Ian Barker

GraphLab unleashes the power of machine learning

Notebook brain

The increased demand for solutions based on big data has led to something of a shortage of data scientists, which means in many cases companies are struggling to unlock the information they already have.

A new tool from data specialist GraphLab provides enterprise-grade machine learning to simplify and automate the handling of big data. By bringing together ease of use and computing scale the software makes it possible for one data scientist to do the job of many.

Continue reading

The new technologies IT departments need to embrace

social cloud business enterprise hand

In the past IT departments have always been about crunching numbers and processing data. But emerging technologies are beginning to take IT into unfamiliar areas that in turn have an impact on the wider operation of the business.

Research specialist Gartner has identified six areas that it sees as potentially being adopted by business and which CIOs need to consider.

Continue reading

DocuLynx aims to simplify cloud storage decisions

Cloud backup documents

There are a number of reasons why businesses might move data to the cloud. To reduce storage costs, improve accessibility or simply reduce the need for on-site equipment. But how can you be sure that moving data to the cloud is the correct decision?

We looked at how businesses can approach this earlier today. Now archiving specialist DocuLynx is using the Microsoft Worldwide Partnership Conference in Washington to launch a new product aimed at making cloud storage decisions easier.

Continue reading

Gmail app vulnerability leaves iOS users at risk

virtual padlock

Mobile security specialist Lacoon has released details of a new vulnerability in the Gmail app for iOS that may allow hackers to view or modify encrypted communications.

It allows attackers to use a Man-in-the-Middle (MitM) technique to impersonate a legitimate server using a spoofed SSL certificate.

Continue reading

Law enforcement and industry combine to prevent Shylock taking its pound of flesh

Piggy bank theft

An international operation involving law enforcement and private sector organizations has been set up to combat the Shylock banking trojan. Shylock, which gets its name because the code contains lines from Shakespeare's The Merchant of Venice, is thought to have infected at least 30,000 Windows computers worldwide.

To date Shylock has targeted the UK more than any other nation so the country's National Crime Agency (NCA) is coordinating the international effort. This also includes the FBI, Europol, BAE Systems Applied Intelligence, GCHQ, Dell SecureWorks, Kaspersky Lab and the German Federal Police.

Continue reading

New private cloud allows invite only sharing

Private secure cloud

Cloud storage is an increasingly popular way of storing and sharing data, but when using public services there's always a concern about how safe your information is.

But now a new startup aims to provide controlled sharing of data via an intelligent private cloud network. Sher.ly integrates your existing hard drives into a private, tightly controlled cloud network. Rather than have to send out open links to files or share copies across a public cloud, organizations and individuals can have the security of invite-only, limited-access file-sharing that keeps data on the devices that produced it.

Continue reading

95 percent of employers are concerned about security risks from BYOD


Allowing employees to use their own devices is an increasingly popular trend, but BYOD opens up security threats that can leave company data vulnerable. A new survey commissioned by security specialists Webroot looks at the reality of mobile security.

In particular it focuses on the difference in perception between companies and employees when it comes to securing mobile devices. Whilst there are some areas of agreement there are also signs that some employees don't take adequate steps to protect company data.

Continue reading

Ransomware is still a major concern for IT professionals


Ransomware has proved to be a successful business model for cybercrooks and a recent study shows that IT professionals still see it as a major and growing area of concern.

In a study by security awareness training specialist KnowBe4 88 percent of the 300 professionals surveyed said they expected ransomware to grow over the rest of this year. Attacks are also shifting from desktops to mobile devices, leading to problems for BYOD users.

Continue reading

Android SMS bot sets new infection record

malware mobile

Earlier this week we covered the debate on whether Android users need malware protection. If further fuel for the argument was needed it comes in the form of Russian security firm Dr.Web's monitoring of Android threats.

Until recently embedded advertising modules have topped Dr.Web's malicious program rankings, but statistics for recent months indicate that an Android SMS bot Trojan has been spreading at an alarming rate.

Continue reading

Cyberrisks present new challenges to insurers


All businesses insure against risks like fire, flood and theft. Insuring against cyberrisks though is a relatively new field and it's hard to know how much cover is adequate.

According to a new report from NSS Labs, US retailer Target had $100 million worth of cybersecurity coverage at the time of its breach last year. But with losses estimated at $88 million by May this year and a number of lawsuits still pending it looks like that cover won't be enough.

Continue reading

Technical innovation and its impact


Where would we be without innovation? In the dark most probably. It's what drives the commercial world forward, in particular the "disruptive technologies" that radically change the way that the world operates.

Marketing specialist Pulp-PR has put together an infographic from a number of data sources showing the effect these technologies have and highlighting what it thinks are the currently most innovative tech companies.

Continue reading

The hidden costs of software licenses

Software agreement

We're all familiar with software licenses. It's the bit you ignore when installing a new program, right? But what's less understood is the difficulty they cause for businesses. New research by IDC sponsored by Flexera looks at the latest trends in software licensing, virtualization and the compliance issues involved.

The report points out that the software license supply chain is one of the most opaque, difficult to understand and complex to manage. As a result, the relationship between application producer and customer has often suffered in the past.

Continue reading

Poor Wi-Fi risks losing hotels repeat business

Hotel wi-fi business

The hotel and leisure industry is based on understanding and meeting customer needs. But new research from network hardware company NETGEAR suggests that this doesn't stretch to the importance guests place on good Wi-Fi connections.

The study finds that 76 percent of hospitality venues are convinced that their quality of service and facilities are far more important to customers than Wi-Fi. As many as 43 percent believe customers think poor or non-existent wireless access is a price worth paying for the experience on offer.

Continue reading

Simpler IT makes for better business

Easy PC

Complex IT systems arise for many reasons, adding new systems to old ones, expansion through mergers or takeovers, or simply demand for more sophisticated solutions.

But a new study by IDC, sponsored by business software specialist Oracle, concludes that IT complexity leads to lower profits and curbs an organization’s ability to innovate and grow.

Continue reading

Threats to the internet in 2025 -- start worrying now

crystal ball

We looked yesterday at the ten most serious security breaches of recent years, but the threat landscape is constantly changing. So what will happen in the future and which threats should we be most concerned about?

A new report by PewResearch, as part of its series marking 25 years of the internet, looks at how things might be in 2025. More than 1,400 experts in various fields were canvassed for their views on future threats.

Continue reading

Ian's Latest Tweets

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.