations. In an emailed statement, the Chinese embassy in Washington said China opposes all forms of cyberattacks, and "smearing others without solid evidence." The vulnerability that facilitated the attack was first identified in May at a hacking competition in Berlin organised by cybersecurity firm Trend Micro, which offered cash bounties for the discovery of computer bugs in popular offered a $100,000 prize for "zero-day" exploits - which are called that because they leverage previously undisclosed digital weaknesses that could be used against SharePoint, Microsoft's flagship document management and collaboration platform.A researcher working for the cybersecurity arm of Viettel, a telecommunications firm operated by Vietnam's military, identified a SharePoint bug at the event, dubbed it "ToolShell" and demonstrated a method of exploiting it. The researcher was awarded $100,000 for the discovery, according to a post on X by Trend Micro's "Zero Day Initiative."In a statement, Trend Micro said it was the responsibility of vendors participating in its competition to patch and disclose security flaws in "an effective and timely manner." "Patches will occasionally fail. This has happened with SharePoint in the past," the statement said. Microsoft said in a July 8 security update that it had identified the bug, listed it as a critical vulnerability, and released patches to fix 10 days later, however, cybersecurity firms started to notice an influx of malicious online activity targeting the same software the bug sought to exploit: SharePoint servers. "Threat actors subsequently developed exploits that appear to bypass these patches," British cybersecurity firm Sophos said in a blog post on pool of potential ToolShell targets remains to data from Shodan, a search engine that helps identify internet-linked equipment, over 8,000 servers online could theoretically have already been compromised by servers include major industrial firms, banks, auditors, healthcare companies, and several U.S. state-level and international government Shadowserver Foundation, which scans the internet for potential digital vulnerabilities, put the number at a little more than 9,000, while cautioning that the figure was a minimum. It said most of those affected were in the United States and Germany, and the victims included government organisations. Germany's federal office for information security, BSI, said on Tuesday it had found SharePoint servers within government networks that were vulnerable to the ToolShell attack but none had been compromised.