Latest Technology News

Google launches YouTube channel for Chinese-speaking developers -- 谷歌开发者视频中文频道

The Earth is one place, where all human beings are family. True, we may use a different language or live in different countries, but we are all equal. In America, for instance, there is no official language; English is most popular, but it's not written in stone as the one true language. The USA is a melting pot, where all languages and cultures are celebrated.

China in particular, is a big contributor to the world of technology; both for hardware and software. Whether a developer is Chinese and residing in China, or an American that speaks only Chinese, Google has found a great way to show respect and support; the Chinese Google Developers YouTube channel.

Continue reading

Worldwide Equation Group hid undetectable spyware on hard drives

Worldwide Equation Group hid undetectable spyware on hard drives

In a new twist to the on-going NSA story, security firm Kaspersky Lab has discovered that a threat actor of previously unknown complexity and sophistication has been embedding surveillance software on hard drives produced by a number of well-known manufacturers. With names such as Western Digital, Seagate and Toshiba mentioned, and the reach of the spy program stretching to dozens of countries, it's not clear quite how many people may be affected.

Although Kapersky does not go as far as naming the NSA, or even specifying which country is responsible for the advanced surveillance, it seems that the spying campaign is somehow related to Stuxnet -- the tool used by the NSA to attack Iran -- and the Flame group.

Continue reading

I was wrong about the smartwatch being a dumb idea

Over the holiday weekend, I started using the Moto 360, which user experience is way better than anticipated. For all the nutcases calling Apple Watch innovative and revolutionary—without there even being a device for them to test—Android Wear is, ah, timely. Google gives great utility that will be difficult for the fruit-logo company to match. Reasons are simple: Context, search, sync, UI design, and Google Now.

I resisted the smartwatch concept for having been there before. Few of the gadget geeks gushing about wearables are old enough to remember Microsoft SPOT. Mid-last decade, the company partnered with real watchmakers (Fossil, Suunto, and Swatch); the devices were as much jewelry as functional timepieces; FM radio delivered appointments, news, weather, and other alerts independent of cell phones; and battery life lasted three days or more (which wasn't enough). By these measures, SPOT watches were so much more and still failed. Hence, these are reasons why in past analyses I called the decade-later attempt dumb. But I was wrong.

Continue reading

Microsoft leads the way with adoption of first international cloud privacy standard

Private cloud

The gradual push of just about everything to the cloud means that security and privacy are of greater concern than ever before. This is true for everyone who makes use of cloud services like OneDrive and Azure, but it is of particular interest to enterprise customers.

Today Microsoft has become the first major cloud service provider to adopt ISO/IEC 27018, the world’s first international standard for cloud privacy. The idea is to ensure that there is a global standard that determines how personal data privacy is handled in the cloud. The standard equips people with a number of assurances.

Continue reading

Did you buy the Raspberry Pi 2? Here are 5 things to do first [How-to guide]

The first generation Raspberry Pi was a rousing success; its low cost and potential captured the imaginations of many. For $35, you could not only buy an inexpensive computer, but be a part of something. In other words, the Raspberry Pi community is so vast and plentiful, that ownership gains access to countless projects.

The Raspberry Pi 2 is now here, however, and it ups the ante even further. This new generation Pi is six times more powerful than the original, while retaining the same $35 price tag. Buying one is a no-brainer, but if you do purchase it, it may be confusing as to what you should do first. Don't worry, we've got your back; here are 5 things you should do.

Continue reading

Malware on the increase as Android and Windows battle for 'most infected' top spot

According to a new report from telecommunication company Alcatel-Lucent's Motive Security Labs security threats to mobile and residential devices and attacks on communications networks all rose in 2014.

It estimates that 16 million mobile devices worldwide have been infected by malware. It also points out many retail cyber-security breaches in 2014 were the result of malware infections on cash registers or point-of-sale terminals, not online stores, so shopping offline isn't guaranteed to keep your details safe.

Continue reading

LG announces Watch Urbane: Stylish, all-metal Android Wear smartwatch

When designing smartwatches, manufacturers tend to miss what makes plain old watches attractive. So they come up with products that look overly geeky, have short battery life, and feel too fragile. Motorola is the only one to have come close to an appealing design with its Moto 360, but it, sadly, missed the mark in other areas.

With the newly-announced Watch Urbane, LG gives the impression that it too understands that smartwatches have to look great, first of all, and then woo us with all the bells and whistles that come with the software. But does it also nail the other bits?

Continue reading

Error Lookup converts PC error codes to text descriptions

Windows error messages are never exactly clear, and Windows Update is a particular offender. One common alert complains that "Windows could not search for new updates", displaying the cryptic code: "80072EE2". Which it then helpfully translates as "Windows Update encountered an unknown error".

Error Lookup is a portable free tool which can help by translating error codes into a (hopefully) more meaningful text description.

Continue reading

Did the NSA spy on you and pass information to GCHQ in the UK? Here's how to find out

It is just about impossible to be an internet user without being aware of the surveillance that has been carried out by the NSA; cheers for the tip, Mr Snowden. While it was the NSA's activities that hit the headlines, governments in other countries used -- and continue to use -- similar surveillance techniques and even share information between each other.

We already know that GCHQ believes that online privacy has never been an absolute right, but this does not change the fact that data sharing between the NSA and GCHQ was illegal before December. Now Privacy International, one of the organizations opposed to such spying, has launched a campaign to help people find out if GCHQ illegally received information about them from the NSA.

Continue reading

Netrunner 15 'Prometheus' is here -- the best KDE-based Linux distro gets better

I'm a GNOME 3 man through and through, but I love KDE too. Quite frankly, you can't go wrong with either desktop environment, but if you are new to Linux, KDE may seem a bit more familiar. Why? It more resembles the traditional "Windows" user interface.

What makes Netrunner the best KDE-based Linux distribution, and one of the best distros overall, is the polish. The team behind it pays close attention to detail, making it a cohesive and positive user experience. It comes pre-loaded with plenty of software and it is drop-dead gorgeous. Today, you can download version 15, codenamed "Prometheus". The most exciting aspect? It has been redesigned and comes with KDE Plasma Desktop 5.2 -- yeah, you want this.

Continue reading

UserIdleStarter runs programs when your PC is idle

UserIdleStarter is a Windows console program which runs an application when your system is idle, maybe to back up files, launch or close an application, anything you like.

The program syntax is fairly straightforward. An example command might look like this.

Continue reading

Valve blocks talk of Kickass Torrents in Steam chat

Valve blocks talk of Kickass Torrents in Steam chat

If you want to chat about the relative merits of Kickass Torrents, it seems that Steam chat is not the place to do it. The censoring of words deemed offensive is nothing new, but gamers have found that any messages they post which included references to Kickass Torrents or the URL http://kickass.so are stripped.

Like the Pirate Bay, Kickass Torrents has fallen victim to domain name seizures, but even though the site has been taken offline, it would appear that Steam does not want its users to discuss it. A ban on mentioning the site has been described by some gamers as "covert censorship".

Continue reading

New FAA rules could ground Amazon's package delivery drones, require operators to get certified

Drones for Good -- transporting transplant organs, detecting landmines and wiping out fog

We always knew that the US government would have a very tough time stopping civilians from using drones -- formally known as unmanned aerial vehicles (UAVs). First of all, they are easily available and can be had for very little money. You can order one today from Amazon for less than $100. And, second, flying does not require the operator to have any special skills, as proven by numerous videos posted by enthusiasts all across YouTube.

So, instead of taking on that Herculean task, the Federal Aviation Administration has come up with a proposed set of rules that aim to regulate the use of small UAVs, weighing less than 55 lbs (or 25 kg), by the civilian sector. And under this new set of rules, Amazon might have to ground its package delivery drones for good. What's more, operators will have to meet certain requirements just to get theirs up from the ground.

Continue reading

Security concerns will determine which Internet of Things products come to market

The Internet of things (IoT) will overhaul the way in which we use technology and its proliferation will offer endless advantages from being able to turn on your washing when you are in the office to alerting your doctor that your heart rate has risen.

However, the premise of connecting all things to the Internet carries with it a corollary statement; everything that can be connected to the Internet can be hacked which raises a host of security questions.

Continue reading

CIOs are being held back by their focus on details

Chief Information Officer (CIO) is usually seen as a plum role in technology organizations. But new information from search specialist Lucidworks reveals that day-to-day responsibilities are holding back CIOs from driving innovation.

Some 25 percent of CIOs are solely responsible for leading tech-driven innovation at their organizations, but most of their time is being taken up with problem solving and troubleshooting.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.