BetaNews Staff

Microsoft enterprise apps will arrive on Huawei Cloud

Huawei has revealed a new tie-up with Microsoft as it looks to improve the world of public cloud.

At the Huawei Connect 2017 event in Shanghai today, the Chinese giant has confirmed it will expanding its partnership with Microsoft to allow the latter's enterprise apps to come to Huawei Cloud.

Continue reading

Virgin Atlantic will offer Wi-Fi on all flights

London Heathrow, United Kingdom - May 25, 2013: A Virgin Atlantic Airbus A340-600 with the registration G-VFIT on approach to London Heathrow Airport (LHR) in the United Kingdom. Virgin Atlantic Airways is a British airline with 43 planes and 5.5 million passengers in 2012.

Frequent flyers will soon be able to stay online whenever they fly after Virgin Atlantic revealed details of a new in-flight Wi-Fi connectivity plan.

The airline has confirmed its entire fleet will now be able to get Wi-Fi during flights around the world, with all 39 aircraft now connected, even on transatlantic flights and those carried out by Virgin's US partner network Delta Air Lines.

Continue reading

How to make Android and iOS apps smaller

In an ideal world, if you were the sole provider of any service through app and the users had unlimited resources on their devices, there would be no question of optimization and terms like agility and even user experience would be redundant. But as you might know, the current state of app industry is anything but ideal. There are dozens of apps competing for even the simplest of services and no matter how premium device a user has, there is always a limit to the number of apps it can operate smoothly.

The worst part, however, is scenario where after spending considerable amount of time, money and resources into developing and marketing an app, the users perceive it to be bulky and either never install it or uninstall after they find the memory it consumes is disproportionate to the value it brings.

Continue reading

Resilio Sync enables you to sync and share files without the cloud

There are many cloud-based synchronization services, including Dropbox, Google Drive, SugarSync and others. These services all use the same method of synchronizing your files. Choose the data you want across your computers and the content is uploaded to the cloud and then made available across your other devices.

The issue here can be if you don't have fast broadband, making uploading huge files problematic. The answer is a peer-to-peer service where your data remains on one device whilst it’s synchronized to others, whether you own these devices or they are authorized users.

Continue reading

Box offers cloud services to London Metropolitan Police

London's law enforcement forces are about to get a significant storage upgrade thanks to a new partnership with Box.

The online storage giant has announced that it will now be working with the London Metropolitan Police to provide 50,000 staff with better cloud provision.

Continue reading

How to fight back against the email scammers

email icon

Business Email Compromise (BEC) has become one of the most popular tactics deployed by fraudsters in recent years. A step up from the numerous but low-quality spam campaigns that clog most inboxes on a daily basis, BEC attacks involve a planned attack on a specific target, aided by the impersonation of a trusted contact.

The most commonly seen tactic is to take on the guise of the CEO and use their authority to trick a financial department into transferring funds, while variations include impersonating suppliers and business partners, and going after sensitive data rather than direct payment. In its most recent report, the FBI estimated that financial losses from these attacks is more than $5.3bn since October 2013.

Continue reading

How to deal with immediate cyber threats

data threat

As the threat of invading malware increases (viruses, worms, Trojans, bots, just to name a few), companies, small and large, will continue to use technology as a means of defence. The antivirus industry is extremely large and continues to garner major investment. As with any technology niche, there is both good and bad within what’s called advanced endpoint security, but it will continue to be installed as a means to protect against modern malware and other possible threats.

It is interesting to me that the term virus has become the way most people understand how computers or enterprise systems become infected. I think it is because people understand the flu and the common cold. And they generally understand how to protect against catching the flu or catching a cold. The most important protection is information.

Continue reading

How Internet of Things supports smart cities

Global analyst firm Gartner has predicted that by 2020 there will be more than 20 billion "things" connected to the Internet, sending data all over the world. These Internet of Things (IoT) devices could be anything from fish tanks and fidget spinners, to sunglasses, fridges and other home appliances. All these devices have the ability to send and receive data between one another, creating a network that can share valuable information.

When such devices are integrated into the infrastructure of our towns and cities, they have the potential to revolutionize the way we live our lives -- making our cities more accessible, safer and easier to navigate. For fleet and operations managers in particular, this presents a very enticing opportunity.

Continue reading

Huawei looks to forge global cloud computing alliances

Huawei has laid out its bid to kick-start the next generation of cloud computing.

At the Huawei Connect 2017 event in Shanghai today, rotating CEO Guo Ping pledged that the company is committed to building "one of the world's five clouds" to benefit enterprises around the world.

Continue reading

HPE offloads software division to Micro Focus

HPE has finalized the sale of its software division, bringing to an end one of the company's most traumatic periods.

The technology giant has confirmed the spin off of its software business in a deal with British firm Micro Focus which is valued at around $8.8 billion.

Continue reading

Microsoft at the forefront of enterprise SaaS market

Enterprise SaaS market has seen growth of almost a third (31 percent) compared to last year.

That's according to the latest research from Synergy Research Group.

Continue reading

Juniper buys security startup Cyphort

Mergers and acquisitions message displayed on a tablet, with a coffee cup and pen nearby

Juniper Networks has announced plans to acquire security analytics software firm Cyphort.

By acquiring Cyphort, Juniper will have access to its open-architecture platform that features a machine learning powered analytics engine that is capable of integrating with existing security tools to aid companies in detecting threats that have been missed by their first-line of security.

Continue reading

Lenovo's new ThinkPad A laptops come with AMD Ryzen Pro chips

Lenovo has revealed details of an all-new build of its enterprise-focused ThinkPad notebook products.

Scheduled to mark the 25th anniversary of its iconic ThinkPad line, the two new A-series products will be the first notebooks to feature AMD hardware. Specifically, this means the chipmaker's all-new Ryzen Pro processors, which were shown off at an event in New York this week.

Continue reading

AMD wants to conquer the enterprise PC market with Ryzen Pro

AMD has laid out its aim to make workplace PC and laptop devices more powerful thanks to its latest Ryzen Pro chips.

The company has unveiled the first enterprise computing devices that will feature its latest hardware, with the world's three biggest PC manufacturers all signed up for new releases.

Continue reading

Okta adds two-factor authentication

Okta has recently made three major announcements. First, it introduced new developer product toolkit capabilities, allowing developers to add Okta’s identity-driven security solution to their own applications with ease.

This has been announced during Oktane, its user event in Las Vegas. New features include easy and secure authentication, rapid customization and branding, out-of-the-box workflows, as well as securing APIs that are exposed to third-party developers.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.