How a 0G network can make smart cities using IoT that much smarter


The IoT has the power to unleash the smart city, providing data-backed insights that can be used to inform sustainability initiatives, enhance operations and influence municipal planning and budgeting. However, the potential of this technology is currently capped by a few critical barriers -- namely, security and cost.
To capitalize on insights derived from the IoT and truly become "smart," resource-strapped cities need a solution that 1) requires lower upfront investment than traditional options, and 2) ensures top-notch security. What is that solution? It could be a 0G network.
WeChat and WhatsApp: How to safely embrace these business essentials


In today’s digital workplace, taking advantage of digital collaboration and social media tools is a business imperative. With global social media use greater than ever before, and still very much on the rise, it comes as no surprise that it has embedded itself into the workplace. Just like email, social media and instant messaging apps like WeChat and WhatsApp are becoming business essentials.
We’re all familiar with the shadow IT problem and how many IT departments are still unaware of all the applications and channels their employees are downloading and using for business conduct. Today, the social media channels and instant messaging apps needed to communicate with customers and cultivate new business are both easier for an average employee to use and come with much greater risks. This ease of use and popularity also means that several departments within a company like marketing and sales are both vulnerable to and responsible for preventing a variety of threats that they’re simply not equipped to handle.
What the 'Summer of Outages' showed us, and what we can do about it


Summer 2019 was a rough one for the internet, with systemic outages occurring frequently and in quick succession.
Some of these outages were caused by internal errors, others external, but two overriding causes emerged: greater network complexity and the frequency and pace of code change. In aggregate, these outages serve as a painful reminder of just how fragile the internet is, especially as networks and services grow increasingly interconnected and co-reliant.
Ashampoo releases Backup 14 with fuss-free cloud support


Although we understand backing up our data is essential, finding the right backup tool isn’t easy at all. Many are just too complicated, designed to offer every possible option to suit advanced users. Problem is, most people who need a backup tool just need to get things backed up, swiftly.
You could turn to the cloud yourself, and simply use the storage to keep your files secure, but this isn’t the right solution if you want a backup of your system drive. If you suffer from a ransomware attack or a system meltdown, you’d still need to go through the slow process of re-installing Windows and your applications. With this in mind, we recommend making a system backup rather than individual files and folders.
The breach prevention playbook


It seems like every day we hear of a new, high-profile data breach. No longer are we shocked when some major brand is exposed for having lost data at the hands of external bad actors or unwitting internal parties. The question has switched from 'will I be breached?' to 'when will I be breached?'
In football, there’s an adage that the best offense is a good defense. In the battle against cyber attacks, it’s all about choosing the right defense to combat the ever-changing tactics used by bad actors both outside and inside your organization. In order for a team to succeed, it must find and exploit weaknesses in the opposing team’s defense. Cybersecurity is no different.
How the data talent gap risks our AI future


Data workers are at the center of our ambitious targets for universal artificial intelligence adoption as they are the ones responsible for building the technology on a strong and stable foundation. However, there is one significant hurdle that stands between data workers and designing the perfect AI solution; the talent gap. Recent research has revealed that 44 percent of data workers are wasting time every week because they are unsuccessful in their activities, as they face challenges such as lengthy data preparation processes and a lack of collaboration. If organizations can't attack the data and analytical talent gap head-on, they will increasingly be buried under rising data volumes, complexity and an incomplete understanding as to whether their workflows are doing the job they want.
Without a productive workforce, organizations simply cannot proceed to tackle the technical challenges existing in a data-driven industry, such as reversing the inconsistencies and set-backs with data-led AI projects. With the right analytics platform, data capabilities can be put in the hands of the business experts who not only have the context of the problems to solve but the data sources needed to deliver insights quickly and efficiently. By alleviating data workers of some of the mundane, day-to-day tasks that are consistently clogging up their to-do lists, more time can be allocated to pushing through large-scale AI projects.
A primer on migrating SQL Server 2008/2008 R2 databases to the Azure cloud


System and database administrators are now being forced to do something about legacy SQL Server 2008 and 2008 R2 database applications. The reason is the end of Extended Support in July 2019. Extended Support will also end for its common companion Windows Server 2008 and 2008 R2 in January 2020. Upgrading to the latest versions is always an option, of course, but Microsoft is providing an attractive alternative when upgrades are not viable or cannot be cost-justified: Migrate the database to the Azure cloud and get three more years of Extended Security Update support at no additional charge over the standard virtual machine pricing.
This article highlights important considerations for migrating mission-critical legacy SQL Server 2008/R2 databases to the Azure cloud to help administrators make more informed decisions. Among the key considerations is knowing which options are and are not available.
The hidden costs of third-party data breaches -- and how to avoid them


Recent studies show that third-party data breaches are the most expensive cyber incidents for businesses today. The rise in associated costs has prompted not only security leadership but also executives and boards to pay close attention to the cyber risk that comes with doing business with their biggest vendors and partners. But what many business leaders don’t realize is that the biggest third-party cyber risks can come from the smallest, most seemingly innocuous places.
Take, for example, the Docker Hub cyberattack that took place this past May. While in the grand scheme a given business ecosystem, Docker Hub’s role -- a container used by developers to store image files -- is small, the extent of the damage to its customers was not.
Geekbench 5 arrives, offers new CPU and GPU benchmarks


Primate Labs has announced the release of Geekbench 5.0 for desktop, Android (later this week) and iOS. Geekbench 5 makes huge changes to the way it benchmarks your CPU and GPU, as well as going 64-bit and Windows 10 only.
Other changes include a brand new Dark Mode (confusingly, currently macOS only with iOS 13 to follow, but not for Windows 10) and a 50 percent launch sale if you were considering upgrading.
GDPR and Brexit -- Is your cloud provider ready for the UK 'being treated like a third country'?


The UK government has always maintained that following Brexit, the European Union’s General Data Protection Regulation (GDPR) will be absorbed into UK law. This means that there will be no material changes to the data protection rules that organizations in the UK will need to follow.
However, the French data protection regulator has recently said that in the event of a no-deal Brexit and absence of an adequacy decision, it will treat the UK like any other country that is outside the European Economic Area. In other words, it will treat the UK as a "third country." It’s likely that other EU country regulators will take this approach too -- and such decisions have legal implications for organizations.
Global growth is driving a fundamental shift in enterprise IT


Organizations are going global and their infrastructures, thanks to the cloud, are going global as well. Today, mid-sized and even small companies are doing business on a global stage. Whether this global growth takes place by opening new offices or by acquiring them, one of the thorniest challenges is enabling collaboration between them, because it requires sharing large, unstructured data and application files across vast distances. And this task only becomes more complex and difficult as both files and the number of people who need to work with them simultaneously grow larger. This shift toward more companies going global creates a distinct need.
The traditional IT infrastructure -- one in which the corporate data center is located at the headquarters -- is not at all suited for providing collaboration with large files at scale. What's required is a new, disruptive technology category, with platforms that combine the control and performance of network attached storage (NAS) with the unlimited capacity and economy of the cloud.
Four great summer reads for technology executives


As a co-founder of a digital health startup, my daily reading list typically consists of industry news. When I have some downtime, however, I tend to lean towards books that will help me grow as a leader or run our business better.
Below are four books for tech execs that are looking for advice, insight or inspiration this summer:
Can digital identity verification save the sharing economy?


With online sharing services (such as Uber, Airbnb and TaskRabbit) expected to be utilized by 86.5 million people by 2021, it is evident that the sharing economy is now mainstream. However, this$335 billion market is challenged by trust and safety concerns. Without trust, the sharing economy will not reach its full potential, and the only way to establish this trust is through digital identity verification to ensure users and providers in the sharing economy are who they claim to be.
Trust is required for the sharing economy to thrive -- the expectation that all parties are who they say they are and are operating in good faith. When hiring a worker from TaskRabbit, consumers trust the individual has been properly vetted. When a consumer orders a special occasion outfit from Rent the Runway, users trust it will arrive on time and in good condition. Users of the sharing economy trust that the company has verified the identities of its providers (e.g., drivers, delivery people, hosts, freelancers) and that their services are reliable and safe. Likewise, providers have faith that new users have passed some sort of identity verification before being accepted onto the sharing platform. When this trust is broken -- as we’ve seen on Craigslist,GoFundMe and elsewhere -- it cannot be easily repaired.
IObit Uninstaller 9 adds a powerful install monitor


Although we handle support for novice software customers, there’s one area that often leaves us perplexed. Why does software manage to leave so much data on your computer after you run the official uninstaller?
It should be straightforward, right? You install software, uninstall and the entire process should remove the components, registry entries, startup modules and upgrade flashes. But often they fail. We still get warnings about software being out-of-date that we uninstalled months ago and even a tool from a well-known brand offering us an upgrade. Try and locate the source of these issues and they are often hidden deep in your registry or other hard to find locations.
Do businesses rely too much on cloud computing?


The cloud computing industry has seen huge growth in the past nine years, considerably more so than what was anticipated. In 2018, as many as 96 percent of businesses utilized it in some way.
In 2010, the cloud computing industry was worth approximately $24.50 billion. Now, in 2019, it is worth over $100 billion, and it keeps on growing. It's predicted that by the time 2020 rolls around, the industry will be worth a massive $150 billion!
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.