BetaNews Staff

Businesses are failing to take security seriously enough

security-lock-800x450_contentfullwidth

Companies are still failing to properly protect themselves from potential attacks and hackers, with security not being given enough weight of consideration -- and indeed, many firms haven’t even covered the fundamentals of keeping intruders out of their networks and data.

This is according to Neira Jones, a security expert who chairs the Global Advisory Board for the Centre for Strategic Cybercrime & Security Science, who criticized businesses for failing to "fix the basics" of protecting data, and lacking sufficient "cyber-security awareness programs".

Continue reading

How the Internet of Things will change the world

Internet-of-Things-800x450

The definition of the Internet of Things is "intelligent interactivity between humans and things to exchange information and knowledge for new value creation". Try saying that after a glass of wine! There’s been a lot of talk about the IoT in the business world, and with good reason. It’s chock full of potential to improve performance, reduce costs, drive innovation and create new revenue streams. Of course, we’ve now reached the point where the talk is turning into action -- technology is adapting and businesses are planning IoT strategies.

Forrester Consulting say: "We are at the tipping point for broader IoT adoption with 53 percent of organizations planning to implement an IoT solution in the next 24 months. Organizations in Asia Pacific and Latin America are more aggressive with 69 and 60 percent respectively, planning to implement over the same time period".

Continue reading

Microsoft agrees a $30m deal with Real Madrid

1118_homepage_realmadrid-640x369

Microsoft has agreed a four-year deal with Real Madrid rumored to be worth $30 million that will see the technology giant revolutionize Europe’s most successful club with a "digital transformation".

The new partnership sees Microsoft become the team’s strategic technology partner that involves building a digital platform to boost fan interaction across all devices and various other projects in the coming months.

Continue reading

Global monthly smartphone data traffic to hit 17 exabytes by 2020

15192684513_a52a92f12b_b

Smartphone data usage will increase eightfold over the next six years as consumers continue to take advantage of the increasingly fast speeds on offer from mobile operators.

Global data produced as part of the latest Ericsson Mobility Report showed that traffic would grow from the 2.1 exabytes used per month in 2014 to approximately 17 exabytes by 2020.

Continue reading

UK mobile broadband to get faster and cheaper thanks to moves by Ofcom

4G-blaze-800x450_1_contentfullwidth

Ofcom has announced it will soon make more frequencies available to mobile broadband, resulting in increased speeds and a cheaper service.

By using the 700MHz frequency band, currently in use by wireless microphones and digital terrestrial TV broadcasts, consumers in rural areas should also receive improved coverage.

Continue reading

Cloud adoption set to rocket in 2015

Rocket cloud

A global survey carried out by Equinix has found that, over the next 12 months, the majority of business applications will be deployed to not just one, but multiple clouds across several geographies.

Of the 659 respondents, 77 percent said they planned to deploy to multiple clouds in the next 12 months and 74 percent expected cloud services to command a larger budget in 2015.

Continue reading

NoSQL is much more than just the cherry on top of the company cake

Cherry on cake

How do you define the success of a technology implementation? Should it be judged by how it helps to add short-term value in certain individual areas of business? Or should the yardstick be its ability to enable your entire organization to take a giant leap forward?

Clearly, it’s not possible for every piece of hardware or software introduced within a business to have a revolutionary, transformative impact. However, perhaps it’s worth considering whether or not you are at least maximizing the impact of the tools you have at your disposal and using them to drive as much value as you can. It’s important to remember that the elephant in the room in every technology purchase, is the question of 'why?'

Continue reading

Managing mobility in the age of BYOD

BYOD

Mobile device management (MDM) solutions have been an enterprise mainstay for years, enabling IT to manage enterprise-owned smartphones and tablets in a way similar to how PCs and laptops are managed -- by taking complete control of them. But when it comes to personal mobile devices entering the IT environment via bring-your-own-device (BYOD) programs, MDM solutions struggle to provide the flexibility that IT now requires.

As the name states, MDM is focused on managing devices. It allows IT to control the entire environment of a smart device: provisioning, tracking usage and location, enforcing policies, ensuring security encryption, pushing approved enterprise apps to the device, and locking the device down or wiping it if necessary. It is a heavy-handed but very useful approach to managing corporate-owned smartphones and tablets. When it comes to personally owned devices, however, IT cannot take the same approach. Users don’t want to give IT complete control over their device. They don’t want their usage and location tracked when they aren’t at work. They don’t want to be limited in the kinds of apps they download and use. And they don’t want to give IT the power to access or wipe personal information, such as photos and text messages.

Continue reading

The nightmare challenge of developing apps for iPhone 6

apple-iphone-6-silver-800x450_contentfullwidth

The growth of mobile is considered to be the biggest shift in technology since the arrival of the internet. IDC’s mobile phone forecast predicts that total sales of smartphones will reach 1.2 billion units before the end of the year, a 23.1 percent increase over 2013. With the use of mobile devices now intrinsically linked to everyday life, it’s easy to see why British companies busy building apps for smartphones and tablets are forecast to generate £4bn in revenues this year.

The launch of the iPhone 6 and 6 Plus on September 9 created great commotion. Choose any major city, anywhere in the world and the scenes outside of Apple Stores on 9 September were the same. Hordes of consumers of all ages, social standings and demographics spent hours, and in some cases days, queuing as they waited to get their hands on the latest offering. In Australia Jack Cooksey, the first person to buy the iPhone 6, inadvertently crash tested it live on national television -- which has since gone viral. If we put the initial consumer excitement and hype to one side, the introduction of Apple’s largest ever handsets does present some very positive features. You have a larger screen, which obviously means more display space. The larger screen also means bigger virtual buttons within apps which (from a marketing perspective) enables organizations to drive more types of engagement on screen without cluttering the display. However, all of these new features and opportunities in the new handsets also inevitably complicate things for mobile app developers.

Continue reading

Businesses underestimating the Wi-Fi demand caused by BYOD

Businessman scowls at blackberry  (Steve Heap/Shutterstock)

Enterprises continue to struggle with Bring Your Own Device (BYOD) as employees continue to demand the freedom that comes with mobility in accordance with new trends. Security has long been discussed as the primary challenge when it comes to BYOD. Yet, other reasons such as network access is fast becoming a key concern for IT departments but also the key frustration for employees.

When it comes to connectivity, employee expectation is that it just works and as such this expectation must not be overlooked when implementing a BYOD roll-out.

Continue reading

New report claims 81 percent of Tor users can be identified

Dark_net_800x450_contentfullwidth

A new report claims that more than 81 percent of Tor users are identifiable using a method that threatens Internet anonymity.

The study, titled "On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records", claims that a technique known as traffic confirmation can be used to identify users.

Continue reading

81% of businesses set to move from Windows Server 2003 before support ends

servers-800x450.jpeg

A new report shows that the vast majority of businesses who are still running Windows Server 2003 are planning to upgrade before support for the OS ends on 14 July 2015.

This survey comes from Avanade (it was conducted by Vanson Bourne), and found that 63 percent of businesses are still running Server 2003. 81 percent of IT professionals whose company was still using Windows Server 2003 said they would shift from the platform before the deadline next summer.

Continue reading

Jolla teases 'something BIG' is coming

Jolla thumb

Finnish firm Jolla looks set to release its second smartphone after teasing the release of "something BIG" on its website.

The company, which launched its first foray into the mobile handset market last year, revealed a countdown to a mystery announcement at 11:00 GMT on 19 November.

Continue reading

Wearhaus unveils 'social headphones'

wearhaus2

If you’ve ever been to a silent disco, you’ll know that listening to music through a pair of headphones doesn’t necessarily mean that you have to shut out everyone around you.

Sharing music with friends that all wear headphones has traditionally been reserved for these kinds of parties, which is something the boys and girls from Wearhaus are trying to change.

Continue reading

How to overcome the hidden costs of virtualization

Money Black Hole Drain

Virtualization has widely been seen as one of the most cost-saving server technologies to emerge in the last decade. The flexibility virtual machines allow to start up whole servers as and when they are needed, then shut them down when they are not, has in theory meant that general-purpose server hardware can be readily re-allocated from one task to another as necessary.

So there won’t be idle resources wasting money doing nothing, because that particular area has been over-specified. But the theory doesn’t always work this way in practice, as there can be hidden costs that the concept obscures. In this feature, we uncover some of these hidden costs, and discuss the steps a network administrator can take to address the impact.

Continue reading

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.