Latest Technology News

Get 'Beginning Programming with Java For Dummies, 6th Edition' (worth $18) FREE for a limited time

Consider Beginning Programming with Java For Dummies your indispensable guide to learning how to program in one of the most popular programming languages -- Java! Java is an invaluable language to master, as it's widely used for application development, including Android, desktop, and server-side applications.

Beginning Programming with Java For Dummies is written specifically for newbies to programming. The book starts with an overview of computer programming and builds from there; it explains the software you need, walks you through writing your own programs, and introduces you to a few of the more-complex aspects of programming in Java.

Continue reading

CIO role gains in importance as economic hardship bites

According to a new report, 77 percent of CIOs say their role has been elevated due to the state of the economy and they expect this visibility within the organization to continue.

The 22nd annual State of the CIO report from Foundry looks at how the CIO's role has changed over time, as well as an in-depth analysis of technology and business initiatives that CIOs plan to focus on in 2023.

Continue reading

Island integrates ChatGPT into its enterprise browser

AI

Since it was launched towards the end of last year ChatGPT has created quite a buzz, both for its legitimate uses and its potential to be abused.

Now though Island is announcing the integration of ChatGPT into its Island Enterprise Browser. It aims to provide deep contextual awareness, so you receive prompts that are informed by your behavior and relevant to what you're working on, as you work on it.

Continue reading

Ransomware groups rebrand and claim more victims

ransomware laptop

The latest report from the GuidePoint Research and Intelligence Team (GRIT) shows an increase in ransomware activity from Q3 2022 to Q4 2022, as rebranded ransomware groups significantly increased the number of publicly claimed victims.

No quarter of last year saw less than 569 total victims -- with the biggest lull occurring in late June and early July, most likely attributed to the shift from Lockbit2 to Lockbit3, although challenges in the crypto currency market may have also had an impact.

Continue reading

Cybersecurity is a key first step in digital transformation

cybersecurity

New research commissioned by Telstra shows 41 percent of UK technology leaders identify cybersecurity as an enabler of innovation within their organization.

The fallout from the COVID-19 pandemic has seen unprecedented levels of digital transformation. At the same time though an ever-evolving threat landscape means that security risks are on the rise, leaving organizations facing the difficult task of balancing rapid digitization with security.

Continue reading

Microsoft releases Windows 11 Build 25284 with a new Messenger app widget

It's an exciting day for Windows 11 Insiders in the Dev Channel as Build 25284 arrives with a selection of handy fixes and a brand new widget for the Messenger app.

Unfortunately, this new build won’t be made available for Arm64 devices due to a known issue that results in devices getting stuck at the OS boot logo.

Continue reading

TCL ION X Android smartphone comes to Metro by T-Mobile

A new TCL smartphone will be hitting prepaid carrier Metro by T-Mobile tomorrow (January 26). Called "ION X," this Android 12 phone will cost only $119, but if you open a new line of service, you can nab it for free. While that is an affordable price, the specifications of the 4G LTE phone aren't exactly exciting.

The TCL ION X is powered by a MediaTek octa-core processor and comes equipped with a meager 3GB of RAM. Onboard storage is just 32GB. The phone features an edge-to-edge 6-inch display with a rather pathetic 1600×900 resolution. You get a 5MP front camera (with face unlock), a 13MP rear camera, and a respectable 3000mAh battery.

Continue reading

'Data-fication' set to drive transformation in transport and logistics in 2023

digital transformation

As we look ahead to this year, it is from the position of continuous volatility that the past twelve months have brought. Transport and logistics companies, still in COVID recovery mode, face a raft of challenges as external factors combine to ensure that the road before us is anything but smooth. Both industries are experiencing a heady combination of disruption and transformation, with exciting innovations starting to deliver on their potential.

We are already seeing the incredible potential of data-focused digital transformation to revolutionize how transport and logistics companies operate. Successful ‘data-fication’ will enable companies to absorb some of the shockwaves of ongoing disruption set to trouble the sector in the coming year and enable them to start to achieve the potential that digital transformation can bring.

Continue reading

Keep the faith with fax

Fax machine

It’s easy to assume that faxing has no place in today’s digitalized workplace. When email and Instant Messaging apps are so established and familiar, the idea of typing in a fax number, feeding a document into a machine, and then having to wait beside that machine to print out a response for you, sounds, at best, quaint: and at worse, slow, inefficient and unsecure.

But fax has evolved and continues to underpin vital operational processes across a range of sectors. The ongoing importance of timestamping plus the advent of cloud in particular means that whether it’s finance: exchanging the details for buying a house: or sending and receiving critical and confidential healthcare documents, fax still has a significant contribution to make in the day-to-day running of an organization.

Continue reading

Quality and security suffer in the push for digital transformation

digital transformation

A new survey of 1,300 CIOs and senior DevOps managers in large organizations finds it's getting harder for IT teams to maintain software reliability and security amid the rapid acceleration of digital transformation and rising complexity of cloud-native environments.

The study from Dynatrace finds 90 percent of organizations say their digital transformation has accelerated in the past 12 months. 78 percent of organizations deploy software updates into production every 12 hours or less, and 54 percent say they do so at least once every two hours.

Continue reading

Get 'Uncommon Accountability: A Radical New Approach to Greater Success and Fulfillment' ($25.00 value) FREE for a limited time

The implementation of true, organization-wide accountability has the potential to transform your firm’s -- and your personal -- performance. Unfortunately, the word "accountability" often has negative connotations, including blame, fear, and conflict. 

In Uncommon Accountability, best-selling authors and leadership strategists Brian Moran and Michael Lennington compellingly argue for a positive and affirming conception of accountability -- one that stands for personal ownership of one’s goals, actions, and progress. 

Continue reading

How does SASE simplify and strengthen cloud security?

A new data breach is revealed to the public every day. Some of the most recent ones that included large businesses are Mailchimp, LastPass, and T-Mobile. One of the many reasons we increasingly read about such incidents is because it’s getting more and more challenging to protect the assets of a business. The truth is cyber criminals are getting savvier by the day, and their attack methods, such as malware, more sophisticated.

Organizations face a multitude of hacking threats that target their increasingly complex infrastructures. To fight it, businesses deploy Secure Access Service Edge (SASE) to both improve and simplify their cybersecurity. How does SASE aid modern companies to protect data and people from malicious hacking? Here, we discuss the key capabilities of the tool and how it can aid in the prevention of high-profile breaches such as Mailchimp, LastPass, and T-Mobile.

Continue reading

Lookout launches unified security for endpoints and cloud

The switch to remote and hybrid working has led to more people working from mobile devices and using cloud platforms.

This needs a security solution that 'follows' and protects corporate data wherever it flows or resides, and with the launch of its new Cloud Security Platform, Lookout does just that.

Continue reading

Taking control of the scary things: churn, incidents and downtime

data failure

Three little words herald major impact (and fear) for organizations: churn, incident, and downtime. Given that Gartner reports companies might be at risk of losing up to half a million USD each hour from severe incidents (based on losses and time to remediate), boards should take the health of a company’s digital operations seriously. Thankfully, those responsible for digital operations and incident response have a plethora of capabilities and services at their disposal that can drastically reduce the impact downtime and instability has on their organization.

With a long recession forecast for the UK, leveraging these tools to better understand, plan, and predict is crucial. Achieving this state of operational maturity means businesses are equipped with the right analytics, communications, understanding, and ability to take action to manage all threats and incidents -- and try to prevent as many as possible from occurring in the first place. True operational maturity goes beyond the technology in place to also cover the people and processes involved. These ‘human’ elements are no less vital since they are associated with important metrics and outcomes such as hours worked, staff burnout, and attrition.

Continue reading

Dealing with the threat of social engineering [Q&A]

Social Engineering

Thanks to improved security technology, most cyberattacks now rely on some element of social engineering in order to exploit the weakest link, the human.

Phillip Wylie, hacker in residence at CyCognito, believes CISOs now need to take a step back and focus on the overall picture when it comes to security. This includes securing internal and external attack surfaces, and testing the security of these environments, as well as educating employees about the risks.

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.