New motion predictive technology aims to improve user experience


Most current user interfaces rely on some form of two-step interaction, point and click, or tap and lift, or press and hold for example.
The latest development from Quantum Interface promises to deliver a more seamless experience by using predictive navigation to infer user choices before they're made.
Microsoft officially buys Wunderlist -- continues making great moves


Microsoft's turnaround under Satya Nadella is both striking and awe-inspiring. For a while there, Microsoft was seemingly uncool, Windows 8 was despised and the company's mobile presence was horrid. Now? Microsoft is arguably cooler than both Apple and Google, Windows 10 looks to be its best operating system ever, and it has an arsenal of great cross-platform apps, such as Office, Skype, OneNote and Outlook.
Today, Microsoft continues its impressive upward trajectory and acquires one of the best to-do services available -- Wunderlist.
5 things to consider before outsourcing


In today’s fast-paced business world, driving efficiency is often at the heart of growth plans. When thoroughly planned, outsourcing plays a vital role in ensuring productivity is high, enabling managers to focus on business development and disruptive innovation.
However, some organizations cause irreparable damage to their business by outsourcing too early, while others risk falling behind to more innovative competitors by ignoring the opportunities available; and some companies outsource the wrong mix of activities. It’s unclear whether this balancing act is why the outsourcing market in the UK declined in Q1 compared to the same period last year, although it could also imply a wariness to trust third parties with internal business processes.
BQ Aquaris E5 HD Ubuntu Edition smartphone is here


When a consumer is ready to buy a new smartphone, they primarily have two options -- iPhone or Android. While both of those options are great, a duopoly can be harmful to consumers. Having more options is preferable. True, Windows Phone, BlackBerry, and Firefox OS are options, but hardly lighting the world on fire. Can any mobile platform truly compete?
For many, Ubuntu is the light at the end of the tunnel. Whether it will ultimately be a success is unknown, but it certainly has a chance. Today, the latest and greatest phone running Canonical's operating system is released -- the BQ Aquaris E5 HD Ubuntu Edition.
How hiring IT equipment can help business growth


Purchasing IT equipment is an expense for any company, big or small. But you don’t always have to make big purchases in order to supply your employees with the means to do their jobs properly.
A lot of companies, especially SMEs and new startups will make the most of IT hire companies. With these suppliers, you can hire everything from laptops and desktops to printers and iPads. With such a vast selection of choice you can be sure your company will have all the IT equipment they could ever need without spending large amounts of money. And the benefits of hiring your IT equipment don’t stop there. Hiring IT equipment can actually help your business grow. And if you’re curious as to how it can do that, then we suggest you read on.
Cloud storage survey highlights governance and security concerns


New research by cloud storage specialist CTERA Networks highlights the challenges that enterprises face in providing cloud storage and file sharing services, while reducing IT costs and maintaining security and data control.
It shows that security of data remains a major issue with 35 percent of organizations experiencing corporate data leakage in 2014 as a result of employees sharing files via often-unsanctioned file sync and share (FSS) services, a four percent increase over 2013.
Cyber theft could lead to another financial crisis


In the digital age, money is rapidly evolving into lines of computer code which can easily be hacked, ransomed or stolen by organized criminal gangs (OCGs).
While computerized digital transactions have been instrumental in promoting international commerce and the creation of what is becoming a global economy, they come with a price. The fact that much of the world’s wealth is now stored on computer servers means that this wealth can be stolen or ransomed by cyber criminals. There are also fears that cyber terrorists, possibly state activists in the pay of a foreign power, might simply wipe all records of a significant proportion of the West’s wealth in order to create economic chaos and a financial meltdown.
Consumers want personalized offers but don't want to share data


Consumers love getting personal, timely and relevant offers from retailers but they don't like having to share the data that makes them possible.
This is one of the main findings of new research by predictive marketing and consumer intelligence specialist Boxever. Of 507 consumers surveyed more than 60 percent indicated they prefer offers that are targeted to where they are and what they are doing, but 62 percent said that they don't want retailers tracking their location.
SUPER 2015 gets H.265 support


ERightSoft’s veteran encoder SUPER has been updated to build 65 with new support for playing and encoding HEVC/H.265 4K video streams.
There’s no extra work involved to make this happen. Just choose an Output Video Codec as usual, and HEVC/H.265 appears in the "may not play on QuickTime" list for any appropriate container.
Organizations take too long to fix security vulnerabilities


A new study from threat prediction and remediation specialist NopSec reveals key security vulnerability issues and highlights the length of time it takes for enterprises to fix problems.
NopSec analyzed more than 65,000 vulnerabilities contained in the National Vulnerability Database over a 20-year period, as well as a subset of more than 21,000 of those vulnerabilities identified across customers in all industries.
Explore the innards of any file with Binary Viewer


You’ve found a strange file. Maybe it has no extension. Perhaps it’s an unexpected email attachment. Could it be malware? You’d like to see what it contains. Sounds like a case for Binary Viewer.
This free program is a tiny download, with no installation required, and if you’ve ever used a hex editor you’ll immediately feel at home. Open your target file, it’s displayed in the usual Hex/ ASCII views, and you can browse the contents as required.
New big data platform helps with security analytics and forensics


Cyber attacks are becoming more covert which helps them to consistently evade detection and means they can take weeks to uncover.
Cyber security startup Niara is unveiling its Security Intelligence Solution, combining advanced security analytics and forensics to help security teams quickly find sophisticated cyber threats within their organization.
How to minimize your company's driving costs


Tracking business costs can be a murky job, especially when it comes to driving. With so many variables and potential accidents on and off the road, it is hard to see where and how money can be saved.
A recent study by Nestle highlights this. The chocolate maker calculated that it needed to sell 235 million KitKats just to cover the costs incurred through road accidents across Europe.
Intel announces new fifth-generation 'Broadwell' Core i7, i5 processors


Computex 2015 is well underway. So far, we have talked about the most-interesting new products that ASUS and SanDisk have unveiled, taking a look at Transformer Book T100HA, EeeBook E403SA, ZenWatch 2, and the Extreme 900 portable SSDs.
And now it is Intel's turn to woo us with its new products. The US chip maker today announced 10 fifth-generation (more commonly known as Broadwell family) Core processors, for desktops and laptops -- part of the mid-range i5 and high-end i7 lines. Also new are five professional Xeon E3 solutions.
Self-driving cars are vulnerable to hacker attacks


Here’s an interesting prospect: You’re sitting comfortably in your autonomous vehicle, minding your own business, reading your favorite news site on your fancy new tablet, when all of a sudden -- your car hits a wall and you end up in intensive care for the rest of the month.
Cause? A hacker broke into your car and made it accelerate instead of brake, when it encountered an obstacle on the road.
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.