Dell Precision 3540 and 3541 'Developer Edition' mobile workstations come with Ubuntu Linux


Dell has been manufacturing excellent value-focused computers for years. Back in the day I was a computer salesman at a now-defunct brick and mortar CompUSA. People would often walk into the store, look at what we charge, ask if we could match Dell's price for a similarly configured machine, we would say no, and they would leave. It was virtually impossible to compete with Dell's high-volume online business model from a cost perspective.
Back in those days, Dell was in a monogamous relationship with Microsoft, but in modern times, the computer-maker is no longer exclusive with Windows. Actually, with its "Developer Edition" computers (also known as "Project Sputnik"), Dell also offers Ubuntu -- a Linux-based operating system. That may not seem like a big deal today, but years ago, when it first happened, it was huge news.
Three options companies should consider for backup & storage in 2019


While data backup and storage probably aren’t the first things that come to mind when looking at your IT strategy for 2019, business owners should understand that they are part of your technology foundation and could be key to your success this year. Storage, for example, is the vital base for your cloud and data center, and backup capabilities are a requirement in today’s interconnected world.
We read about it nearly every day: Cyber attacks against businesses of all sizes are on the rise and doing more damage than ever. But there are also physical threats your data faces, too. A fire, flood or other natural disaster can wreak havoc on your data and make recovery virtually impossible unless you have a backup plan in place. What is your business doing to protect your data?
4 essential elements of ongoing privileged access management -- Why they are important and how to get them right


Privileged access management (PAM) delivers the greatest benefits when it is implemented as a mission rather than to satisfy a limited, one-time mandate. Achieving more complete and proactive protection for privileged accounts requires an ongoing program to add more platforms and accounts and to share more security data with other systems over time. It also requires paying as much, if not more, attention to how PAM affects people and processes as to technology issues.
Without proper ongoing governance, a PAM program can give an organization a false sense of security regardless of their investment in their initial PAM rollout. Here are the essential elements of ongoing PAM governance, why they are important, and how to get them right.
Enter to win a 55-inch 4K smart television and Roku TV Wireless Speakers


Need a TV? You should definitely buy a 4K model. Even if you don't have any UHD content now, it makes sense to "future-proof" at this point as pricing has gotten quite low.
If you are averse to spending money, I have good news -- Roku is giving away a 55-inch 4K Westinghouse TV. This smart TV has an integrated Roku, making it easy to stream content. The model of TV is "WR55UE4019," which I have been unable to find for sale online. That's not all, however -- the company is also including its Roku TV Wireless Speakers for a superior audio experience.
Mozilla bans Firefox add-ons with obfuscated code


As Mozilla continues to try to make it safer than ever to use Firefox, the organization has updated its Add-on Policy so that any updates that include obfuscated code are explicitly banned.
Mozilla has also set out in plain terms its blocking process for add-ons and extensions. While there is nothing surprising here, the clarification should mean that there are fewer causes for disputes when an add-on is blocklisted.
Data breaches spark increased interest in password managers


People have been predicting the death of the password for some time, but it's still the case that most online accounts rely on them, even if supplemented by another feature like 2FA.
A new report from Avira to coincide with World Password Day shows that so far in 2019, there have been at least four major data breaches, each impacting more than 200 million records.
Social media phishing attacks up more than 70 percent


Social media phishing, primarily on Facebook and Instagram, has seen a 74.7 percent increase in the first quarter of 2019.
A new report on the current phishing landscape from predictive email defense company Vade Secure also shows that Microsoft has retained its spot as the most impersonated brand for four straight quarters, due to the potentially lucrative returns to be gained from Office 365 credentials.
Lack of security and operations basics leave businesses unprepared for breaches


A new report from endpoint management specialist 1E reveals 77 percent of IT decision makers polled believe that they are not well prepared to react to a serious data breach and 60 percent have experienced a security breach in the past two years.
The study conducted by Vanson Bourne polled 300 decision makers from from IT operations and 300 from IT security, and finds 80 percent say digital transformation increases cyber risk.
US companies waste over two months a year resetting passwords


To mark today's World Password Day, access and identity management company OneLogin has released a report that shows IT professionals at US companies waste 2.5 months a year resetting internal passwords.
It also finds that almost half of US businesses (44 percent) take up to a month or more to deprovision ex-employees, while 28 percent take a full working week.
Putin signs law to create 'sovereign internet' for Russia


President Putin has signed into law a bill that will give Russia a "sovereign internet" -- one which could be disconnected from the global web if the Kremlin decided to do so. It is being sold as a way to "ensure the safe and sustainable functioning" of Russia's internet should the country's enemies try to block access.
But there are fears that the law -- which will require ISPs to route traffic through government-controlled servers -- amounts to the creation of a Russian version of the Great Firewall of China and will lead to severe online censorship.
Patriot Memory launches surprisingly affordable Signature Premium DDR4 RAM


Patriot is a company that makes many flash memory products, such as USB flash drives, solid state drives, and storage cards to name a few. System builders are probably most familiar with its RAM products, however. Along with companies like Corsair, Kingston, and G.SKILL, Patriot's sticks of RAM are very much respected. This includes Viper, which is Patriot's gaming brand.
Today, Patriot launches a new line of DDR4 RAM. Called "Signature Premium," you'd expect the memory to be expensive, but actually, it is surprisingly affordable. Capacities range from 4GB to 32GB, while there are two speeds from which to choose -- 2400Mhz and 2666MHz. And yes, they feature heat spreaders -- great for cooling and looking attractive too.
Microsoft releases Windows 10 20H1 Build 18890 to the Fast ring


Windows 10 19H1 -- the May 2019 Update -- is currently undergoing additional testing in the Release Preview ring to try and solve a number of upgrade blocks, including one which prevents the update from installing if you have a USB drive or SD card plugged in.
Microsoft is still working on future releases though, and today pushes out Build 18890 to Insiders on the Fast ring (and those who had previously opted to Skip Ahead).
Forget Avengers: Endgame or Game of Thrones -- watch 'Clippy: The Unauthorized Biography' instead


Steven Sinofsky was a senior executive at Microsoft who is perhaps best known for presiding over the creation of Windows 8 and RT. However, he also had a key role in the development of Microsoft Office back in the 1990s. This was a time when users feared to attempt to write a letter in Word because just starting it could well summon up Clippy -- the Candyman of productivity software -- who would attempt to help, but was rarely of any real use.
Clippy might have been retired for 15 years now, but to mark the Office assistant’s 25th anniversary, Sinofsky has made an Unauthorized Biography of the divisive animated paperclip which you can watch in full here.
Google to roll out auto-delete controls for location history and activity data


Google has announced that it is giving users greater control over how long the company holds on to location history and activity data.
A new time-limiting feature makes it possible to have information such as account activity and location data automatically deleted after a period of time. The privacy-focused move comes after feedback to Google which found users wanted the company to provide simpler ways to manage or delete the private data it holds.
TechSmith releases Camtasia 2019 with automatic audio leveling


We’ve given up on people reading through instructions supplied with their order. You can write important points in bold and people still ignore what’s supplied. Rather than replying to everyone individually, we’ve found it easier simply record a live demonstration of how to solve a particular issue and send them a video of the results.
You need a quality screen recording tool to produce a video which is professional enough to reflect your business. We recently wrote about Captura 8, which is an excellent freeware screen recording tool, but you’ll want to step up a level or two if you’re recording for paying customers.
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.