Yesterday, Microsoft released a new Windows 10 Insider Preview build for PCs. That version was Build 10166. Today, the software giant releases a new Windows 10 Mobile Insider Preview, with the same build number. Try not to get the two confused.
The new mobile build is rolling out to Windows Insiders on the Fast ring now, and like its PC number-sake, it offers lots of small changes and feature tweaks, although the focus is mostly now on improving stability and squashing bugs. The Mobile release won’t be happening any time soon, but Microsoft is clearly keen to get all of the major issues dealt with quickly.
We're only weeks away from the official launch of Windows 10, or, as some people may think of it, Microsoft's correction to the problems of its last operating system. That means OEMs are busy readying products to push to market for the big day, and HP is among them.
The company is announcing an entire portfolio of computers that are designed to run this new operating system, though not all will ship with it.
If game designers opt for a male protagonist thinking it would make it easier to tap into the predominantly male gaming audience, then they’re in for a nasty surprise.
A recent study conducted by Time has shown that most boys don’t really care which gender the main character is, as well as that they’re aware that women are underrepresented in video games.
Data is the most important and valuable thing in the world. Diamonds and gold are just rocks in the ground by comparison. Want proof? Look at Google. Collecting information and storing data creates power and has huge value.
The problem with data, however, is that it only has value when it tells a story. In other words, you have to actually use the data you collect at some point. You can have giant SQL tables full of the secrets of the universe, but you need to be able to utilize and share it. Tableau is a popular visualization solution in the data analysis world, but it is clunky and confusing. Microsoft's solution, Power BI, looks much more promising and useful. Today, the company announces that it is exiting Preview and will be generally available on July 24th.
Something that many Windows Phone users have been asking for is a little flexibility with how apps are downloaded and installed. One particular request is the ability to download apps using a PC rather than with a handset. A new tool leaked by a Microsoft employee makes this possible.
The appropriately-named Windows Phone Assistant is an official Microsoft tool that has been used internally. Nawzil released the software in response to a series of requests from people, granting greater control over apps. The leaked tool is available for anyone to download -- you just need to be running Windows Phone 8.1 GDR 2.
Security researchers at Symantec have discovered that a number of well-known hacking collectives are actually highly trained independent groups targeting large corporations for financial gain.
The likes of Apple, Facebook and Twitter have all faced cyberattacks in the past and it is now thought that this is only viable if the information that is acquired is then sold or traded through some "financial market".
Twitter acted quickly to remove two Vines advertising the network's #DiscoverMusic campaign after warnings from an epilepsy charity. Epilepsy Action advised Twitter that the two ads could be dangerous to those suffering from photosensitive epilepsy.
The charity made a public appeal to Twitter in a tweet, and the company was fast to respond. Communications director Rachel Bremer thanked Epilepsy Action for drawing attention to the ads which were removed. The epilepsy charity was not alone in sending warnings to Twitter -- quite a few concerned tweeters got in touch with the company to point out the problem.
Mobirise is a free cross-platform WYSIWYG web designer which makes it easy to build mobile-friendly, Bootstrap 3-based websites.
The interface is stripped back, more like an app than a regular desktop program. There’s no complex menu system, no hidden right-click options, just a few buttons to click and panels to explore.
The NSA has released a network security tool that it claims is designed to help organizations "fortify their networks against cyber attacks". But, after being revealed to be spying on just about anyone it wants to, from US citizens to leaders of allied governments, while undermining major tech firms in the process, IT administrators will likely be very skeptical of adopting it.
Seemingly to put security concerns to rest, the security tool is made available through GitHub, making it easy for security researchers to analyze the code and find weaknesses -- of any kind -- that could put networks at risk.
A new survey reveals that shoppers are not forgiving of their favorite retailers or brands when their mobile apps aren't working as they should. According to the results 70 percent of consumers say the performance of a mobile app impacts their perception of the retailer.
The survey by application intelligence specialist AppDynamics spoke to 4,000 smartphone and tablet owners in the UK, US, France and Germany. It shows that 20 percent admit to making purchases on their phone while at work in front of their computer.
Moore's Law, the rule describing the steady growth of computing power, seems to have been under threat of late. But work by an alliance led by IBM research could see it safe for a few years yet.
Researchers have produced the first 7nm (nanometre -- one billionth of a meter) test chips. What does this mean? Current chips have components with a width of 14 or 20nm so a 7nm chip will allow many more components to be included.
Edinburgh council was the target of a cyberattack this week, and the details of more than 13,000 email addresses were stolen. The council was quick to issue a warning to all those who have an account with the authority, saying they might experience an increase in spam and phishing.
It said: "We are taking this incident very seriously. We have made sure that our service providers have reinforced the security of our website and we will continue to monitor security regularly".
Browse the "Effects" or "Filters" section of most image editors and you’ll often find tools which try to convert your pictures into sketches, oil paintings and more. But they’re usually basic, short on configuration options, and don’t deliver great results.
AKVIS OilPaint (and 64-bit) is a commercial tool for Windows and Mac which specializes in transforming your images into works of art. It’s expensive -- $49 to $89, depending on the license -- but the 10-day trial is full and unrestricted, so if you’re interested in the idea then there’s enough to justify the download.
Since Microsoft gave us a glimpse of its immersive HoloLens headset, there has been much pondering about just what to expect from the unit. Until we get an opportunity to go hands on with the new virtual reality cum augmented reality device, we're largely reliant on second hand information about what the experience of using HoloLens is like.
Microsoft has released new footage of HoloLens in action including an almost-first-person perspective that gives an idea of what it's like to wear. What's interesting to note is that, despite the promises of an immersive experience, the field of vision is rather smaller than many people will have expected.
Regardless of whether you’ve been hit with ransomware or not, protecting your network from these types of attacks is now an integral part of any network security framework for both individuals and companies. Protecting yourself from intrusions and attacks requires securing your main layers of defense by utilizing Security Awareness Training and antivirus/anti-phishing software.
If you consider a computer network (even a simple one, like your home computer) to consist of a series of layers that any malware or virus needs to penetrate, the outermost layer would consist of your users themselves. After all, it takes a user’s interaction in order to initiate or allow a network intrusion. Only AFTER a user has clicked or visited a malicious link, will your secondary and tertiary layers (firewalls and antivirus) come into play. Thus, the very first layer you will need to harden is that of the human operator. It is only in recent years that the importance of this layer of security has come to be recognized. In the past, software has been relied upon as a catch-all for these types of situations. Software just by itself is not enough anymore, users must be trained to prevent such attacks from happening in the first place.