BYOA: Challenges and opportunities


The bring your own access (BYOA) movement has presented a number of challenges and opportunities to IT leaders in recent years. Since the dawn of the smartphone, the consumerization of IT has left CIOs fighting to keep up with the latest trends in productivity, communication and creativity apps.
Driven by simple user interfaces and the promise of fast synchronization across devices, business users have flocked away from the typical corporate IT stacks and begun to pick and choose their own tools, often without the consent of IT.
Best Windows apps this week


Two-hundred-and-six in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 on Windows Store in the past seven days.
Another week, another Windows 10 Insider Preview build. Wayne has you covered this time.
OSForensics 4.0 ends free version


PassMark Software has unveiled OSForensics 4, a major update for its powerful PC forensics tool. There’s bad news: the "free for personal use" edition has been replaced by a 30-day trial.
The trial has more than enough power to run one or two quick investigations, though, and the latest additions deliver even more information about your target PC.
What you need to know about business process automation


Automation means many different things, in the context of business it usually involves streamlining processes in order to reduce costs. Applied across the whole organization it means restructuring resources and integrating the applications used across the enterprise to save time and money.
Business process automation (BPA) automation is aimed at those tasks that involve a series of processes which follow a predictable pattern with a series of repeated operations. As research specialist Gartner puts it, "It focuses on 'run the business' as opposed to 'count the business' types of automation efforts and often deals with event-driven, mission-critical, core processes. BPA usually supports an enterprise’s knowledge workers in satisfying the needs of its many constituencies".
What you need to know about human capital management


Employees are often a company’s largest expense, but they can also be their most important asset. After all, without talented and dedicated staff at every level of the business, organizations will fall behind in terms of productivity, leadership and creativity. Although human resources has traditionally been tasked with handling all matters people-related, as this facet of business management has become increasingly complex and dynamic it has largely gone by another name.
Human capital management (HCM) is often broken down into three categories (workforce acquisition, workforce management and workforce optimisation) and incorporates a vast array of business processes, ranging from the administrative to the strategic. Increasingly, businesses are looking to human capital management to ensure they get the most from their employees,
How to buy the Nintendo Entertainment System: NES Classic today


While many people covet powerful current-generation consoles like Xbox One and PlayStation 4, others are more excited for something far less modern. Tomorrow, nostalgia takes front stage as Nintendo Entertainment System: NES Classic will hit store shelves.
Planning to buy one? Ha! Good luck. This refreshed 1980's console is expected to be both extremely popular and limited. Quite frankly, it will be virtually impossible to get. After all, it comes pre-loaded with 30 classic games. There will be many sad nerds this year when they find out there is no NES Classic under the Christmas Tree. Don't panic, however, as BetaNews has some tips for you.
No more Microsoft Security Bulletins after January 2017


Microsoft has a long tradition of publishing Security Bulletins to share information about patches and security fixes that it releases. But starting next year this is going to change.
As of February 2017, Microsoft will make use of the newly launched Security Updates Guide database. This, on the face of it, sounds like a great idea -- a searchable database of information -- but it changes the way information is presented and is unlikely to be well-received by users.
Google flatly denies claims that Android has hurt competition -- quite the reverse


Google's battle with the European Commission has raged on for many years, and the company has faced frequent accusations of anti-competitive behavior for one reason or another. Today the Android producer has hit back at the European claims, saying that the existence of iOS is proof that its own mobile operating system is not anti-competitive.
Senior vice president of Google, Kent Walker, writes on the company blog that "Android is not a 'one way street'; it's a multi-lane highway of choice". He also points to the fact that the cost of smartphones running Android has dropped dramatically over the years, but one of his primary arguments against the anti-competitive claims is that phone manufacturers are free to use Android in whatever way they want.
WTF?! Twitter saw a significant rise in swearing following Trump's win in US election


If you spend a lot of time on social networks like Facebook and Twitter, you probably thought Hillary Clinton was a shoo-in for president, and that Donald Trump had next to no chance of beating her.
As my colleague Ian Barker explains, social networks can create something of a bubble, that pops when the real world intrudes, as it did in both Brexit and the US election.
Why you need to know who owns your encryption keys [Q&A]


As companies move more of their data to the cloud it's not surprising that they’re turning to encryption in order to keep their data safe.
But if you're using a third-party cloud provider, who owns and controls the keys to your encrypted data? Rui Biscaia, director of product management at data classification specialist Watchful Software believes it's vital for companies to know.
What you need to know about converged infrastructure


Information technology infrastructure is made up of many components, servers, storage, networking hardware, systems management software, and more. This can lead to a complex system being built up of components from several different suppliers.
What converged infrastructure does is to bring together all of these things into a single, integrated package. For businesses this means that they can centralize the management of all their IT resources with a view to increasing use and cutting costs. Converged infrastructure is often associated with the cloud and outsourcing, but it can work just as well applied internally within large organizations too.
Watch Edward Snowden discuss Trump's victory, and privacy implications, in a live Q&A today


It’s fair to say, yesterday’s US election result sent shockwaves around the world. Donald Trump was seen as an outside bet by many people, but now he’s won the race for the White House, the big question, is what will his victory mean for the people, both at home and abroad?
Former NSA contractor turned whistleblower Edward Snowden has a lot to say on government matters, and today in a live Q&A he’ll be opining on how the US election results could affect your privacy, as well as any potential pardon for himself, and answering questions submitted via social media.
Malicious spam levels hit two year high


A new report from Kaspersky Lab reveals that its products blocked 73,066,751 attempts to attack users with malicious attachments during the third quarter of this year.
This represents the largest amount of malicious spam since the beginning of 2014 and is a 37 percent increase compared to the previous quarter. The majority of the blocked attachments were ransomware trojan downloaders.
Microsoft patches Windows flaw reported by Google


Microsoft has kept its promise and delivered a vulnerability patch for its Windows operating system, for a flaw, revealed by Google, which allowed attackers to gain full control of a targeted system.
Releasing the details in a security bulletin, Microsoft says the flaw in the Windows kernel "could allow elevation of privilege if an attack logs onto an affected system and runs a specially crafted application that could exploit the vulnerabilities".
How social media bubbles are driving political anger


How could Donald Trump be elected president? Judging by Facebook and Twitter a lot of people are asking that question this week. The same thing happened in the UK back in June when many people struggled to understand how the country could have voted for Brexit.
When everyone you're friends with online reinforces your world view it's easy to convince yourself that most of the world thinks as you do. It comes as a bit of an awakening therefore to discover it isn't the case and that -- shock! -- there may be people who vote that aren't even on social media at all.
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.