Hub It: An essential, fully customizable sync and charging station for all your devices [Review]

Hubit1

Many of us own multiple devices that charge or are powered via USB. Even though many PCs come with at least two or four USB ports these days, and USB charging adapters that plug into wall sockets are commonplace, that may not be enough. In other words, you may occasionally find yourself needing to charge something, without a spare USB port, or a cable for the task -- especially if you live in a house with teenagers. If all devices used Micro USB life would be simpler, but sadly, they do not.

This is where Hub It comes in. It's a powered sync and charging station that can power/charge up to seven items simultaneously, and includes connectors for all of your devices, including smartphones, tablets, iPhones and iPads, and digital cameras.

Continue reading

TeamViewer 10 promises better performance, improves collaborative tools

teamviewer-200x175

TeamViewer GBMH has released TeamViewer 10, its free-for-personal-use remote control software for Windows, Mac and Linux. Also available in portable form for Windows users, the new app boasts a host of new features, improvements and a redesign for good measure.

Chief among the changes are performance optimizations designed to take full advantage of multi-core processors. These include the promise of faster login times, better HD voice transmission quality and improved performance overall.

Continue reading

HP announces EliteBook Folio 1020 and 1020 SE -- the thinnest and lightest business laptops

ManusingHPEliteBook1020

When you are issued a business laptop from your employer, it is often clunky and ugly. Of course, it gets the job done, but it is depressing to use a boring machine in the office, but then go home to use a nicer one. In other words, business-class laptops can be yawn-worthy, but they do not have to be.

Luckily, HP subscribes to this way of thinking. Yes, the firm also produces clunky business laptops, but today, it is announcing a machine that we have been waiting for. The all-new EliteBook Folio 1020 is both the thinnest and lightest business-class laptop in the world.

Continue reading

Real world experiences of bare metal recovery

Disk backup

Bare metal recovery (BMR), restoring a machine with no requirement for operating systems or software to be present beforehand, isn't always seen as a reliable technique.

To look at how successful it really is, cloud backup and disaster recovery specialist Zetta.net has released the results of a survey looking at companies’ real world experience of BMR.

Continue reading

Certified True Randomizers: let one app make all your decisions

Certified200-175

Left, or right? Chicken, or fish? Where are we going next?

Life is full of decisions. Some you’ll want to think about, carefully evaluate and discuss. But if they’re not so important -- or you’d just prefer a more surprising life -- then you could let your phone choose the outcome, with a little help from Certified True Randomizers.

Continue reading

New call center technology adapts to visually impaired employees

call center

Meeting the needs of employees to access systems is an important consideration for any modern business. Now, cloud-based call enter systems provider TCN is making its technology accessible for the visually impaired.

Its Platform 3 Vocal Vision product is optimized to work with Job Access with Speech (JAWS) technology and allows visually impaired call center agents to effectively navigate TCN's cloud-based contact center suite, helping to improve agent productivity while also creating new employment opportunities for the visually impaired.

Continue reading

OnePlus One launches in India

OnePlus_One_800x450_contentfullwidth

Chinese smartphone vendor OnePlus just launched its One flagship in India, where it is available to purchase exclusively through the local arm of retailer Amazon. Prospective buyers are only able to scoop up the top-of-the-line 64 GB version of the smartphone, as the lesser 16 GB model is nowhere to be seen at this stage.

OnePlus appears to be committed to the Indian market, as it says that it has already set up a service network of 25 walk-in centers for its prospective local customers. Speaking of customers, the number of local buyers who will be able to buy One is still controlled by OnePlus, as the company is continuing to enforce its invite-only system.

Continue reading

Sony hack leads to unreleased movies leaking online

Sony-logo-header.jpeg

A number of unreleased movies, as well as some confidential data, has been leaked online following a massive hack at Sony Pictures that happened last week.

In the Reddit thread covering the issue it says that, movies aside, confidential data including visa and passport information of cast and crew members working on different Sony projects, email inboxes and other important documents were leaked.

Continue reading

TV 3.0 is already here

PhilcoRetroTV

Ethernet inventor Bob Metcalfe, when I worked for him 20 years ago, taught me that we tend to over-estimate change in the short term and under-estimate it in the long term. So it can be pretty obvious what is coming but not at all obvious when. And what we know about the when of it is that making money from new technologies is often a matter of investing right before that bend upward in the hockey stick of exponential change.

We all know television is bound to enter a new era sooner or later. Heck, I’ve written dozens of columns on the subject over my 17 years in this job. But this is the first time I feel confident in saying when this TV transition will take place. It already has. Forces are already in motion that will completely transform TV over the next 24 months. Come back two years from today and it will all be different with at least a few new leaders and a few icons gone bust. Get ready for TV 3.0.

Continue reading

View and convert EPS/ PS files with EPS Viewer

EPSViewer200-175

Adobe’s Encapsulated PostScript (EPS) is a powerful graphics format which first appeared almost 30 years ago, so you might have expected there to be plenty of viewers around by now. But no: it’s so horribly complex that most image viewers either ignore the format entirely, or offer basic support, but with very unreliable results.

There are specialist tools which claim they’re different. The free EPS Viewer not only displays EPS/ PS files, but can also convert them to a few bitmap formats (JPEG, PNG, GIF, TIFF). Is it really better than the leading image viewers, though? We grabbed a test copy.

Continue reading

Microsoft Research thinks Haven might be the answer to cloud storage security problems

secure_cloud

Storing your data in the cloud requires you to place trust in a company and its service. Whether you're talking about Dropbox, Google Drive or an enterprise level solution, security is of paramount importance. There have been numerous high profile cases in recent months in which data breaches have occurred and private data has been accessed by unauthorized people -- including the NSA et al. It's little wonder that many people are wary of moving entirely to the cloud.

But Microsoft Research may have a solution. A small team of researchers came up with the idea of Haven, a cloud system that introduces the idea of shielded execution. This is a platform designed not just for storing data, but also to securely run cloud-based applications, including those based on legacy code.

Continue reading

Microsoft replaces Office clip art and image library with Bing Image Search

resrinpeec

If you have ever created or sat through a PowerPoint presentation for work, or created a report for school lately, you've surely seen or used clip art. There is nothing inherently wrong with using images to enhance a presentation or document, but the clip art in Office has been downright terrible. The images are typically outdated and cliched examples of business life, drawn by artists who likely came straight from hell (I kid -- actually, I bet they are very nice people).

Today, we may have finally seen the last of these horrid Pablo Picasso-esque nightmares, as Microsoft kills the Office clip art and image library. This is surely a time for celebration, but you are probably wondering where you will get images for your next quarterly presentation. No worries, Microsoft will now be directing users of Office to Bing Image Search instead.

Continue reading

Student registrations open for Google Code-In 2014

Student registrations open for Google Code-In 2014

Google Code-In has been running for a few years now and serves as a platform for promoting the importance of programming and computer science to students. The current batch of computing student represents the next breed of app coders, website designers and computer experts. Google is keen to encourage teenagers to get involved and today is the day that registrations open for Google Code-In 2014.

One of the aims of the event is to promote the open source community, and encourage 13-17 year olds to get involved in whatever way they can. Google Code-In is a contest but it has been set up in such a way that it simulates working on a real-world open source project.

Continue reading

StatCounter: Windows 8.1 is now more popular than XP

Win8 vs xp

It still has plenty of haters, but Windows 8.1 is finally finding an audience. It may not be anywhere near as sizable as the audience Windows 7 commands, but after losing usage share earlier in the year, the tiled OS is finally headed in the right direction, and at speed.

Earlier today I reported on NetMarketShare’s figures which show Windows 8.1 as having 12.10 percent of the desktop OS market, but now StatCounter has released its own figures which show Windows 8.1 as having just hit a pretty special milestone -- overtaking Windows XP for the first time.

Continue reading

Does your company need an Intrusion Detection System?

security

Unauthorized access to networks is currently one of the most serious threats to the hosting business. Intruders and viruses present the two biggest security threats to the industry. Let us examine three key definitions: intruders (or hackers), intrusion, which is a formal term for describing the act of compromising a network or system, and Intrusion Detection Systems, which help business detect when they are vulnerable to an attack.

Intruders can be external or internal and their intents may vary from benign to serious. Statistically 80 percent of security breaches are committed by internal users and these are by far the most difficult to detect and prevent. These intruders create a significant issue for network systems and IT equipment. Intruders come in a variety of classes with a varying level of competence -- an external user without authorized access to the system will want to penetrate the system to exploit legitimate user accounts to access data, programs or resources with a purpose of misuse. Intruders may even use compromised systems to launch attacks.

Continue reading

Load More Articles