Latest Technology News

Two key challenges of using open source in the enterprise

open source

A myriad point-tools are involved in every organization's software production. Some of our enterprise customers report using over 50 tools along their pipeline, from code development all the way to releasing into production. For the majority of development organizations today, these tools are comprised of a mix of commercial and open source technologies.

Existing open source tools can be found throughout your software development and operations teams -- from programming languages, infrastructure and technology stacks, development and test tools, project management and bug tracking, source control management, CI, configuration management, and more.

Continue reading

Google enters the landline business with Fiber Phone

Google has its tentacles wrapped around many things. Not only does it dominate search, and provide the most popular mobile operating system with Android, but it is also an ISP with Fiber and a cellular provider with Project Fi. If it involves the movement, collection, or analysis of data, the search giant seems interested.

With so many people owning smartphones nowadays, you'd expect landline service to be going the way of the dodo bird, but there are many reasons to have it, such as dependability in an emergency. Today, Google is surprisingly entering the landline business with the VoIP-powered Fiber Phone. No, it is not an early April Fool's Day joke, folks -- it is the real McCoy.

Continue reading

How to mitigate ransomware risks

Ransomware has already caused businesses real trouble this year and recently, security firms have warned about a sudden surge in junk mail messages containing this kind of malware. It seems that organized criminals are now increasingly targeting businesses, which can offer them bigger returns than going after individuals.

The first wave of ransomware started in 2005 and was called Trojan.Gpcoder. Now the security industry (and many unfortunate users) are discovering new variants almost every day. For example, a strain called Locky, discovered only two weeks ago is now the second most prevalent form. Currently, it asks for three Bitcoins (about £885) as payment for the decryption key.

Continue reading

The implications of remote working for GDPR compliance

remote work

Every day across the UK, around 1.5 million professionals work from home; and are more productive, happier in their role, and measurably less stressed, perhaps. At the same time, however, they may be increasing the risk to your sensitive business data.

Since the government has recently given all employees the right to request flexible working, the number of home-workers, and the associated information risk, looks set to increase -- just when the stricter EU General Data Protection Regulations (GDPR) are set to come into force.

Continue reading

Fedora 24 Alpha Linux distribution now available with GNOME 3.20

If you are a big GNOME fan -- like me -- then there is one distribution you must try -- Fedora. The Linux-based operating system -- the same that Linus Torvalds uses -- is a great way to have a vanilla GNOME experience. Desktop environment aside, it is also both stable and fairly cutting-edge, offering modern packages and kernels.

Today, Fedora 24 reaches public Alpha -- you can download it now. While using an Alpha operating system on your main computer is probably not a great idea, there is one specific thing that makes such an early version very attractive -- GNOME 3.20. While the ISO does not contain the final version of 3.20, you can update to final immediately after installation by using either Software or DNF in terminal. Huzzah!

Continue reading

7 words to never use in your emails and their replacements

It is estimated that in 2014, 191.4 billion emails were sent and received each day with about 108 billion of those being from the business sector. If you are a business owner, there’s a good chance that you’re a part of that ever-growing statistic. Emails are becoming one of the most common forms of communication between businesses and clients, so it makes sense that we brush up on our etiquette every so often.

With the knowledge that a few choice words could make or break your chances at making a potential connection or client, it’s safe to assume that just about everyone wants to avoid these costly word mistakes.

Continue reading

Master & Dynamic MH40 headphones [review]

Newcomer is the only way to describe Master & Dynamic, which on Dec. 31, 2015 completed its first full year of revenue. Young or not, its audio gear is vintage and refined. Wanna see? You can find the MH40 headphones, which look like something World War II bomber pilots would wear, inside any Apple Store. Distribution partnership of that caliber from a near start-up says much about M&D earphones and headphones—design, price, and sound.

The signature sound is full, which is atypical in a market where booming bass ranks among headphone buyers’ top priorities. But for those listeners who delight in the faintest tap of the symbol, warmest treble, and deep lows that reveal details rather than thump, thump, Master & Dynamic delivers. For Christmas I bought the company’s MW60 wireless headphones, which I will review soon. Today's topic is the MH40, which are wired.

Continue reading

Acer Chromebook 14 has aluminum body, 14-inch screen, and up to 14 hours of battery life

When it comes time to name a device, a marketing team usually gets involved. Many monikers are thrown about, often with a number designation that signals screen size, generation, or something else altogether. The Nexus 6 is based on screen size, iPad naming is sometimes based on generation, and the Xbox One -- well, who knows what Microsoft was thinking with its third console!

Today, Acer announces its newest Chrome OS laptop, the Chromebook 14. I know what you are thinking -- 14 inch screen, right? You would be correct -- that is the size of the display. While that is the obvious inspiration for the name, the number 14 is significant in another way too. You see, the Acer Chromebook 14 features up to 14 hours of battery life. While that is impressive, Acer has one more trick up its sleeve too.

Continue reading

Xiaomi launches Redmi 3 Pro with fingerprint reader at less than $140

Xiaomi is one of the first brands that spring to mind when we talk about affordable smartphones today. That's because the Chinese maker has come up with some highly attractive devices which feature very impressive specs at more than reasonable price points. A good example is its new Redmi 3 Pro.

At less than $140 (RMB 899), the new Redmi 3 Pro features a premium build, large, high-resolution display, fast processor, lots of RAM and storage, bit battery, competitive cameras, but also a fingerprint sensor, which is a feature that is typically seen on much more expensive smartphones.

Continue reading

New service addresses security concerns in Microsoft SCCM environments

Enterprise security

Potential security vulnerabilities in Microsoft SCCM (System Center Configuration Manager) environments are a concern for 70 percent of IT professionals, according to a new survey, with 65 percent planning to conduct an SCCM security review in the next year.

The results of the study of more than 150 professionals by security company Adaptiva have been released to coincide with its launch, along with Windows Management Experts, of a new security auditing service for SCCM users.

Continue reading

A closer look at Bitdefender's new free ransomware security tool

Bitdefender Labs has released BDAntiRansomware, a free tool which keeps your PC safe from some of the most common ransomware threats.

The program "protects against known and possible future versions of the CTB-Locker, Locky and TeslaCrypt crypto ransomware families", the company explains.

Continue reading

The biggest barriers to adopting BYOD

BYOD key

Thanks to the benefits that it offers in terms of productivity and employee satisfaction, BYOD remains a popular option for many companies and the market is predicted to be worth $360 billion by 2020.

But a new report from Crowd Research Partners in conjunction with some leading data security vendors -- including Bitglass, Blancco Technology Group, Check Point Technologies, Skycure, SnoopWall and Tenable Network Security --provides a conflicting portrayal of BYOD security barriers and adoption trends in the workplace.

Continue reading

IT budgets will mostly go towards buying mobile devices, security

Business mobile devices

IT budgets for businesses in the US will be mostly spent on security, and mobile devices allowing employees remote working, a new survey has shown.

According to a new survey by Wakefield, 30 percent of US businesses will spend most of their IT budgets on network and data security, and 28 percent will spend it on mobile devices allowing employees to work remotely.

Continue reading

Bitdefender's new tool protects against ransomware

Ransomware eye

Ransomware is the malware du jour, and each strain seems more vicious than the last. As with any virus variant, there is a game of cat and mouse played out between virus writers and security companies as each battles to outwit the other.

Trying to get ahead of the curve, Bitdefender has released a tool that offers protection against the likes of CTB-Locker, Locky and TeslaCrypt. When it comes to dealing with ransomware the advice, unfortunately, has become a case of either pay up, or revert to data backups. Alternatively, you could try prevention rather than cure, and Bitdefender's 'crypto-ransomware vaccine' could be what you've been looking for.

Continue reading

Apple responds to FBI iPhone hack, but questions remain

Yesterday, the FBI announced that it had managed to break into the San Bernardino shooter's iPhone sans help from Apple. The iPhone manufacturer will undoubtedly be pleased that the court case has come to an end without the company having to cave in and assist the agency.

In a statement, Apple said: "From the beginning, we objected to the FBI’s demand that Apple build a backdoor into the iPhone because we believed it was wrong and would set a dangerous precedent. As a result of the government’s dismissal, neither of these occurred. This case should never have been brought". But with the FBI's previous insistence that help from Apple was absolutely essential, some serious questions remain.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.