Latest Technology News

Unified communication tools boost productivity and satisfaction for remote workers

remote work

Cloud unified communications specialist Outsourcery says that the full potential of remote working can only be achieved if strong UC tools are in place. Skype for Business, Slack or Trello, just to name a few, are proven to boost productivity and the possibility of working from virtually anywhere, anytime, has great effects on employee satisfaction.

There have been numerous studies about the benefits of remote working, and all of them came to the same conclusion -- this is something all of us should be implementing. One of those studies was recently published by Lancaster University’s Work Foundation, which suggests that by 2017, more than half of all UK businesses will have employed flexible working at some parts of their organization.

Continue reading

Hack the Pentagon!

The Pentagon is to run its own big bounty program, inviting white-hat hackers to test the security of its systems. It is not intended to be a free-for-all, and would-be hackers will be vetted before being given the go-ahead -- although of course there is nothing to stop anyone from trying to breach the defenses if they feel so inclined

The 'Hack the Pentagon' initiative was launched today by Defense Secretary Ash Carter. He said "I am confident that this innovative initiative will strengthen our digital defenses and ultimately enhance our national security". It is to be a carefully managed program which will only be open to US citizens, and networks relating to particularly sensitive material and weapons will be off-limits.

Continue reading

WinRT PDF found to be a possible vulnerability in Edge for Windows 10

With the introduction of Windows 10, Microsoft said goodbye to Internet Explorer, the aging Netscape killer, and hello to Edge. While the company has been increasingly vigilant about security and the nightmares of IE 6 have slowly faded away, with a new browser comes with the potential for new problems.

Security researcher Mark Yason of IBM thinks he may have found a potential path to attack. Yason plans to demonstrate the flaw at the upcoming RSA USA 2016 conference.

Continue reading

Hey, ladies! Google and the United Nations are celebrating your voices on YouTube

Regardless of sex or gender, everyone deserves to be heard. Nothing is more frustrating than feeling powerless and unimportant. By having an outlet to express yourself, you can gain self esteem, and ultimately, grow as a person.

Unfortunately, one of the most oppressed groups throughout history, women, have sometimes been made to feel powerless. They often make less money than men in the workforce, and frequently have to deal with sexual harassment and 'mansplaining'. Things can get even worse than that, including violence. Luckily, services such as YouTube can give voices to women that may not be heard otherwise, and today, Google is celebrating that fact.

Continue reading

Samsung Portable SSD T3 finally here -- up to 2TB capacity and USB Type-C

While some people decry the use of cloud storage as unsafe, I love it. All of my important files get saved to Dropbox, so they are forever safe. With that said, I'm no dummy -- redundancy is key. I regularly mirror my online storage to a portable USB hard drive just in case. This is important for backup purposes, but it also helps me retain some control over my data.

Portable hard drives are great, as they can be connected to both desktops and laptops. Unfortunately, many of them are bulky and utilize mechanical HDDs, making them potentially slow, hot, or vulnerable to bumps and jitters. When Samsung introduced its Portable SSD T3 at CES 2016, I knew I wanted one to store my files. Today, this beautiful feat of engineering and design becomes available to consumers.

Continue reading

Resistance is futile -- Windows 10 will take over the PC market (eventually)

Child gamer

Microsoft hopes that within the first two to three years of availability, Windows 10 will power one billion devices worldwide. And, so far, things are looking good, as the new operating system can be found on over 200 million devices. But whether the software giant reaches its goal on time or not is irrelevant, because the new operating system will take over the PC market eventually, one way or another.

When looking at monthly stats and even Microsoft's own status updates on adoption it is way too easy to focus your attention on the figures themselves and lose sight of the bigger picture: as long as Windows 10's user base is growing, there is no stopping it. And that is what Microsoft wants, to have its new operating system "infecting" as many PCs and tablets as possible, so that it can finally take control of this market.

Continue reading

Windows 10 deleting some user apps without permission isn't news

I’ve seen a news story doing the rounds today, about Windows 10 removing some third-party user apps following a big update. It’s understandable that people this has happened to are upset, and obviously it's not something that you want your operating system to be doing.

But it’s also not a new phenomenon -- far from it.

Continue reading

What makes a typical information security chief?

Data Guardian CISO info header

Major data breaches continue to highlight how essential it is for businesses to secure their systems, and as a result many organizations are looking to recruit information security officers.

But what should they be looking for? What are the traits that the top information security professionals share? Data loss prevention specialist Digital Guardian has produced an infographic based on research into the CISOs and security leaders at Fortune 100 companies which throws up some interesting results.

Continue reading

Is MasterCard's 'selfie pay' too much of a security risk?

risk jigsaw piece

Biometrics were the talk of the town last month in Barcelona. As the world’s mobile technology companies gathered for their largest annual event, Mobile World Congress 2016, talk centered firmly around authentication and identity.

Whilst MasterCard announced it will accept selfie photographs and fingerprints as an alternative to passwords when verifying IDs for online payments, security company Vkansee was demonstrating how easy it was to create a spoof finger with clay and a pot of Play-Doh.

Continue reading

New query tool makes life easier for .NET developers

Developer

Standard query tools can often lack the flexibility required to deliver precise results which results in the need for further processing and adds to data traffic.

To address this problem ScaleOut Software is announcing a new computational query tool that combines Microsoft's LINQ query with the company's own data-parallel computing technology to offer more powerful and flexible query tools for grid-based applications. Available with ScaleOut Software's suite of in-memory data grid products, including ScaleOut StateServer and ScaleOut ComputeServer, computational query makes it easy for .NET developers and architects to harnesses the full power of the grid's data-parallel compute engine and dramatically accelerate query processing. It's available for use with Java on both Linux and Windows systems.

Continue reading

TomTom upgrades to real-time maps after platform switch to NDS

We forget the old days when we went everywhere on our own -- it now seems that we can't leave the house without a phone and GPS, frequently the same device. Both phones and mapping technology seem to be moving forward at an ever-increasing rate, and now TomTom is making the next big leap with its maps.

The new edition of NavKit adds real-time maps that will update incrementally. Also rolling out is additional geographies.

Continue reading

Polarr Photo Editor gets a Windows 7+ desktop release

Popular mobile and browser-based image editor Polarr Photo Editor is now available in a desktop edition for Windows 7 and later.

A Free build offers only global adjustments (no selection tools), and drops custom filters and batch export.

Continue reading

Malvertising campaigns now use fingerprinting techniques

Cyber-criminals are now using fingerprinting techniques in their malvertising campaigns, researchers from security firms Malwarebytes and GeoEdge have reported.

Fingerprinting is an evasion technique in which crooks, through snippets of code, check if the targeted machine is a honeypot set up by malware researchers or an actual machine belonging to a potential victim.

Continue reading

In Apple vs FBI, it's our freedom at stake

Ever since it was announced that all iPhones would be encrypted by default with no reasonable way for Apple to unlock them, the FBI has been locked in an ever more acrimonious deadlock with the company. In the latest and most explosive development, the FBI has chosen its battle well: could there be a more emotive subject, or seemingly good reason for Apple to comply, than a demand to decrypt a single phone that belonged to a known terrorist?

By drawing its battle-lines in this way, the FBI achieves two things. On a basic level, it makes Apple look unreasonable for refusing, and therefore makes it easy to paint Apple as the "bad guy" who is preventing the "good guys" from protecting the American people against terrorists. This is a powerful argument, and certainly seems to have persuaded all front-running politicians.

Continue reading

Four things I'll never forget from MWC 2016

It feels like just yesterday, I was standing in the crowded show floor at Mobile World Congress shuttling back and forth between sales meetings, customer dinners, panel sessions and media interviews. But it’s all over now and there was so much that I saw, heard and experienced at the conference that’s earned itself a reputation for being the "Oscars of the Mobile Industry".

Amidst all of it, there were four things that I’ll never forget from this year’s event.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.