BetaNews Staff

IT spending will increase by 2.7 percent in 2017

Spending Money Dollar

Gartner has tweaked its IT spending predictions for 2017, and now says the three percent increase in spending is not exactly realistic. It's going to be less -- 2.7 percent to be exact, which is still a positive prognosis, keeping in mind we're talking about growth.

The reduced spending is mostly to blame on the "wait-and-see" approach many companies are taking, caused by political and economic uncertainty.

Continue reading

People, not technology, drive innovation


Anyone who has worked in the technology industry for a long time will develop a healthy cynicism towards industry buzzwords. They may also come to realize that the majority of technology "paradigms" are adaptations of concepts that have been done before. Digital disruption is not the automatic result of the arrival of new types of tech. Disruption, transformation, innovation -- call it what you will -- comes about as a result of human ingenuity, good fortune, and hard work -- in addition to technology.

Take Pokémon Go as an example. Plenty of analysis has been done on why it was so successful. Nothing about it was particularly radical; the smartphone, mapping, GPS, AR and, of course, the Pokémon themselves are not new. However the combination of these things tapped into a desire for nostalgia, collectables, and the need to complete and compete. Originally developed as an April Fool’s joke, it was, by all accounts, a highly successful mistake.

Continue reading

Why you should be thanking hackers

hands shaking computer monitors

With titles like "cyber terrorist" floating around, hackers have been associated with all things criminal, malicious, and in some cases, just plain psychotic. A fair argument, considering how many cases of identity theft, loss of income, slander, and more have come from a data breach thanks to a keyboard and a few hours.

So why should you be thanking hackers?

Continue reading

4 reasons to move from Big Data to the Age of Insights


In the online world, where data aggregates, compounds and grows at a tremendous pace, your business probably has multiple tools for collecting data. But how many tools does it have for making sense of that data?

Are you able to merge or fuse sets of data together to fully understand your users? Do you have a single source of data in order to understand the complete user journey? Are you able to use the data to answer complex business questions? If you answered "yes" to the above questions, you’re a step ahead of many others. According to , online companies are continuously investing more in analytics. At the same time, however, their satisfaction continues to decline. How can online businesses become more confident about their analytics tools?

Continue reading

Yahoo's security is a huge mess

Yahoo sign logo building

The latest reports on the data breach revelations at Yahoo, suggest that the company lost data for more than one billion users as far back as August 2013 and that the data is suspected to contain names, email addresses, hashed passwords, security questions and associated answers. In addition, Yahoo has stated that the attackers have accessed Yahoo proprietary code used to generate cookies for user access without credentials.

This major breach raises a number of questions, including: why did it take so long to identify and notify authorities about it? What are the implications for Yahoo users? What might this mean for Yahoo going forward? And what can other companies learn from these events?

Continue reading

Citrix acquires Unidesk for its layering technology


Citrix has announced that it has acquired Unidesk, a company that created layering. The technology allows for the separation of Windows applications from the operating system.

The value of the acquisition was not disclosed. What we do know, however, is that we can expect a much tighter cooperation between Microsoft and Citrix.

Continue reading

What won't be reported in 2017 -- Even though it's likely to happen


Last year, more than a few stories didn’t make headlines that I thought should have. Whether they weren’t sexy or sensational enough for mainstream news channels, I don’t know.

My inner Nostradamus is telling me that the trend will continue and, therefore, I’m predicting seven storylines that should be covered in 2017, but that most likely will never cross your daily news feeds.

Continue reading

Cyberattacks against IoT devices tripled in 2016

Security attack keyboard

It only takes one successful cyber-attack to seriously hurt a company, so it’s shocking to see that UK businesses suffered, on average, almost 230,000 cyber-attacks in 2016.

This is according to Beaming. The ISP says a third of attacks was targeting company databases, but two thirds were, in fact, attacking connected devices, such as security cameras or building control systems. Such devices can be controlled remotely, through the internet.

Continue reading

One in three companies plans to embrace DevOps by 2019


Almost half of large organizations (47 percent) have a DevOps approach to at least some, if not all, of their projects. This is according to a new report by Redgate Software, entitled State of Database DevOps.

The company says it has polled 1,000 SQL Server professionals all over the globe, with more than half working at companies with 500 employees or more.

Continue reading

The biggest security threats in 2017

skull death security malware hack threat

It’s that time of the year again: when the great and good of the cybersecurity industry reach for their crystal balls to anticipate what the threat landscape might look like in the next 12 months. We all know cybercriminals by and large don’t operate to annual deadlines.

But December still represents a good opportunity for us to point out what might be coming down the road. It’s what Trend Micro’s 1,200-strong global threat research team does all year round to ensure we’re prepared for anything the black hats can throw at us. The good news for the UK’s CISOs is that much of what we’ll see is a steady evolution from threats that will already be familiar to many. The bad news: that won’t make them any less dangerous.

Continue reading

Artificial intelligence grabs headlines, but the true impact of robotics is in the back office

Business process automation gears

The hype over machine learning masks the real changes happening in the workplace.

Looking back on 2016, it would be easy to think that this was the year that artificial intelligence arrived, borne in by an army of automated workers. Media outlets bombarded us with news on the future of AI and automation. The vision of a dystopian future where robots do all the work and humans are trapped in a jobless, meaningless existence drove headlines of all kind. In politics, this ranged from speculation around a universal basic income, to debates over whether Donald Trump can reverse decades of technological progress in US manufacturing. In AI, the latest tangential development from any tech giant was duly reported as headline news.

Continue reading

How to take control of BYOD bandwidth use

smartphones office desk team meeting break

The trend for increasing numbers of employees and customers bringing their own devices into a workplace can seriously impair a businesses’ access to the Internet.

The problem is that as more mobile devices connect to the network, a business can quickly discover that its cloud-based applications, payments systems, accounting, stock control, customer relationship management (CRM) and business applications have become hopelessly sluggish.

Continue reading

How to detect a hacker before they steal your company's data

Hacker laptop

With massive data breaches uncovered daily or weekly, it’s hard not to be a bit numb to the urgency and magnitude of the issue. For most organizations, the problem is far from solved. Apathy in place of outrage at this juncture could diminish any help before it gets started. At the same time, misguided efforts will result in continued failure.

A giant Python-esque foot has not yet come down to condemn the ludicrousness of such a broad catastrophe but losses and damage have been mounting. This year, cybercrime overtook physical crime in the UK, marking a profound changing of the times. The National Crime Agency estimates the annual loss to UK businesses of £1 billion in direct costs, although the more realistic number is far greater, particularly considering the cost of stolen intellectual property and business secrets and other loss and damage not typically reported.

Continue reading

Software-defined LAN: Benefits and requirements


As networks evolve, the race is on to create and define the next generation of network infrastructure, one that enables more flexibility, adaptability, and scalability than ever before, underpinned by extreme efficiency.

The software defined network (SDN) has been a hot topic for many years, driving the future of networking by shifting the mind set around, planning, implementing, managing, and using networks. Traditionally, SDN has been an approach to using open protocols, such as OpenFlow, to apply globally aware software controls at the edge of a network to access network switches and routers that typically would use closed and proprietary firmware.

Continue reading

Four FinTech trends to look out for in 2017


Could 2017 be any more turbulent than 2016? Some would argue that because of last year’s unprecedented surprises, fluctuating markets and politics and real-world events, this year couldn’t possibly offer any more shocks.

In the midst of all of this, the technology world continues unabated, with the FinTech sector holding some exciting new developments for the year ahead. Here are four themes within the FinTech sector to keep an eye on in 2017:

Continue reading

© 1998-2017 BetaNews, Inc. All Rights Reserved. Privacy Policy.