Latest Technology News

New motion predictive technology aims to improve user experience

Motion interface

Most current user interfaces rely on some form of two-step interaction, point and click, or tap and lift, or press and hold for example.

The latest development from Quantum Interface promises to deliver a more seamless experience by using predictive navigation to infer user choices before they're made.

Continue reading

Microsoft officially buys Wunderlist -- continues making great moves

Cheshire_cross-platorm_image@2x-640x340

Microsoft's turnaround under Satya Nadella is both striking and awe-inspiring. For a while there, Microsoft was seemingly uncool, Windows 8 was despised and the company's mobile presence was horrid. Now? Microsoft is arguably cooler than both Apple and Google, Windows 10 looks to be its best operating system ever, and it has an arsenal of great cross-platform apps, such as Office, Skype, OneNote and Outlook.

Today, Microsoft continues its impressive upward trajectory and acquires one of the best to-do services available -- Wunderlist.

Continue reading

5 things to consider before outsourcing

Business mobile devices

In today’s fast-paced business world, driving efficiency is often at the heart of growth plans. When thoroughly planned, outsourcing plays a vital role in ensuring productivity is high, enabling managers to focus on business development and disruptive innovation.

However, some organizations cause irreparable damage to their business by outsourcing too early, while others risk falling behind to more innovative competitors by ignoring the opportunities available; and some companies outsource the wrong mix of activities. It’s unclear whether this balancing act is why the outsourcing market in the UK declined in Q1 compared to the same period last year, although it could also imply a wariness to trust third parties with internal business processes.

Continue reading

BQ Aquaris E5 HD Ubuntu Edition smartphone is here

ubue5

When a consumer is ready to buy a new smartphone, they primarily have two options -- iPhone or Android. While both of those options are great, a duopoly can be harmful to consumers. Having more options is preferable. True, Windows Phone, BlackBerry, and Firefox OS are options, but hardly lighting the world on fire. Can any mobile platform truly compete?

For many, Ubuntu is the light at the end of the tunnel. Whether it will ultimately be a success is unknown, but it certainly has a chance. Today, the latest and greatest phone running Canonical's operating system is released -- the BQ Aquaris E5 HD Ubuntu Edition.

Continue reading

How hiring IT equipment can help business growth

Equipment

Purchasing IT equipment is an expense for any company, big or small. But you don’t always have to make big purchases in order to supply your employees with the means to do their jobs properly.

A lot of companies, especially SMEs and new startups will make the most of IT hire companies. With these suppliers, you can hire everything from laptops and desktops to printers and iPads. With such a vast selection of choice you can be sure your company will have all the IT equipment they could ever need without spending large amounts of money. And the benefits of hiring your IT equipment don’t stop there. Hiring IT equipment can actually help your business grow. And if you’re curious as to how it can do that, then we suggest you read on.

Continue reading

Cloud storage survey highlights governance and security concerns

Secure cloud

New research by cloud storage specialist CTERA Networks highlights the challenges that enterprises face in providing cloud storage and file sharing services, while reducing IT costs and maintaining security and data control.

It shows that security of data remains a major issue with 35 percent of organizations experiencing corporate data leakage in 2014 as a result of employees sharing files via often-unsanctioned file sync and share (FSS) services, a four percent increase over 2013.

Continue reading

Cyber theft could lead to another financial crisis

Mobile cash

In the digital age, money is rapidly evolving into lines of computer code which can easily be hacked, ransomed or stolen by organized criminal gangs (OCGs).

While computerized digital transactions have been instrumental in promoting international commerce and the creation of what is becoming a global economy, they come with a price. The fact that much of the world’s wealth is now stored on computer servers means that this wealth can be stolen or ransomed by cyber criminals. There are also fears that cyber terrorists, possibly state activists in the pay of a foreign power, might simply wipe all records of a significant proportion of the West’s wealth in order to create economic chaos and a financial meltdown.

Continue reading

Consumers want personalized offers but don't want to share data

Geo-location marketing shopping

Consumers love getting personal, timely and relevant offers from retailers but they don't like having to share the data that makes them possible.

This is one of the main findings of new research by predictive marketing and consumer intelligence specialist Boxever. Of 507 consumers surveyed more than 60 percent indicated they prefer offers that are targeted to where they are and what they are doing, but 62 percent said that they don't want retailers tracking their location.

Continue reading

SUPER 2015 gets H.265 support

SUPER200-175

ERightSoft’s veteran encoder SUPER has been updated to build 65 with new support for playing and encoding HEVC/H.265 4K video streams.

There’s no extra work involved to make this happen. Just choose an Output Video Codec as usual, and HEVC/H.265 appears in the "may not play on QuickTime" list for any appropriate container.

Continue reading

Organizations take too long to fix security vulnerabilities

Security time bomb

A new study from threat prediction and remediation specialist NopSec reveals key security vulnerability issues and highlights the length of time it takes for enterprises to fix problems.

NopSec analyzed more than 65,000 vulnerabilities contained in the National Vulnerability Database over a 20-year period, as well as a subset of more than 21,000 of those vulnerabilities identified across customers in all industries.

Continue reading

Explore the innards of any file with Binary Viewer

BinaryViewer200-175

You’ve found a strange file. Maybe it has no extension. Perhaps it’s an unexpected email attachment. Could it be malware? You’d like to see what it contains. Sounds like a case for Binary Viewer.

This free program is a tiny download, with no installation required, and if you’ve ever used a hex editor you’ll immediately feel at home. Open your target file, it’s displayed in the usual Hex/ ASCII views, and you can browse the contents as required.

Continue reading

New big data platform helps with security analytics and forensics

Hacker detection

Cyber attacks are becoming more covert which helps them to consistently evade detection and means they can take weeks to uncover.

Cyber security startup Niara is unveiling its Security Intelligence Solution, combining advanced security analytics and forensics to help security teams quickly find sophisticated cyber threats within their organization.

Continue reading

How to minimize your company's driving costs

Driving Navigation Car Driver

Tracking business costs can be a murky job, especially when it comes to driving. With so many variables and potential accidents on and off the road, it is hard to see where and how money can be saved.

A recent study by Nestle highlights this. The chocolate maker calculated that it needed to sell 235 million KitKats just to cover the costs incurred through road accidents across Europe.

Continue reading

Intel announces new fifth-generation 'Broadwell' Core i7, i5 processors

Intel announces new fifth-generation, Broadwell, Core i5 and i7 processors at Computex 2015

Computex 2015 is well underway. So far, we have talked about the most-interesting new products that ASUS and SanDisk have unveiled, taking a look at Transformer Book T100HA, EeeBook E403SA, ZenWatch 2, and the Extreme 900 portable SSDs.

And now it is Intel's turn to woo us with its new products. The US chip maker today announced 10 fifth-generation (more commonly known as Broadwell family) Core processors, for desktops and laptops -- part of the mid-range i5 and high-end i7 lines. Also new are five professional Xeon E3 solutions.

Continue reading

Self-driving cars are vulnerable to hacker attacks

Man in a self-driving car, no hands on the steering wheel

Here’s an interesting prospect: You’re sitting comfortably in your autonomous vehicle, minding your own business, reading your favorite news site on your fancy new tablet, when all of a sudden -- your car hits a wall and you end up in intensive care for the rest of the month.

Cause? A hacker broke into your car and made it accelerate instead of brake, when it encountered an obstacle on the road.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.