We are now in the early days of the consumer virtual reality market. Few companies have developed headsets so far, and even fewer actually have products that folks like you and I can go out and buy. However, what you can get today is typically meant for Android devices, with iPhones getting little to no attention.
Apple wants consumers to know that its iPhones are not being left out, as it is now selling a VR headset through its online store. The most-appealing thing about it is no doubt the price.
This may initially generate some snickers and likely lots of tabs quickly closing, but I assure you the story is safe for work. The only nudity here is the whale in the image above. In fact this is a story about charity and of helping to save endangered species, albeit in a rather unconventional way.
It's no secret that porn drives the internet to a certain degree, and many claim it also drives innovation to some extent. True or not, it's big business that can generate massive revenues for the purveyors of the content. One of the big ones is PornHub and it is deciding to give back in the form of charitable donations to a worthwhile cause.
Most Commented Stories
Extensions are coming to Microsoft Edge via the Windows Store, and Insiders will be able to try them 'soon'
The Document Foundation has released LibreOffice 5.1 64-bit and LibreOffice 5.1 32-bit. It comes just under six months after version 5.0 debuted back in August yet unveils some major changes to the user interface as well as performance improvements.
LibreOffice 5.1 promises new and simplified application menus, faster start-up times and a number of application-specific improvements, including better slide transitions in Impress and a host of new features in Calc.
Following the release of the Swift programming language as open source back in early December 2015, Apple has followed up by releasing the code for its Benchmarking Suite on GitHub.
By releasing the Benchmarking Suite as open source, Apple is trying to assist developers to create faster, more efficient code. It will allow programmers to find areas where their code is running slowly, so that they can find a faster way of coding their applications before they are committed. Specifically, the suite consists of tools, benchmark libraries and utilities.
The app market is booming, with revenues expected to top $140 billion this year, but lack of investment in security could be putting these revenues at risk.
A new study by Bluebox Security has examined three popular mobile apps -- Hulu, Tinder and the Kylie Jenner Official App -- all examples of apps that lack self-defense capabilities to protect against tampering, resigning and redistribution. It shows that attackers can easily defraud enterprises of app revenue by disabling advertising, accessing premium features for free, and bypassing subscription payments.
The ITIL change management process is one of the very important processes that helps increase security for IT applications and infrastructure. For example, in healthcare and hospital environments, maintaining an eHealthRecord (eHR) application is an enormous IT task. Cerner, Epic, Allscripts, MEDITECH, Siemens and McKesson are the major vendors and cost many millions to purchase. It often requires millions more in resources to implement and maintain.
The ongoing task of maintaining a hospital eHealthRecord is a giant burden on IT. There are also many possible security issues, given that HIPAA compliance is required for any hospital or healthcare environment. According to industry research, some hospitals have a backlog of over 1000 eHealthRecord Requests for Change (RFC), and many are related to security.
Along with Big Data, the Internet of Things (IoT) has been one of the most heavily hyped broad technology trends because it will touch just about every sector of society and commerce. As it happens, these two great trends will overlap and reinforce each other, while sharing some of the same constraints and concerns as they develop their full potential over the coming five to ten years.
Analyst group Gartner has identified a clear life cycle for such major technology trends, beginning with a discovery that triggers early innovation, which then generates hype followed by an inevitable period of disillusionment when the initial over-stoked expectations are not met. Some technologies die in this trough, but others emerge at the other side into Gartner’s "slope of enlightenment", where they gain adoption before reaching a plateau of maturity occupied now by the ICT sector as a whole.
The Raspberry Pi is a game-changing computer. While it was primarily designed as a low-cost base on which students could learn to code, it has proven to be much more. Some consumers buy it for HTPC purposes, but more importantly, developers embrace the little computer for other projects, such as IoT.
Unfortunately for some developers, the ARM architecture and rather anemic performance make the Raspberry Pi a poor choice. While some consider ARM to be the future, I'm not so sure -- x86 has been surprisingly adaptable. Today, Canonical releases an Ubuntu Core image for the x86-based Intel NUC DE3815TY. Priced around $150, this NUC is more expensive than the Pi, but it is much more powerful too; a better choice for developers needing an x86 platform.
Endpoint systems often represent the weakest element in the security of any corporate network. In order to guard against attacks, protection specialist Bromium is launching the latest version of its security product.
Bromium Advanced Endpoint Security integrates threat isolation and analysis, plus has newly introduced continuous host monitoring to enable organizations to protect, detect and respond to targeted attacks, zero-day threats and breaches in real time.
It happens all the time. You’re working in Explorer, maybe opening or saving a file, but the current folder is so far away that you have to click, and click, and click to get there.
Technology to previous generations involved radio, TV, record players and perhaps even 8-track tape players, but today's youth have smartphones and tablets and are connected all of the time. Messaging apps have replaced phone calls and social interaction takes place via the internet.
On the heels of the gift-giving season, which likely featured a few iPads and the like, Logitech has looked into the prospect of young children with these devices. The survey includes both US and UK parents.
When you use a browser's incognito mode you expect it to keep that browsing session private. That is its purpose, after all, to let you access websites without saving any data or information that might be used to trace your visits from the browser. Thing is, at least in Microsoft Edge's case, its InPrivate mode has not exactly worked as advertised -- in fact, it did not work at all.
Microsoft Edge's InPrivate mode is a "privacy nightmare", as my colleague Mark Wilson puts it. Instead of completely ignoring your session, Microsoft Edge actually records your browsing history, making it possible for others to find out exactly which websites you have accessed. However, the software giant now claims to have addressed this privacy issue in the form of a new Windows 10 update.
Keeping up to date with the latest updates for Windows 10 can be something of a full time job -- particularly if you're signed up to get Insider builds. To make it easier to keep track of what changes each update brings, Microsoft has launched the Windows 10 update history site.
The site is in response to feedback from Windows 10 users who have been looking for an accessible way of learning about updates. The site provides details of exactly what the updates delivered through Windows Update. It is something of a work in progress at the moment, but one of the recent updates featured fixes a bug that meant browsing sessions in Microsoft Edge's InPrivate mode were not necessarily completely private.
We all know that hacking is big business, 2015 proved to be a record year for cyber crime, and it's predicted that 2016 could be even worse. But aside from the worry of putting customer and employee information at risk, what are the financial penalties of being hacked?
Cyber security specialist Praesidio has put together an infographic looking at just how expensive a cyber attack can be.
Security teams face threats from outside the organization but also challenges within to put protection in place and satisfy executive and regulatory demands.
Managed security company Trustwave has published its latest Security Pressures Report, compiling the thoughts of more than 1,400 IT security professionals around the world, addressing which emerging technologies pose the greatest risks, the top fears of post-breach repercussions, which security responsibilities are top priorities, and more.