Latest Technology News

A closer look at the Never 10 automatic upgrades disabler for Windows 7, Windows 8.x

Never 10 is a new freeware tool which aims to prevent Windows 7 and Windows 8.x systems from automatically updating to Windows 10. Sounds like a host of other recent update-blockers, we thought -- but no. It’s more interesting than that.

First up, it’s written by veteran developer Steve Gibson, the man behind SpinRite, ShieldsUp! and assorted early Windows freeware, and someone who knows what he’s doing. If you need more reassurance, the 81KB download size tells you there’s no adware here, no extra payload.

Continue reading

Is IBM guilty of age discrimination? -- Part one

Is IBM guilty of age discrimination in its recent huge layoff of US workers? Frankly I don’t know. But I know how to find out, and this is part one of that process. Part two will follow on Friday.

Here’s what I need you to do. If you are a US IBMer age 40 or older who is part of the current Resource Action you have the right under Section 201, Subsection H of the Older Worker Benefit Protection Act of 1990 (OWBPA) to request information from IBM on which employees were involved in the RA and their ages and which employees were not selected and their ages.

Continue reading

The benefits and challenges of building a hybrid cloud

The growth of cloud computing over the last decade has been unprecedented. From a relatively unheard-of concept, the cloud has become a key part of the boardroom conversation amongst CIOs and IT directors at companies across industries, sizes, and revenues for its promise of organizational transformation.

A large amount of enterprises have already built their own private cloud networks, hosting essential applications and providing anywhere, anytime access to mission critical data for employees scattered across the world. In many cases, the effort pays off, resulting in increased productivity, reduced costs and ease of access.

Continue reading

AT&T announces hardcore and rugged Unite Explore 4G LTE mobile Wi-Fi hotspot

Most smartphones can double as Wi-Fi hotspots nowadays -- depending on your cellular plan, of course. For instance, I have an unlimited data plan from Verizon that prevents me from using the hotspot functionality of my iPhone. In order to get that feature working, I'd have to move to a tiered plan -- they'd have to pry my unlimited plan from my cold, dead hands. A dedicated hotspot device is my best option.

Even if you can use the hotspot feature on your phone, you may still want to opt for a dedicated device. Why? It won't drain your phone's battery and might offer better performance. Today, AT&T announces a hardcore and rugged hotspot called the Unite Explore. It even doubles as a battery pack to charge your devices!

Continue reading

Google enables cloud-based image search saving for desktop

Some say Bing is the best search engine for adult-themed image searches -- I wouldn't know. What I do know, however, is that Bing is the new integrated image search for Microsoft Office -- it works very well for that. With that said, Google is what I use most often. Since it is the search engine I use for text, I just go to it for images too -- it works brilliantly.

Today, Google is improving its desktop image search with a new cloud-based saving system. This mirrors the functionality found on mobile and enables a more robust way to "save" images you want to look at later. Rather than save the files locally, they are kept in the cloud -- sort of like a bookmark.

Continue reading

FBI cracks San Bernardino iPhone without help from Apple

The US justice department has announced that it has successfully cracked the iPhone belonging to the San Bernardino shooter, Syed Farook. The FBI was able to unlock the phone without help from Apple, ending the lawsuit that had pitted the FBI against Apple.

In a statement, the Justice Department said: "The government has now successfully accessed the data stored on Farook's iPhone and therefore no longer requires the assistance from Apple." It has been thought that Israeli security firm Cellebrite was helping the FBI, but the question now has to be asked about the security of other iPhones and whether law enforcement agencies will use the same technique to access data in the future.

Continue reading

Equity crowdfunding finally arrives May 15: Curb your enthusiasm

Back in the spring of 2012 Congress passed the Jumpstart Our Business Startups Act (the JOBS Act) to make it easier for small companies to raise capital. The act recognized that nearly all job creation in the US economy comes from new businesses and attempted to accelerate startups by creating whole new ways to fund them.

The act required the United States Securities and Exchange Commission (SEC) by the end of 2012 to come up with regulations to enable the centerpiece of the act, equity crowd funding, which would allow any legal US resident to become a venture capitalist. But the regulations weren’t finished by the end of 2012. They weren’t finished by the end of 2013, either, or 2014. The regulations were finally finished on October 30, 2015 -- 1033 days late.

Continue reading

Using the 'physical web' to boost in-store sales

Bricks and mortar businesses have been in the dark. They were blinkered to what was happening within their locations, and how customers were interacting with the space. There was huge potential to fail to engage with customers effectively, repeating marketing mistakes continuously.

Meanwhile, their online counterparts had a huge advantage -- website analytics. It gave them an expanse of data sources to explore. If they asked the right questions and found the answers, they could understand every step of their customers’ journeys. They could continually optimize their offer -- and give customers what they wanted.

Continue reading

Instagram follows Twitter in embracing non-chronological algorithmic timelines

Any time a social network makes a change, it upsets a lot of people. Facebook has done it countless times -- just look at the vocal outpourings that followed the launch of reactions, for instance -- and Twitter recently irked many users with a new algorithm timeline, albeit one that can be disabled. Now it's the turn of Instagram.

The image- and video-based social network is currently testing an algorithm-driven timeline, much like Twitter and Facebook. Instagrammers are not happy. Not one bit (hence the appearance of the #boycottinstagram hashtag). The primary concern among users -- the narcissistic blighters! -- is that their posts will not be seen and will instead be buried in the noise of their followers' timelines. But all is not lost.

Continue reading

BQ Aquarius M10 Ubuntu Edition Linux tablet now available for pre-order

While Linux remains insignificant on the desktop, it is the clear king of mobile thanks to Android. While the iPhone may generate more money, there are more Android handsets being sold globally.

Unfortunately, while Android uses the Linux kernel, the devices are usually not in line with the typical experience. Outside of Nexus devices, many users have to deal with locked bootloaders and the inability to install an alternative OS. Luckily, Android is not the only mobile Linux game in town -- Ubuntu can scale beautifully from smartphone, to tablet, to desktop. Today, the first official Ubuntu tablet -- BQ Aquarius M10 -- becomes available for pre-order, giving Google a run for its money.

Continue reading

Microsoft: First Windows 10 'China edition' is ready

It is not easy for Western tech companies to do business in China. The local government imposes all sorts of restrictions and makes various demands to allow outside players to operate in the country or use their products. Some companies give up altogether, by either exiting the market or not even attempting to enter it, while others try to accommodate China's requests.

When it comes to selling Windows 10 to China's government, Microsoft has taken the second route by agreeing to deliver a customized version of its latest operating system to the country's agencies. The deal was made public last year, in December, and the software giant just announced that a first -- China edition, if you will -- release is now ready.

Continue reading

Cubot X17 -- a premium smartphone at a budget price? [Review]

Cubot X17

Cubot is a name you may not have heard of, but the Chinese company is seeking to make an impact on the smartphone market with the X17, offering premium features at a more down market price of around $170 (£130).

First impressions are positive, the phone comes in a box with a textured bronze colored finish. In the package you get a USB cable, mains adaptor, SIM tray opening tool, a clip-on protective cover for the back, a spare screen protector -- there's one pre-installed -- and a printed quick start guide. You also get a couple of cleaning wipes which is a nice touch.

Continue reading

The importance of in-store mobile technology

Over the last decade we’ve seen a significant increase in mobile technology and it is now becoming the heart of customer experience; forcing retailers to figure out how the digital and physical relationships can work together.

Retailers must now decide whether to equip their personnel with mobile devices, introduce more self-service kiosks or expand mobile technology even further; all in the aid of delivering a personalized approach and improving the in-store experience for shoppers.

Continue reading

You could go to prison for sharing screenshots of Snapchat messages

The UK culture minister, Ed Vaizey, has warned that people who share screenshots of Snapchat messages without permission are breaking the law. Snapchat is characterized by its self-destructing messages that automatically delete after a short time.

The Conservative politician warned that anyone sharing screenshots of messages without consent could be sued and could face a prison sentence. If the content was of a sexual nature, it could result in a lengthier sentence.

Continue reading

New research helps isolate real threats from suspicious activity

insider threat

Security teams often spend a lot of their time investigating anomalies and suspicious behavior, leaving them less time to focus on true threats.

Cloud security specialist CloudLock is tackling this problem with research into what it calls a Cloud Threat Funnel. Based on analysis of user behavior patterns it can isolate truly malicious threats from the noise of other potentially suspicious or unusual behaviors.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.