Latest Technology News

Google's AI is reading love novels to give 'humanized' answers

Soon enough, you can expect Google’s AI to start sending you love letters. And judging by the information you are just about to read, those might be some of the best love letters ever written, in the history of robotkind. Or humankind. Or both, I guess.

Here’s what’s going on. Google says its AI engine’s answers to human questions are too factual. Imagine the answers as being purely robotic. Subject, predicate, adverbial clause. Google, on the other hand, wants those answers to be more human -- it wants the robot to be able to answer the same question in different words, to change the tone and personality from time to time.

Continue reading

Crowdsource your security knowledge: A simple guide to OWASP Top 10

security guards

Over the past two years, the Internet has seen some of the biggest, most devastating data breaches in history. With each attack, millions of personal identifiable information records are stolen, leading to the possibility of identity theft, banking fraud, and in some of the most notable cases, that's right -- divorce.

From an internet security standpoint, what’s most interesting about these data breaches isn’t the various celebrities naive enough to sign up for Ashley Madison with their real names but rather that these breaches often come from some of the most common methods hackers have for accessing data. Shouldn’t these common methods be the most widely protected against? That’s what a large portion of the internet security community believes, and that’s where the Open Web Application Security Project (OWASP) comes in. OWASP is an open-source security community that publishes the most common attacks to help developers keep their software from being the source of a critical (and possibly humiliating) breach. Keep reading to find out what OWASP’s Top 10 Project is as well as what those Top 10 actually are.

Continue reading

Stick to the script: 5 ways to keep your software development outsourcing on track

The good news -- you’ve found a software development team that you’re comfortable with and work well alongside. They fit so well into your company’s culture, you even begin to view them as you would any internal employee. While this is all well and good, it’s not to say that you won’t run into challenges along the way -- from day-to-day communication gaps to even uncertainties in tracking of overall progress. Certainly no relationship is perfect, but it falls within your job description as the project manager or product owner to ensure outsourced projects stay on track and more importantly -- within budget.

The following list of management tips and tricks of the trade should be put in place to help keep risks down to a minimum and your outsourced relationships performing at their best.

Continue reading

Microsoft predicts the Kentucky Derby winner -- will you use it to win money at OTB?

virtual grand national

My knowledge of horses doesn't extend much past watching Mr. Ed on "Nick at Nite" (Hello, Wilbur) as a kid. Equestrian activities are often reserved for the wealthy and gamblers -- two things I am not. I did go to OTB (Off-track betting) a couple of years ago to bet on a horse named after Tony Danza, but I digress.

One of the most popular horse racing events is the Kentucky Derby. Microsoft's Bing is now focusing its predictability-powers on it. Bing Predicts has been quite succesful in the past -- could this help folks win some money?

Continue reading

G.SKILL goes full rainbow-mode with new colors for Trident Z Series DDR4 RAM kits

Building a computer is extremely fun. In fact, for some folks -- including yours truly -- the build itself can sometimes be more enjoyable than using the computer! Getting to select the case, components, and color scheme is very rewarding.

When I say "color scheme", I am not just talking about the outward appearance. The design of the inside is important too -- sort of like art. Picking SATA cables, SSDs and RAM sticks with matching colors can create something beautiful -- especially if you have a window case. Today, one of my favorite RAM manufacturers, G.SKILL, announces five new colors for its Trident Z Series DDR4 RAM kits.

Continue reading

What you need to know about spear phishing

Phishing

Unlike spam or phishing emails, which involve a broad and varied range of targets, spear phishing is a highly-targeted email attack against a specific group, organization, or even person.

The main aim of a spear phishing attack is either to obtain unauthorized access to sensitive data, whether this is intellectual property, financial data, trade or military intelligence, or to get the recipient of the email to act on a command, whether this is to transfer money or share confidential data.

Continue reading

GoPro to launch Karma drone in Q4 2016

While GoPro has not revealed much information about its upcoming drone, called Karma, the company did say that we can expect to see it in stores this year. Question is, when?

If we are to go by its latest earnings report, GoPro is not in its best possible financial shape. For the first quarter of this year it just posted $183.53 million in revenue, down by 49.5 percent year-over-year, but also $107.45 million in net income losses, down by $741.5 percent year-over-year. This affects Karma's release date, but it should still make its public debut by the end of 2016, GoPro says.

Continue reading

US government certifies LG's G5, V10 for enterprise and military use

LG today announced that the US government has certified its G5 and V10 flagship Android smartphones for enterprise and military use. The testing was conducted by the National Information Assurance Partnership (NIAP), which verifies the compliance of products with the "Common Criteria" international security standard, which is said to be recognized by 25 countries.

Although LG is only boasting about the two aforementioned handsets, NIAP's test results show that G4, its flagship from last year, is also fit for use in enterprise and military sectors, when running Android 6.0 Marshmallow. NIAP's stamp of approval was received on April 14.

Continue reading

What's the most popular ransomware?

Ransomware eye

Ransomware is something like the digital version of Kanye West -- everyone hates it, but its popularity just keeps on growing. And it takes your money for things you really don’t want to buy.

The news about the rising popularity of ransomware was confirmed by security firm Kaspersky Lab, which released its quarterly report into the state of malware.

Continue reading

DevOps means Test Automation (too)

DevOps

You have started down the road to DevOps. You have re-structured your teams and you are experimenting with DevOps tools and processes. You now understand that DevOps is a continuum that starts with planning and development and ends with deployment into operations. So where do you start your DevOps initiative?

DevOps projects tend to start in only one part of the continuum. Often, DevOps teams start with application build automation (development) or they start with automating the deployment of apps into operations. When the driver for DevOps is in the test organization, it is called Continuous Integration. However, it is also important to work to continuously expand automation across the continuum because for DevOps to pay off, there needs to be continuous automation from development all the way through to operations.

Continue reading

Open source framework enables native mobile app development

developer

Although HTML5 has allowed apps to work across platforms, there's still demand for companies to develop native apps for the major mobile platforms.

Progress Software is launching the latest version of NativeScript, an open source framework on the Telerik platform, enabling developers to use JavaScript to build native mobile apps running on the major mobile systems.

Continue reading

EU GDPR: Get your data privacy act together

data privacy

The moment of reckoning is on its way for companies that collect or store data on European Union citizens. Last week EU legislators signed data privacy regulations into law, creating what may be the most stringent data protection law in place today. The requirements will not be easy for many companies to meet and will demand financial and personnel resources. There is sure to be criticism that the EU stifles technology innovation. In reality, the GDPR demonstrates a progressive approach to data transactions and the digital economy. The introduction of the regulation states, "The protection of natural persons in relation to the processing of personal data is a fundamental right…".

Essentially, the law codifies the concept that data transactions come with responsibility on the part of the collector. As technology continues to advance, establishing this foundation of trust is a necessary step. Complying with the regulation may seem onerous, but think from the consumer’s perspective. Organizations gather more data than ever. Huge headaches and hardships arise when data is  stolen or lost. The regulation puts in place best practices to ensure companies offer a necessary level of security and treat personal data with the respect it deserves.

Continue reading

Best Windows apps this week

One-hundred and seventy-nine in a series. Welcome to this week's overview of the best apps and games released for Windows 8.x and Windows 10 in the past seven days.

More and more full price games are coming to the Windows Store. This week alone saw the release of the long awaited Forza Motorsport 6: Apex, as well as Shadow Complex Remastered, and The Escapists: The Walking Dead.

Continue reading

Take, annotate, process and share your screenshots with Photon

Photon is a free PC screen capture tool for Windows Vista and later. The program’s core capture engine is basic, but good sharing support and some unusual processing options make it worth a closer look.

Install Photon, press PrtSc, and you’re prompted to draw a freehand rectangle. There’s no full screen capture type, no "active window", no ellipses or anything advanced, unfortunately (like we said, it’s basic).

Continue reading

Five ways to take your passwords to the next level

World Password Day is apparently a day for “taking our passwords to the next level”, so here are five traditions the crooks and password crackers really, really don’t want us to start.

In 2007, Dinei Florencio and Cormac Herley at Microsoft Research looked into the password habits of half a million users in their large-scale study of website password habits. They found that the average user needed about 25 distinct passwords but only had about six.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.