In addition to news and reviews, we also regularly publish 'How to' guides here on BetaNews.
These are often very popular and cover a range of topics, software, and services. Taking a look back, as is the tradition at this time of year, I thought it would be good to revisit the most popular guides published in the past 12 months.
The recent US elections served up plenty of drama and even more suspense as the campaign entered its final stretch. Pollsters and forecasters crunched data continuously to accurately predict the paths to victory or defeat for both parties.
One of the most publicized concepts was the supposed "blue firewall", a group of states that had consistently voted for the Democratic party in past elections. If the Democrats could hold onto their lead in these states, they’d all but guarantee victory, or so the polling experts predicted…
Most Commented Stories
The driving force behind the shifts we’ve seen to Agile, DevOps and Automation, are the business needs of the companies we serve. Doing more with less and delivering it sooner than the competition is what differentiates leading companies from the rest of the pack.
Once a competitor delivers relevant features, which are faster and better quality, you WILL lose market share. In the age of Agile Development, enterprises must be capable of moving rapidly to deal with ever changing requirements, while still providing quality results, all while dealing with limited resources.
Online, hooked up, plugged in and "on the cloud". Whether it is your own personal information such as saved passwords or credit card information or if it is your client's’ personal information, so much of our personal lives can now be easily accessed just with a little Wi-Fi. With our new found accessibility -- everything at the click of a button -- our lives have become all that much more convenient, and our businesses and assets have become all that much more vulnerable. Cybercrime has boomed over the last decade and has become a real problem for businesses, large and small alike.
In the U. S. alone, more than 35,000 computer security incidents happen each day, and that is only the reported attacks. Many more attacks happen but go unreported as businesses aren’t legally required to report some types of attacks. According to PwC’s 2015 US State of Cybercrime Survey, a total of 79 percent of respondents detected a security incident in the past year. The security firm Gemalto estimated that in 2015 alone, more than 700 million data records were compromised, but unfortunately only 37 percent of organizations have implemented a dedicated cyber incident response plan.
The Internet of Things, or IoT, seems to be the big headline in tech news lately.
Perhaps you’ve heard of smart remotes, outlets, thermostats or alarm systems, but with all the recent development in this area, there are probably quite a few devices that you haven’t yet considered. Here are six worth adding to your tech radar.
Employees have poor security practices and use completely unsecured private devices for work, putting their organizations at huge risk of cyber-attacks, a new report by WinMagic says. After polling workers in the UK, the report says more than four in ten (42 percent) use private devices for work, accessing corporate data and e-mail accounts.
More than half (52 percent) use private accounts, including enterprise file sharing services (EFSS), which they use to either store or access corporate files. Only a third (34 percent) say they had never done so. Laptops, smartphones and USB devices are the top three personal devices used for work, and Hotmail, Gmail and Dropbox are the top three online services used by employees.
I don't want to start an argument about politics. My sentiment this lovely day derives from what the incoming White House is, not what so many people here in California want it to be. I wonder: If Google bought Motorola during a Trump presidency, rather than Obama regime, would later sale to Lenovo be allowed or closing of the Texas phone-assembly factory about 18 months after opening?
The question arises from a pique of sadness as I look at the FedEx tracking information for two Motorola phones purchased directly from Lenovo. City of origin: Wuhan, China. My last Moto came from the Lone Star State, here in the USA. I pine for what might have been, remembering my excitement about Google's $12.5 billion Motorola Mobility acquisition, in August 2011. My opinion expressed then remains: "The acquisition is bold for its risks, which are no less great than the benefits". I was no fan of the later sale to Lenovo.
There's lots of information available on how to change the country associated with a Google Play account, but nothing works for me. I have been unable to switch to the US store despite following the recommended methods to the letter. Everything is in order, but when I open the Google Play app on my Android smartphone afterwards I still see my local store. And I am not alone.
For one reason or another, lots of fellow Android users want to change their Google account country to get access to a different Play store, but only few succeed. But I have found a method that actually gets the job done, and it involves Family Library. I have tested it on two different Google accounts and Android devices and, yes, it worked like a charm. Here is what you need to know.
Google have begun rolling out their new mobile-first index. This update will prioritize the mobile version of your website for its ranking signals, falling back on the desktop version when there is no mobile content. In short, this means Google will create and rank its search listings based on the mobile version of content (even for listings that are shown to desktop users).
If you have neglected mobile SEO in the past, it’s now more important than ever that you up your game. Here are 10 tips to future-proof your website, and make sure it succeeds in the new mobile-first index.
Gamification is increasingly used by business as a means of enhancing the usability of software. But now it seems hackers are exploiting the technique too.
Researchers at threat protection company Forcepoint have uncovered a DDoS package being shared on Turkish hacking forums employing a gamified approach.
I’m here nominally to address the problem of what’s being called Fake News. At its core this is as labeled -- news that is fake; news that isn’t news; deceptive content intended not to inform or convince but to manipulate and make trouble. It’s a huge problem, we’re told, that will require new algorithms and tons of cloud to fix. But I’m not so sure. You see the key to keeping fake news out is to put real news in.
The recent Fake News tempest has got me thinking about what I do and don’t do right here in this simplest of all corners of the Internet. I’m just one man and a keyboard. For 19 years I’ve been pumping out this stuff generally by myself and for the most part without the support of advertising revenue, either. Did you ever wonder how I make my living? It’s not from that PayPal Donate button, which brings in about $200 per year.
Two-hundred-and-eight in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 on Windows Store in the past seven days.
Unless you've been living under a rock, the disastrous launch of the Samsung Galaxy Note7 cannot have escaped you. We've already seen the company pushing out updates in some countries to prevent the phones from fully charging in the hope that this will convince owner to take advantage of the exchange or refund program.
Now reports suggest that a new OTA update could be on its way to handset owners in the US. Rather than just limiting charging, the word is that the update will prevent charging completely, rendering the phone useless.
Nine in ten NHS trusts still rely on Windows XP, even though Microsoft stopped supporting the platform with new patches and security fixes a year and a half ago.
This information was released by Citrix, and it is based on a Freedom of Information (FoI) request. Out of 63 trusts Citrix reached out to 43 responded, and 90 percent say they still use Windows XP.