TiVo shows off monster 24 TB Mega DVR, you'll never miss another show


One problem with DVRs is storage -- if you save too many programs you'll find things being deleted to make room for new recordings. Most DVRs land in the 500 GB range, but some are now coming with one terabyte. Things are slowly improving, but now they will be taking a quantum leap thanks to TiVo.
How about a 24 terabyte monster for your TV show storage needs? That works out to about 26,000 hours of stored TV shows (that's SD, HD reduces things to a mere 4,000 hours), which should be enough for even the biggest couch potato. It is, not surprisingly, named the TiVo Mega and will be whole-home capable.
Sony Xperia M2 Aqua: A masterclass in waterproofing [Review]


As you may have guessed from the name, the Sony Xperia M2 Aqua is a brand new water resistant phone courtesy of the Japanese giant that seems to have made repelling H2O something of a personal vendetta.
Seriously, forget the Xperia Z3, the Sony Xperia M2 Aqua has the highest water resistance-rating for a mass-market smartphone. If you regularly make business calls in the shower, there is no other phone we'd recommend more highly.
Google Chrome is to blame for a massive increase in online ad blocking


A shocking new report looking at online advertising shows that there has been a huge increase in the number of internet users making use of ad blocking tools. The report describes ad blocking as having gone mainstream, but it also suggests that the loss of ad revenue threatens the life of many websites.
Pagefair worked with Adobe putting together the report and found that 4.9 percent of internet users make use of ad blockers, including more than a quarter (27.6 percent) of those in the US.
Shippable wants to help developer teams innovate faster


In a fast-changing world there's demand for new applications to be delivered quickly and traditional development processes often can't keep pace.
Seattle-based startup Shippable has announced a new version of its platform that helps developers to innovate and deliver more quickly using open source Docker containers. Docker -- in case you didn't know -- isolates resources of the Linux kernel to allow independent software containers to run on one Linux platform without the need to launch virtual machines. Docker containers can be run on any Linux machine whether on site or in the cloud.
Porn sites join forces with Reddit, Mozilla, and more in net neutrality protest


In one of the strangest joining of forces imaginable, Reddit (of recent Fappening censorship fame), Mozilla (the browser folks) and other well-known names are teaming up with porn sites. The net neutrality debacle is one that has been rumbling on for some time now as more and more ISPs reveal plans to provide faster internet access to those willing -- or able -- to pay more. This creation of a two-tier internet is something that has been met with disgust from many quarters, including lots of big online names.
Tomorrow, 10 September, the likes of Pornhub and Redtube will join Etsy, FourSquare, KickStarter and more in a day of protest.
Dyreza trojan may pose a risk for Salesforce users


A warning has gone out to customers of Salesforce.com that the Dyreza trojan, previously targeted at banking sites, may be a risk to users of the CRM solution.
The malware uses social engineering techniques to get the victim to infect the system via email. Once installed it uses "browser hooking" to allow Dyreza to intercept content entered by the user into the web browser before that content is transmitted over the network to a web site. Critically this allows the interception to occur before the data is encrypted.
HP offers UK SMEs a way to prove security credentials more affordably


HP has strengthened its public sector supply chain by enabling over 600 small/medium enterprises (SMEs) to prove their security credentials with the new Information Assurance for SMEs (IASME) security standard.
The IASME should allow SMEs to compete for public sector contracts by offering a more affordable route to compliance with ISO/IEC 27001:2013, the information security standard which was published last year.
iOS performance in the spotlight ahead of Apple's launch event


In the run up to Apple's latest eagerly anticipated launch event, mobile benchmarking specialist Crittercism has released an Apple edition of its Mobile Experience Benchmark Report.
Focussing on statistics gathered from over a billion users across more than 120 countries it looks at key performance metrics including crash rates across iOS versions and devices along with latency by carrier and Wi-Fi.
Geekbench offers redesigned and simplified results view, adds ARMv8 support


Primate Labs has updated its cross-platform, flagship benchmark tool with the release of Geekbench 3.2 for desktop and Android. Also available on iOS, the latest build’s main highlight is a redesigned results page.
The redesign aims to simplify how results are shown, particularly on mobile platforms. Version 3.2 also comes with added support for the forthcoming 32-bit ARMv8 processor due to launch on Android later this year.
The Home Depot acknowledges payment systems breach


The Home Depot is the latest US retailer to fall victim to a major payment systems hack, which may have exposed its customers' credit card data since April of this year. The security breach is linked to its US and Canadian retail locations, but not its online store or Mexican chain.
The breach is publicly acknowledged by The Home Depot, with the company's CEO apologizing for what is yet another security disaster. "We apologize for the frustration and anxiety this causes our customers, and I want to thank them for their patience and support as we work through this issue", says Frank Blake. "We owe it to our customers to alert them that we now have enough evidence to confirm that a breach has indeed occurred. It's important to emphasize that no customers will be responsible for fraudulent charges to their accounts".
Major malvertising network targets Windows and Mac users


A new malicious advertising network is affecting sites including Amazon, Yahoo and YouTube. Dubbed "Kyle and Stan" by the Cisco Talos Security Research group that uncovered it, the malware is able to mutate to attack both Windows and Mac systems.
Online advertising has relatively few major distribution networks, by getting ads onto one of these an attacker has the potential to get malicious content in front of large numbers of users.
Has the bubble burst for Apple?


After months of rumors, leaks and even more rumors, the iPhone 6 is set to be unveiled by Apple in California today. As is the norm with Apple launches, the announcement has garnered a lot of excitement, with people going so far as to queue up outside Apple stores weeks in advance of the actual release.
However, despite these crazy levels of attention and raging anticipation, Apple is still having some rather serious questions asked of it. This one in particular: does the Apple brand still have the X-factor it once boasted?
IBM and Intel offer new security features to improve confidence in the cloud


IBM has announced that SoftLayer will be the first cloud platform to offer customers bare metal service that provides monitoring and security down to the microchip level.
Working in combination with Intel's Trusted Execution Technology (TXT), the security platform will help businesses determine if a workload from a known location on SoftLayer infrastructure is running on trusted hardware.
Run and test batch files with Shell Runner


Running a batch file in Windows can be as easy as a double-click, and if the script is simple then the command window might open, run your file and disappear again in a fraction of a second.
Of course, if your script has a problem then this might be an issue, as error messages will pop up and vanish before you have time to notice anything at all.
Kinivo releases a pair of inexpensive Linux-friendly USB wireless adapters


Nowadays, if you buy a laptop, it will have a built-in wireless card (desktops; not always). For the most part, these integrated cards work well -- on Windows. You see, most manufacturers build their machines with only Windows in mind. If you only use Microsoft's operating system, you should be golden. However, for nerds that like Linux (including myself), nonexistent or problematic wireless drivers can be an absolute nightmare.
This is why I recommend a USB wireless adapter to every Linux user; you never know when you may need it as permanent or temporary internet solution. Unfortunately, not all USB adapters work with Linux out of the box, so the model you choose matters. Today, Kinivo releases two USB wireless adapters that are promised to work with Linux-based operating systems.
Most Commented Stories
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.