AI will make and break the job market


There’s a heated debate going on whether artificial intelligence will cause people to lose jobs or create new jobs instead. Well, IT consultancy firm Infosys has weighed in on the debate, releasing the results of its own survey.
Basically, the firm says jobs will be both lost and created, so workers should not be too worried as long as they’re willing to re-train. However, companies will have reasons to rejoice as AI will boost their revenue, significantly.
Outdated programs main cause for security incidents


Did you update Flash on your PC? How about Java? According to cybersecurity firm Avast, you probably didn't -- and that's the number one cause of cybersecurity incidents.
Avast just released a new report, entitled Avast PC Trends Report January 2017, which is based on insights from the company’s AVG TuneUp product, and says that more than half (52 percent) of the most popular PC applications have outdated installations on consumers' devices.
Insights on RCS and how it will replace SMS [Q&A]


Over the past 25 years, SMS text messaging has become the most personal and ubiquitous form of communication in the digital era. In fact, it hasn’t simply held its ground, it’s actually gained momentum -- with global consumers preferring to communicate with businesses through this intuitive channel. As technology continues to bolster SMS capabilities, a new form of mobile messaging known as Rich Communications Services (RCS) is making waves in the mobile revolution.
Leading the charge, OpenMarket has joined forces with Google to help businesses realize the full capabilities of RCS messaging for customer engagement. We caught up with its senior market development manager Oisin Lunny, to learn about the company’s recent partnership with Google and details on what’s fast becoming the next generation of A2P (application to person) texting -- RCS.
How the dark web creates a fraud pandemic


The statistics continue to chill. Two point three million estimated fraud victims in the UK alone in 2015 according to the ONS. 173,000 confirmed reports of identity theft amongst CiFas members (largely utilities and finance companies) in 2015.
From a consumer perspective the chances are that over a period of three to four years you are now more likely than not to be a victim of a successful fraudulent act of some kind.
CIA's internal hacking tools rival those of the NSA


Debate and discourse around WikiLeaks’ announcement about a series of leaks from the CIA continue unabated. Codenamed "Vault 7," WikiLeaks claims this is the largest classified information leak to have come from the CIA to date. Added to that, only one percent of documents have been made public so far.
From the leaked documents it’s become clear that the CIA has created its own internal hacking capabilities to rival that of the NSA. It may be more tactical than strategic -- but with exploit sets including Android, IoS, Samsung TVs, Linux, Mac, zero day attacks and more, it could certainly give the NSA a run for its money.
Businesses want rugged two-in-one devices


Organizations are very much interested in equipping their mobile workforce with detachables, according to a new report by Panasonic.
Released during CeBIT 2017, it says detachable devices with screens ranging from 12 to 13.3 inches are in the "sweet spot," when it comes to screen size. The second key element to a well-built device is ruggedization.
Building an Alexa Skill without using the SDK


Amazon has written a "Hello World" example for building an Alexa Skill. At first glance, it looks like just what you need to get into Alexa Skills development because it's short and clear. But take a second look and you'll notice it requires an external dependency.
It brings in the alexa-sdk npm package. I'll show that not only don't you need the alexa-sdk to teach Alexa a Skill but you might actually be better off without it.
A pioneer's guide to Alexa


Have you seen Star Trek? If you haven’t, you should. One of the pieces of future tech that is quietly on display throughout the show is the ability to talk to the computer. Whether it’s asking the computer where someone is or ordering a cup of earl grey tea, the computer has no problem understanding the questions it is asked, and who’s asking them.
Amazon’s Alexa products claim that they are this shining vision of the future! Not only that, you can write your own apps for the platform. Amazing! Right? Well, we’re not quite there yet. So, what are the challenges and limitations? Is there anything we can do to hack our way through the tough parts? Can we achieve our dreams even if we emerge a bit bloody and beaten? Let's find out.
Machine learning pays well in the UK


If you are a developer looking to earn some serious cash, you might want to consider becoming a machine learning specialist. According to a new report by Stack Overflow, entitled "Developer Hiring Landscape Report," machine learning specialists earn 24 percent more than what’s the average among developers on the British Isles.
That's £56,851 a year.
How to create your first Alexa skill


For the last couple of weeks, Graham, Marcel, Sinem and I, from Red Badger, have been experimenting with Amazon’s Alexa Echo Dot. An Electric Hockey Puck that uses voice recognition powered by Amazon Alexa voice assistant.
In this post, I’d like to explain how one goes about creating their first Alexa skill.
Why ethical hacking is the top job of 2017


61 percent of UK businesses believe they will suffer from cyber crime in 2017, according to new research from Mimecast. These anxieties are justified: two thirds of large UK businesses were targeted by cyber criminals last year.
As the threat posed by cyber crime increases, businesses now invest more than ever in training, technology and skills -- global cyber spending is predicted to reach $1 trillion by 2021.
What challenges do Industrie 4.0 projects face?


Algorithms are at the heartbeat of Industrie 4.0 projects, according to Gartner, and that’s going to result in 30 percent of Industrie 4.0 projects sourcing algorithms from leading algorithm marketplaces by 2020.
That means a jump of less than five per cent, compared to what we currently have in the market.
The role of IT decision makers in purchasing new technology


IT decision makers (ITDM) in the EMEA region serve as their company's "gatekeepers" and primary influencers, when it comes to choosing new technology purchases for the company. This is according to a new report by Spiceworks, which digs deeper into the roles of ITDMs and business decision makers (BDMs) when it comes to purchasing new technologies.
The study, "ITDM vs. BDM: Tech Purchase Superheroes," says BDM’s role is to "give final approval for technology funds and purchases."
5 things to keep in mind when building an Alexa skill


A team of us at Red Badger, which consisted of myself, Marcel, Graham and Roman, had two weeks to play around with Amazon’s Alexa and build a sommelier skill to recommend wine pairings to your food. We’re writing a four-part series to take you through what we learned from our varied perspectives.
There’s been so many blog posts written about the rise of chatbots and Voice User Interface (VUI), some even marking 2017 to be the year of the bots.
User-Agent based attacks are a low-key risk that shouldn't be overlooked


Old, unpatched vulnerabilities allow hackers to take over systems using the User-Agent string -- an elementary part of virtually every HTTP request.
It is a known fact that while the majority of vulnerabilities discovered or reported are fixed by the vendor and a patch is issued, many systems end up not being patched in a timely manner or even at all, for that matter. There are many possible reasons for that, the most common being:
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.