BetaNews Staff

Welcoming PWAs: Apple now supports service workers on Safari

Apple logo on MacBook

With Safari 11.1, Apple will introduce service workers to both macOS and iOS. Service workers are a crucial ingredient for Progressive Web Apps and will, therefore, bring a host of new capabilities and features to developers and Apple fans.

Google has been a big supporter for quite some time, but until recently, it looked like Apple was not on board. It seemed Apple would use it to draw a line in the sand between how it was going to do things and how Google wanted things to go. Apple introducing service workers to their OS platforms is beneficial to everyone, from business owners and developers to everyday app users.

Continue reading

How tech companies have created a massive content problem

Fake news on a mobile phone

When you wake up in the morning and read the news, or start consuming content, where’s the first place you turn? According to Pew Research Center, about 66 percent of adults who use Facebook on a regular basis get their news there primarily -- nd 40 percent of adults, in total, rely on Facebook as a primary source of news. If you don’t check Facebook as a primary source, you probably use Google searches to find news and content -- or at least to supplement your primary channel.

For the most part, search engines, social media sites, and news aggregation platforms have worked wonders for society. They make it faster and easier than ever to read new information -- mostly for free -- and have only grown in popularity over the years. However, they’ve also created a massive problem -- and one that isn’t easy to fix.

Continue reading

Remote monitoring software O&O Syspectr is now free of charge

Nearly every company deploys network monitoring tools which enable the IT team to keep a constant eye on remote servers. Downtime costs money.

Of course, network monitoring isn’t limited to remote servers. It can be used to manage your local network and that’s why a tool such as O&O Software’s O&O Syspectr can come in handy. You can use this tool to remotely manage PCs on your network, automatically deploy software updates, check drives for potential issues, remotely shut down and check for unauthorized access.

Continue reading

The preparations you need to make ahead of GDPR

Keyboard with GDPR date

GDPR is only a few months away, and a lot of the coverage has focused on the impact the regulation will have on the IT and finance departments in businesses. Whilst it’s true that GDPR compliance should be driven largely by finance and IT departments, there’s more to it than that.

One area where there’s little clarity is whether businesses are required to hire more staff. The Data Protection Officer (DPO) role is covered in the regulation document, but many argue it’s unclear whether this is necessary for their business; Privacy International comments that the bill is "unnecessarily complex".

Continue reading

Start and manage a new business from your smartphone with these four essential apps

The way we view work has changed hugely in the last few years, with everyone keen to do their own thing, start a business or simply become the 'next big thing' online.

Either way, there’s a shift to self-employment and being your own boss and being able to work from just about any location. With flexibility in mind, what are the best apps you can use on your smartphone to start and maintain your new business?

Continue reading

Google Trips will help plan your travel with the minimum of hassle

We’re not sure about you, but just planning your next vacation seems to take as long as the vacation itself. You want to make sure you visit the best places, eat at recommended restaurants and make the most of the destination.

It’s hard to find a comprehensive app which contains everything you might need to plan your route, timeline and distances from your hotel. If you’re on a tight schedule, say a weekend away in a new city, it’s really hard to get this route wrong and walk long distances to get to your destination.

Continue reading

5G is coming: Here's how carriers can prepare

5g smartphone

Technology’s rapid advance continues, requiring companies to adjust quickly to keep pace. And with the arrival of 5G, businesses can anticipate even more rapid change beginning this year. In fact, it’s predicted that by 2025, 5G will make up 99 percent of all broadband carriers and have over 2.6 billion subscribers -- or one-in-five mobile connections worldwide.

If these numbers sound overwhelming, you’re not alone. Carriers around the globe need to prepare themselves for 5G to transform the way they service customers. But thankfully, with these three easy tips, any carrier can get ahead of the game and be ready for 5G to take the industry by storm.

Continue reading

Five things you're doing that are compromising your online safety

Just as we work to improve our physical health and well-being, it’s also vitally important to improve our cyber health and keep ourselves safe from online danger.

Here, on Safer Internet Day, are five easy fixes to keep yourself cyber safe this year:

Continue reading

Do you still partition your drive? Paragon Partition Manager 16 Free makes partitioning a breeze

It’s a valid question. In 2018, how many people buy a brand new drive and then partition it, splitting the drive into smaller chunks?

There’s a reason why this is beneficial. You could store your photos on a single partition and then simply backup the entire partition. Assigning a drive letter to each partition can improve productivity. If you know all your work is on your "V:" drive, then it simply makes it easier to locate the drive and find your files.

Continue reading

Is it time to consider Emsisoft Anti-Malware 2018?

There’s so much negative press about 'mature' security software from the likes of Kaspersky, maybe it’s time to consider an alternative? And it’s not limited to Kaspersky. Brands such as Norton have been questioned recently by allowing Russian authorities to examine source code for potential backdoors.

In our experience, people avoid change and often only seek an alternative when their system (somewhat ironically) is compromised. Little do people know that they are actually fewer daily threats than they realize, unless you spend the day downloading dodgy software or looking at rogue websites, your everyday computing experience will be trouble-free.

Continue reading

Why blockchain is the real star of the cryptocurrency boom

Bitcoin remains one of the hottest financial topics of the last several years. The digital currency grew from less than $1,000 per coin at the start of 2017, to nearly $20,000 by the end of the year.

The buzz around Bitcoin continues to grow despite high volatility -- including a 50 percent drop between December and January -- and condemnation from figures like Warren Buffet who call it a "fraud." But how is it being used? And most important, what value does it really hold as an investment?

Continue reading

Become your own landscape designer by using Garden Planner

If you have a large garden in need of a re-design, this can end up costing far more than you realize. Factor in a landscape designer, hiring a horticulturist and builders to lay paving flags, the costs soon add up.

You might be tempted to tackle this yourself. Problem is, you still need to hire a designer to interpret your ideas and, frankly, this might not save you much money at all.

Continue reading

How cybercriminals are attacking machine learning

Machine learning (ML) is getting a lot of attention these days. Search engines that autocomplete, sophisticated Uber transportation scheduling and recommendations from social sites and online storefronts are just a few of the daily events that ML technologies make possible.

Cybersecurity is another area where ML is having a big impact and providing many benefits. For instance, ML can help security analysts shorten response times and dramatically improve accuracy when deciding if a security alert is an actual threat or just a benign anomaly. Many view ML as the primary answer to help save organizations from the severe shortage of skilled security professionals, and the best tool to protect companies from future data breaches.

Continue reading

Add an additional layer of security with Acronis Ransomware Protection Free

Many of us rely on free basic security, thinking that it offers comprehensive protection against the latest threats. Indeed, many free security tools do not include real-time protection, only running on demand.

With the rise of ransomware, it’s proving to be an easy way to obtain a quick release fee from individuals. No-one wants to lose their data and, if you work from home, you cannot afford to spend time trying to recover your data or paying for a professional to fix your PC. Many will pay the ransom to secure their encrypted data.

Continue reading

How secure are your documents?

Does your business or department still work with paper documents? In the information age, this practice has become profoundly anachronistic and usually a sign of business practices being left in the dust by the wheel of progress. Some companies do it because they’re afraid that making a change will disrupt the flow of business, others don’t want to retrain everyone and a few tell themselves that physical documents are more secure than an online document management system. If your reason is that last one, you could be falling for one of the most common security mistakes in the business world.

Among network and security professionals, the idea that avoiding well-traveled security methods and tools leads to a more secure system is a well-known logical fallacy called "Security through Obscurity." While paper documents and locked filing cabinets used to be the mainstream way, now holding out against digitization not only makes you an anachronism, it could be putting your private information at unnecessary risk.

Continue reading

© 1998-2018 BetaNews, Inc. All Rights Reserved. Privacy Policy.