TeamViewer GBMH has released TeamViewer 10, its free-for-personal-use remote control software for Windows, Mac and Linux. Also available in portable form for Windows users, the new app boasts a host of new features, improvements and a redesign for good measure.
Chief among the changes are performance optimizations designed to take full advantage of multi-core processors. These include the promise of faster login times, better HD voice transmission quality and improved performance overall.
When you are issued a business laptop from your employer, it is often clunky and ugly. Of course, it gets the job done, but it is depressing to use a boring machine in the office, but then go home to use a nicer one. In other words, business-class laptops can be yawn-worthy, but they do not have to be.
Luckily, HP subscribes to this way of thinking. Yes, the firm also produces clunky business laptops, but today, it is announcing a machine that we have been waiting for. The all-new EliteBook Folio 1020 is both the thinnest and lightest business-class laptop in the world.
Bare metal recovery (BMR), restoring a machine with no requirement for operating systems or software to be present beforehand, isn't always seen as a reliable technique.
To look at how successful it really is, cloud backup and disaster recovery specialist Zetta.net has released the results of a survey looking at companies’ real world experience of BMR.
Left, or right? Chicken, or fish? Where are we going next?
Life is full of decisions. Some you’ll want to think about, carefully evaluate and discuss. But if they’re not so important -- or you’d just prefer a more surprising life -- then you could let your phone choose the outcome, with a little help from Certified True Randomizers.
Meeting the needs of employees to access systems is an important consideration for any modern business. Now, cloud-based call enter systems provider TCN is making its technology accessible for the visually impaired.
Its Platform 3 Vocal Vision product is optimized to work with Job Access with Speech (JAWS) technology and allows visually impaired call center agents to effectively navigate TCN's cloud-based contact center suite, helping to improve agent productivity while also creating new employment opportunities for the visually impaired.
Chinese smartphone vendor OnePlus just launched its One flagship in India, where it is available to purchase exclusively through the local arm of retailer Amazon. Prospective buyers are only able to scoop up the top-of-the-line 64 GB version of the smartphone, as the lesser 16 GB model is nowhere to be seen at this stage.
OnePlus appears to be committed to the Indian market, as it says that it has already set up a service network of 25 walk-in centers for its prospective local customers. Speaking of customers, the number of local buyers who will be able to buy One is still controlled by OnePlus, as the company is continuing to enforce its invite-only system.
A number of unreleased movies, as well as some confidential data, has been leaked online following a massive hack at Sony Pictures that happened last week.
In the Reddit thread covering the issue it says that, movies aside, confidential data including visa and passport information of cast and crew members working on different Sony projects, email inboxes and other important documents were leaked.
Ethernet inventor Bob Metcalfe, when I worked for him 20 years ago, taught me that we tend to over-estimate change in the short term and under-estimate it in the long term. So it can be pretty obvious what is coming but not at all obvious when. And what we know about the when of it is that making money from new technologies is often a matter of investing right before that bend upward in the hockey stick of exponential change.
We all know television is bound to enter a new era sooner or later. Heck, I’ve written dozens of columns on the subject over my 17 years in this job. But this is the first time I feel confident in saying when this TV transition will take place. It already has. Forces are already in motion that will completely transform TV over the next 24 months. Come back two years from today and it will all be different with at least a few new leaders and a few icons gone bust. Get ready for TV 3.0.
Adobe’s Encapsulated PostScript (EPS) is a powerful graphics format which first appeared almost 30 years ago, so you might have expected there to be plenty of viewers around by now. But no: it’s so horribly complex that most image viewers either ignore the format entirely, or offer basic support, but with very unreliable results.
There are specialist tools which claim they’re different. The free EPS Viewer not only displays EPS/ PS files, but can also convert them to a few bitmap formats (JPEG, PNG, GIF, TIFF). Is it really better than the leading image viewers, though? We grabbed a test copy.
Storing your data in the cloud requires you to place trust in a company and its service. Whether you're talking about Dropbox, Google Drive or an enterprise level solution, security is of paramount importance. There have been numerous high profile cases in recent months in which data breaches have occurred and private data has been accessed by unauthorized people -- including the NSA et al. It's little wonder that many people are wary of moving entirely to the cloud.
But Microsoft Research may have a solution. A small team of researchers came up with the idea of Haven, a cloud system that introduces the idea of shielded execution. This is a platform designed not just for storing data, but also to securely run cloud-based applications, including those based on legacy code.
If you have ever created or sat through a PowerPoint presentation for work, or created a report for school lately, you've surely seen or used clip art. There is nothing inherently wrong with using images to enhance a presentation or document, but the clip art in Office has been downright terrible. The images are typically outdated and cliched examples of business life, drawn by artists who likely came straight from hell (I kid -- actually, I bet they are very nice people).
Today, we may have finally seen the last of these horrid Pablo Picasso-esque nightmares, as Microsoft kills the Office clip art and image library. This is surely a time for celebration, but you are probably wondering where you will get images for your next quarterly presentation. No worries, Microsoft will now be directing users of Office to Bing Image Search instead.
Google Code-In has been running for a few years now and serves as a platform for promoting the importance of programming and computer science to students. The current batch of computing student represents the next breed of app coders, website designers and computer experts. Google is keen to encourage teenagers to get involved and today is the day that registrations open for Google Code-In 2014.
One of the aims of the event is to promote the open source community, and encourage 13-17 year olds to get involved in whatever way they can. Google Code-In is a contest but it has been set up in such a way that it simulates working on a real-world open source project.
It still has plenty of haters, but Windows 8.1 is finally finding an audience. It may not be anywhere near as sizable as the audience Windows 7 commands, but after losing usage share earlier in the year, the tiled OS is finally headed in the right direction, and at speed.
Earlier today I reported on NetMarketShare’s figures which show Windows 8.1 as having 12.10 percent of the desktop OS market, but now StatCounter has released its own figures which show Windows 8.1 as having just hit a pretty special milestone -- overtaking Windows XP for the first time.
Unauthorized access to networks is currently one of the most serious threats to the hosting business. Intruders and viruses present the two biggest security threats to the industry. Let us examine three key definitions: intruders (or hackers), intrusion, which is a formal term for describing the act of compromising a network or system, and Intrusion Detection Systems, which help business detect when they are vulnerable to an attack.
Intruders can be external or internal and their intents may vary from benign to serious. Statistically 80 percent of security breaches are committed by internal users and these are by far the most difficult to detect and prevent. These intruders create a significant issue for network systems and IT equipment. Intruders come in a variety of classes with a varying level of competence -- an external user without authorized access to the system will want to penetrate the system to exploit legitimate user accounts to access data, programs or resources with a purpose of misuse. Intruders may even use compromised systems to launch attacks.
Rain? Wind? Ice? Snow? Just about everyone needs to know what’s happening next with the weather, and there are a vast number of tools and websites to keep you up-to-date.
Most weather monitors try to win you over by piling on the features: multiple locations, detailed long-term graphs, customized alerts, whatever it might be. The results can be very powerful, but also bulky and complex.