BetaNews Staff

Fujitsu and Oracle unveil new servers with 'world's highest per CPU core performance'

fujitsu sparc m12-2s

Fujitsu and Oracle have teamed up to deliver new, ulta-fast servers, as they give cloud computing and digital transformation another push forward. Named SPARC M12, these servers come equipped with an all-new SPARC64 XII processor.

Fujitsu claims this processor allows the SPARC M12 server to "achieve the world's highest per CPU core performance."

Continue reading

Security researchers uncover new global cyber espionage campaign

espionage hacker thief black hat

There is a new, global cyber espionage campaign, and this one demonstrates a "new level of maturity." This is according to a new report by PwC and BAE, released after consultation with other cyber security experts, including the UK's National Cyber Security Center.

The report claims this new cyber espionage campaign targets businesses through managed services IT providers.

Continue reading

We'll create 163ZB of data by 2025

data magnifier

The amount of data we are about to create in the next eight years will swell up to 163ZB, according to a new Seagate report. That is also ten times as much as we have created last year.

Interesting (and quite expected) thing is that it’s not the consumers that will create all this data, but businesses instead.

Continue reading

Choose your cloud strategy carefully

Clouds

As shown by disruptive businesses such as Airbnb, cloud computing is changing the face of business as we know it. Organizations of all sizes anywhere can now harness the power of cloud-based tools to innovate and collaborate faster and more seamlessly than ever before.

Cloud is becoming the foundation for digital transformation, enabling enterprises to manage the pressure of increasing the pace of their production cycles and boosting collaboration throughout the world. McKinsey estimates that by 2018, more than half (51 percent) of enterprises will adopt cloud as their primary IT environment -- up from just 10 percent in 2015. Indeed, it is no longer often a question of "if" but rather "which" cloud services enterprises should use.

Continue reading

One in three ransomware victims suffer data loss

data loss

Users are generally unaware of the dangers of ransomware attacks, and that makes them mostly clueless about how to prepare for one. This is according to a new report by Acronis.

The report is based on a survey conducted in the US, UK, Australia, Germany, France and Japan. With users being as they are, ransomware was quick to become one of the most serious malware threats out there. It is expected that $5 billion will be extorted this year, alone.

Continue reading

IT modernization leads to lower costs and higher revenue

Business mobile devices

IT modernization is essential to addressing the needs of modern digital businesses, according to a new report by Avanade. The report is based on a poll of 800 IT decision makers in organizations scattered all over the world.

On average, IT decision makers believe that by modernizing IT, they could boost their company’s revenue by as much as 14 percent. That’s almost $1 billion a year, Avanade says.

Continue reading

Next public safety networks will use 4G LTE

4G LTE sign yellow

AT&T has been chosen for a very lucrative contract, to build and manage a nationwide public safety network for first responders in the US.

Ingo Flomer, Public Safety product manager at Cobham Wireless, says the network itself won't be operational this year but rather in 2018. "Although there will not be an operational LTE public safety network in place this year, it is likely that the standards and regulations will be implemented in advance of a possible 2018 deployment."

Continue reading

Ghost in the Shell: How much can it get right?

robots

The new Hollywood sci-fi blockbuster Ghost in the Shell imagines 2029, a world where cyber terrorists hack into people’s digitally enhanced minds and where cyborgs have crises of identity. So, how much has it got right? Is this the future?

Should we be concerned that our cybernetic development, already constantly on-boarding new connected technology, will reach a point where our brains become both infected and controlled by rabid self-willed robots? Well, probably not just yet. But the question is there -- should we countenance such a dystopian scenario? Of course we should.

Continue reading

Connected devices can easily do cyber attackers' bidding

Network security

Connected cameras, vending machines or light bulbs were the vectors of the latest cyber-attacks. It is just the beginning of a long list of Internet of Things that will be used by hackers to take down businesses or steal data. But who should be blamed for this new situation?

We heard about the promise of a better life when everything will be connected to it. We trusted it because we loved the idea of having an easier life and access to more services at the same time. Manufacturers also saw a huge opportunity in that trend for new business, so everybody was happy.

Continue reading

Citrix launches Receiver client for Samsung Galaxy S8 DeX

Citrix

Citrix wants a part of that tasty Samsung Galaxy S8 DeX cake, and it just announced a new software client to make sure it gets it.

The newly announced Citrix Receiver is a free to download client which allows users fast access to XenDesktop and XenApp installations. The client allows users to access applications, desktops and data easily and securely, the company says.

Continue reading

Security researchers uncover phishing attack with very high success rate

Phishing

A new and "very aggressive" airline phishing attack was just spotted, and it's one with such a high success rate that even security experts are baffled. It was spotted by Barracuda, and it says that this new attack has a success rate of 90 percent.

The attack combines impersonation, advanced persistent threats and phishing, giving the attackers long-term stealth access to a myriad corporate networks.

Continue reading

Many UK businesses cancelled GDPR preparations due to Brexit

facepalm head

Here's a facepalm moment for you this morning -- a quarter of UK businesses stopped preparing for the GDPR thinking the regulation won't apply once the UK leaves the EU.

The GDPR, or General Data Protection Regulation, has been ratified by the UK and will come into force on May 2018 -- which will almost certainly be before the UK leaves the EU.

Continue reading

Tech Deals: Protect your privacy with these great VPN offers, plus amazing savings on new PCs

hero 0331

Why pay full price for a new laptop, desktop PC, or Kindle, when you can get one for a fraction of the cost?

Courtesy of our partners at TechBargains we have yet another selection of superb deals to tempt you. Offers include fantastic savings on new ASUS, Acer, Dell, and HP laptop and desktop PCs, Kindle eReaders, VPN services, and much more.

Continue reading

Managing BYOD: Best practices

BYOD bring your own device

BYOD is dying. It’s not that people no longer bring devices to work. It’s that everyone brings their devices to work. Whether you use BYOx (bring your own everything) to describe this phenomenon or some other term, there are important concerns to be addressed.

For example, will you be providing devices to all employees, some employees (e.g., managers and executives) or no employees? How will user-owned devices connect to the network and how do you ensure personal and corporate data separation? What about company-owned devices and who owns, and thus has free access to, the data stored on them? And what happens when a device with company data or the ability to connect to the company network is stolen?

Continue reading

Welcome to the 'post-app era'

Smartphone apps

How often do you use apps? You probably open a handful on a daily or even hourly basis. You probably ignore the rest.

You’re not alone. Gartner research shows that users from the US, UK and China used just six to 10 apps each month in 2016. This represents a six percent year-on-year decrease and has led Gartner to declare the "post-app era."

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.