Microsoft wants to see women wearing boyfriend jeans on Skype -- creepy
Each decade, there seems to be new extreme trends in fashion. In the 90s, whether you were grunge or hip-hop, it was cool to wear baggy jeans. However, this decade, there has been a skinny jeans trend. Both men and women are wearing pants that look painted on. This is not conducive to the phablet trend.
However, there is a trend that is the antithesis of skinny jeans -- boyfriend jeans. Yes, this particular style is baggy pants for women. In other words, it is meant to look like they are wearing their boyfriend's pants. Perhaps Satya Nadella is looking to become a fashionista, as Microsoft wants to see women wearing these pants on Skype. Creepy? Sort of.
CeBIT: UK Prime Minister backs development of insane-speed 5G networks
Mobile users are just getting around to upgrading their handsets to take advantage of 4G networks, but this simply is not fast enough. UK Prime Minister, David Cameron, spoke at CeBIT announcing that the country will join forces with Germany to develop the successor to 4G -- the uninspiringly-named 5G. The PM announced a deal with Germany which will help to push forward with the development of a mobile broadband network that will offer download speeds up to 1,000 times those currently available on 4G.
To put this kind of speed in perspective, as the Prime Minister explained, an 800MB movie (or any other type of file for that matter) could be download in a single second. One second. For the best part of a gig of data. On a mobile device. Who is going to say no to that? Ultimately, the adoption rate will be determined by the costs involved -- mobile tariffs, suitable handsets, data charges, and coverage -- but before any of this becomes an issue, 5G needs to be, well, invented really.
Discover the answer to life, the universe and everything 30 years on
Gamers of yore will remember the delight that could come from playing a text-based computer game. Forget pushing polygons around the screen as fast as a GPU's legs can pump, these were games where words were king. Back in 1984, the Hitchhiker's Guide to the Galaxy game took the gaming world by storm and now, thirty years later the BBC has resurrected the classic title in an exclusive online version that's free for anyone to play.
This accessible and hilarious sci-fi classic translated well into a game, and whether you missed it the first time around or you like the idea of reliving the mid-80s, warm up your keyboard and prepare to type your way to victory -- and immense frustration. This is not the first time the game has been revived, but this time around there is an HTML5 version to enjoy and there are some comedic touches right from the start. The game developers decided to replace the $, % and ^ symbols with symbols for the Altarian Dollar, Flanian Pobble Bead and the Triganic Pu, "not because they are needed in the game, but just because we felt like it."
Apple releases iOS 7.1, fixes bugs, adds extra features
The first big update to Apple’s mobile operating system is currently rolling out to users now. The update includes various improvements and bug fixes.
Among the additions are support for CarPlay, and enhancements to Siri, iTunes Radio, Calendar, and Accessibility. There’s also a new camera setting which can automatically enable HDR on iPhone 5s.
Netflix expands ISP list for its monthly naughty and nice roundup
Every month video streaming service Netflix trots out its results list for speed tests of US internet service providers, ranking each in descending order. There was a recent stir of controversy, as Comcast took a sudden nose-dive in the standings. This came, rather coincidentally, just before Netflix paid up for better service. In fairness, the deal was already in the works during the drop-off, so it was at best a negotiation tactic.
With that mess now in the rear-view mirror, Netflix announces it is expanding the list of ISPs that it plans to track and include on its monthly shame and fame list.
Google turns users into sleazy salespeople with paid Google Apps referrals
Nowadays, things tend to spread virally, thanks to the internet and social media. If you discover something cool, you will share it with friends and followers. People like to share videos, pictures and even apps. With the exception of advertisements masquerading as real suggestions, people share discoveries for the sake of sharing -- it is a nice gesture.
Once a financial incentive comes into play, a suggestion becomes tainted. For example, a salesman on commission may be genuine in their suggestions, but since their pay is dependent on the sale, you can never be 100 percent sure. Sadly, Google announces that it is turning users into sleazy commissioned salespeople with paid referrals. Will you sell your soul for $15.00?
Skype for Windows 8 adds cross-device syncing, requires Windows 8.1
Microsoft has unveiled an update to its Windows chat app with the release of Skype for Windows 8 v2.6. Version 2.6 unveils one major update, support for syncing read chats and picked-up calls across multiple devices.
The new feature means that users can switch from their Windows 8 device to another platform and be sure that any chat updates or picked-up calls made on the secondary platform are now acknowledged by the Windows 8 app too.
PaaSLane optimizes Java and .Net applications for the cloud
We reported on Cloud Technology Partners' migration tool PaaSLane entering its public beta phase back in October and how it can cut the time and cost spent on moving to the cloud.
From tomorrow (March 11) the product becomes generally available with new and enhanced features to enable users to rapidly assess applications and speed up cloud migrations.
Pre-order an Xperia Z2, get a Sony Bravia TV for free
Smartphone penetration continues to rise in markets across the globe, as vendors compete to get more attractive devices, at increasingly lower price points, in consumers' hands. Meanwhile, the premium market is becoming a niche, as indicated by the ongoing drop in average selling price. The consumerization of smartphones also means sellers have to get creative, or at least attempt to, to get buyers to shell out a hefty sum.
Mobile operators have bundled smartphones with accessories and other smart devices in order to attract buyers. For instance, my Nokia Lumia 920 came with a free pair of Nokia Purity HD headphones. Now, Vodafone's UK arm is using a similar strategy, giving those who pre-order a Sony Xperia Z2 a free Sony Bravia TV.
Closing the time to protection gap with threat forecasting
The dominant theme at this year’s RSA Conference in San Francisco was actionable security intelligence, a term which can mean different things to different people. For example, do bad IP addresses, DNS fast fluxing information, and geolocation constitute security intelligence? Additionally, do malware campaigns and adversary tracking count as security intelligence?
The answer is yes for both questions, but it is important to note that these are not the only high-level indicators that can be considered security intelligence. The key challenge is understanding how to "apply" security intelligence in such a way that it is actionable. The following may be considered provocative and even go against the grain of opinion in Silicon Valley: In most approaches to security, there is too much emphasis on the adversary and not enough on understanding the attack surface.
Cybercrime industry refines its techniques to steal data
Last year saw a number of credit card data breaches that made the headlines. A new report says that this shows how well the "deep web" of cybercrime is serving its customers.
McAfee Labs Threats Report for the fourth quarter of 2013 says that not only did Point of Sale (PoS) attacks like that on Target steal large numbers of records they point to a refinement in criminal technique.
Windows Phone users do crave popular apps, no matter what apologists, fanboys say
Whenever a pundit brings up apps as an irrefutable argument for Windows Phone weaknesses, platform fanboys and apologists quickly point out they could not care less about whatever the Store is then lacking. They may also say that there already are good alternatives available, and major titles -- that are popular on Android and iOS -- are not really that important, when you have live tiles to look at all day. Basically, such an argument is, therefore, a pathetic excuse to bash their beloved platform.
Instagram? "No, thanks, that is for hipsters". Candy Crush? "I do not need that lame game on my Windows Phone as there are better ones available". "Oh, and you are an iPhone/Android fanboy for mentioning this!". You get the gist. But after we get off the comments train, we see that whenever Windows Phone gets a popular app, it quickly rises to the top of the Store. Yes, these users, of which I am proud to be one, do crave major titles, just like everyone else.
Europol warns users of WiFi hotspot security risks
Europol, the law enforcement agency for the European Union, is warning that people should exercise extreme caution when using WiFi hotspots when out and about. Citing an increase in the number of "man-in-the-middle" attacks on such connections, the head of Europol's cybercrime division, Troels Oerting, said that public WiFi connections are being used to "steal information, identity or passwords and money from the users who use [them]". The advice is to not necessarily stop using public networks, but to avoid using them for anything that involves transmitting personal data.
Singled out for particular attention is online banking, which Oerting suggests people should do "from home where they know actually the wi-fi and its security" rather than in a coffee shop. Europol is currently working with several member states of the European Union following an increase in the number of WiFi network attacks.
Twitter bug exposes protected accounts -- puts users at risk
Privacy in social media can be a falsehood. The whole concept of sites like Twitter and Facebook is to share. Sure, you can limit what you share, and with whom you share, but once the information hits the servers, you have lost control. Hell, there is the possibility of accidentally sharing something by simply not understanding the settings. Some argue that the settings on some sites are intentionally confusing.
People sometimes need to limit or hide sharing for important reasons -- maybe someone is stalking them or maybe they are sharing sensitive business details with a specific intended group. Sadly, Twitter announces that a bug has affected 93,788 protected accounts, which allowed unauthorized users to read protected tweets.
Asus Chromebox goes up for Amazon pre-order, get it for $179
It's already tough times in the Microsoft world, with Windows 8/8.1 under fire and the impending update coming under recent scrutiny for being, well, a mess, to put it much more politely than my colleague Mark Wilson worded things. If a bad time could go to worse then that would be rival Chrome OS invading the market.
While we largely think of these devices as low-priced notebooks, actual desktops are also getting into the game. Now the Asus Chromebox has hit pre-order in the US on the Amazon website.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.