BetaNews Staff

Protecting your brand in the new domain name era

OS X, iOS and Linux have more vulnerabilities than Windows

The online world has long been a space in which brands and businesses have jostled for attention. Until recently, there have been only a small number of domain extensions available, with the most popular ones including .com, or .co.uk.

The limited number of possibilities meant that prime domain addresses were fiercely fought over, with the market becoming increasingly saturated as rising numbers of brands looked to establish an online presence. Now however, a new programme spearheaded by the Internet Corporation for Assigned Names and Numbers (ICANN) is changing the face of the domain name marketplace -- by introducing more than 1200 new domain suffixes to the Internet.

Continue reading

How Netflix helped millions of TV viewers cut the cord

Netflix

Netflix just won another indirect victory in the form of a net neutrality proposal passed by the Federal Communications Commission, which would ban all types of paid prioritization on the Internet.

This means Verizon, AT&T and Comcast will be unable to seek more revenue from Netflix, in exchange for fast video streaming rates to Netflix’s 40 million US subscribers.

Continue reading

7 useful online tools for your business

businessman on tablet

As the manager of a small business or an entrepreneur just starting out, you should always be on the lookout for anything that can improve your productivity, time management, organization, and ultimately make day to day tasks easier to manage.

It can be hard enough trying to run things in the office without also having to worry about your online presence. But like it or not, today’s business needs an online presence in order to ultimately succeed, or at least remain competitive.

Continue reading

Apple Watch could replace your car keys

Apple Watch

The Apple Watch "official" launch event (as opposed to last autumn’s mere unveiling) is almost upon us -- in fact it’s a week from today -- and CEO Tim Cook has been busy stoking the hype fires one last time.

Cook talked to the Telegraph about the sort of innovations Apple is planning to bring forth with its smartwatch, one of which is that the device will be usable as your car keys -- replacing the chunky fobs that vehicles use these days.

Continue reading

4 reasons why cloud spending is set to explode this year

Cloud_money_contentfullwidth

The Gartner Worldwide IT Spending Forecast report predicts fiercer competition in 2015 between traditional on-premise software vendors, pushing expenditure up to $3.8 trillion. It says that spending in the enterprise technology market will reach $335 billion this year, increasing by 5.5 percent over 2014’s figures. Traditional vendors are now having to increasingly compete with cloud-based software-as-a-service (SaaS) offerings, lower prices and vendor software consolidation.

These trends have pushed traditional on-premise software vendors to increasingly offer more discounted cloud services to counter the onslaught by the incumbent SaaS players.

Continue reading

How much is your personal or company data worth? 50% of Brits say at least £1 million

Bag of money

How much would you be prepared to sell your data for? According to a new survey, almost half of the UK wouldn’t give it up for any less than a million quid.

The study of a thousand Brits, undertaken by Swiss data center Artmotion, found that 49 percent of respondents would only sell their personal or company data for £1 million or more.

Continue reading

Agile versus waterfall development: The case for agile

AGILE_WORK_contentfullwidth

Agility and flexibility are top of mind when it comes to delivering IT projects. With that being the case, the traditional waterfall development approach, which requires each step of a project to be completed before the IT team can move onto the next, seems a bit outdated.

Enter the agile development technique. This iterative development method should be the go-to today. It's based on collaboration and continuous development, and differs from the waterfall approach in that it can be characterized as being adaptive rather then predictive. Essentially, with agile, the requirements gathering, development and testing happen concurrently versus consecutively. Let’s take a closer look at why this development method makes more sense for most businesses today. And then, we’ll briefly examine a newer method -- DevOps -- which, too, is becoming more common. Regarding agile:

Continue reading

Pivot or Divot: How a first time founder learns to navigate the realities of running a startup

Pivot

Starting a tech business in today’s rapidly evolving landscape presents a real challenge: how do you conceptualize an idea, develop it, and push it to market before the idea becomes obsolete in the face of new technology?

Firepype was first conceptualized in 2011­­ -- eons ago by tech standards. Amazingly, there is still no other product that offers automated media distribution the same way this does. The basic prototype came together pretty quickly for the first client, in a matter of weeks. Then it became time to refine the idea into an elegant, marketable package, and the forward momentum slowed to a crawl as I searched for the right team to help turn my vision into a reality.

Continue reading

Lack of employee context hinders protection efforts

OS X, iOS and Linux have more vulnerabilities than Windows

Even with significant security solution spend, program maturity and external third-party certification efforts, organizations continue to struggle to adapt and protect themselves from attackers employing new and innovative approaches that take advantage of the very systems put in place to thwart them.

Today’s attackers are very sophisticated, well-funded and patient. They act more like detectives and scientists as they follow a systematic approach to understand their targets’ environments, their nuances and day-to-day operations even better than you do. They know that security point solutions have an important role to play in protecting your environment but that they also have their limitations. Attackers test these to understand exactly when an organization reacts and when it does not. But it doesn’t end there.

Continue reading

China drops leading western tech brands for state purchases

china keyboard

China has decided to remove some of the world’s leading technology brands from its state approved purchase lists and replace them with thousands of locally built products.

Some say this move comes as a response to revelations of widespread cyber-surveillance conducted by the West, while others believe this is more of a way for China to protect domestic technology industry from fierce competition.

Continue reading

Microsoft releases the first major Band update

Microsoft ignores its own Band wearable and gives away Fitbit Flex with the Lumia 830

Microsoft Band, the wearable fitness tracker, and its accompanying Health app have received their first major update, some four months after the initial release.

With the latest update, the band is getting some new features -- enabling it to monitor biking (yes, even stationary biking), a quick read feature for notifications and -- (you’re not going to believe this) -- an on-screen keyboard.

Continue reading

Apple could track your iPhone, iPad when turned off

iPhone 6 with Apple case

Apple has been granted a patent that could potentially allow it to track an individual’s iPhone, even when it appears to have been turned off.

The feature enables phones to enter a sleep-like state that suggests it has been shut down, but instead the phone’s movements can still be traced.

Continue reading

Can IT rise above the data deluge?

Data_overload_contentfullwidth

Data center teams face one crisis after another, but at least one has remained constant over recent years. The tidal wave of data, especially related to the Internet of Things (IoT) and big data, continues to grow at phenomenal rates, threatening to overwhelm operations for many enterprises. IT teams are struggling to keep their heads above this deluge of digital information, scale storage and processing resources to handle the data, and simultaneously provide the ubiquitous connectivity required for today's Internet of Things.

Fortunately, data center equipment providers have been evolving the data center foundations. IT and facilities teams have the life vests and rafts that they need, if they know how to use them.

Continue reading

A third of Brits embarrassed by wearables

Audi-smartwatch

Over a third of the people in the UK would feel embarrassed or self-conscious if they wore wearable tech as it currently appears, new research has found. As a result, businesses and app developers are being urged to do more if they want to improve uptake

The study was conducted by the UK mobile app developer Apadmi to form part of its new report looking into the public’s view of wearable technology, such as smart glasses, watches and fitness trackers.

Continue reading

Internet of Things can change our daily lives -- but without identity it's just noise

Internet_of_Things_fridge_contentfullwidth

As the International Consumer Electronics Show (CES) wrapped up in Las Vegas last month, one thing became abundantly clear: 2015 is going to be a big year for connected devices. From toothbrushes that can schedule check-ups with dentists to yoga mats that can analyze poses in real-time, 3,000+ companies launched more than 20,000 new products at CES this year.

Collectively referred to as the "Internet of Things" (IoT), this concept of connected devices is obviously nothing new. In fact, Gartner predicts that the number of Internet-connected devices will inflate to more than 25 billion by the year 2020.

Continue reading

© 1998-2015 BetaNews, Inc. All Rights Reserved. Privacy Policy.