BetaNews Staff

Google will pay you $20 an hour to sit in a self-driving car

As Google prepares to deploy its self-driving car fleet to Chandler, Arizona, the company is hiring local drivers to test its vehicles.

The company intends to hire local drivers in Arizona who will act as "vehicle safety specialists" that will be behind the wheel of its self-driving cars and ready to take over should an unforeseen problem or circumstance arise.

Continue reading

DRaaS is the low-cost insurance policy for 'always-on' IT

disaster plan

Disaster. The term itself inspires worry and downright fear for most IT pros -- and for good reason. Whether it’s a security breach, networking failure, human error or the much-dreaded natural disaster, outages can be financially devastating for IT-centric businesses. While acts of nature are rare, IT failures are inevitable, and most companies experience them multiple times every year.

Despite the pervasive risks, close to 75 percent of companies are failing in their disaster readiness efforts, according to the Disaster Recovery Preparedness Council. How you prepare for this scenario and what continuity solution you choose for recovery will determine if your outages lasts for minutes, hours or days.

Continue reading

7-Zip gets an update to fix major security vulnerabilities

Security researchers from Talos have written a bunch of fancy words on their blog here, which basically say 7-Zip has a couple of serious security flaws.

Everyone’s up in arms about it, too.

Continue reading

Barclays will introduce Android mobile payment service

UK bank Barclays has announced it will soon roll out its own contactless payment service for its Android-using customers in the country. All Barclays customers with an NFC-enabled Android smartphone will be able to pay for things the same way they pay with a contactless card.

For purchases of up to £30, all they need to do is tap their smartphone at the payment terminal, the same way they’d tap a contactless card. For purchases of up to £100, customers would need to tap in their PIN code.

Continue reading

Is your hosting provider prepared for a DDoS attack?

DDoS attacks

Initially a fairly rudimental way to shut websites down, DDoS (Distributed Denial of Service) attacks have evolved into a complex and potentially catastrophic technique for cybercriminals to compromise valuable data.

With one survey of IT managers finding that the average cost of a DDoS attack was $40,000, it is imperative that businesses operating online recognize this threat and do something about it, which should start with your choice of hosting provider. One option is to switch from a shared hosting solution to a dedicated server, where your website can enjoy complete control over access and security. However, hosting providers and ISPs have a crucial part to play too.

Continue reading

Amazon's DSSTNE deep learning software now open source

open source

Amazon has decided to follow in the footsteps of Google and other technology companies by open-sourcing its deep learning software.

The company has released its deep learning software DSSTNE (pronounced destiny) on GitHub under an open-source Apache license. Deep learning has gained a lot of traction in recent months and many tech companies are currently developing their own software to help teach computers.

Continue reading

IT pros too confident about detecting ongoing cyber-attacks

Cyber attack

Endpoint detection and response company Tripwire and Dimensional Research conducted a research, and asked 763 IT professionals from various industries about their security practices, and if they felt confident they could detect an ongoing cyber-attack.

The two companies announced that the majority of IT experts felt overconfident in their abilities to detect an ongoing threat and remove an unauthorized device from their network.

Continue reading

Server virtualization market to reach $5.6 billion in 2016

New research from Gartner suggests that the worldwide server virtualization market is very close to reaching its peak.

In 2016, the x86 server virtualization market is expected to reach $5.6 billion. This is an increase of 5.7 percent compared to 2015. However, this growth is not attributed to new software licenses which have declined for the first time in more than a decade. Instead this increased growth has been driven by maintenance revenue which is a clear indication of how the software market has begun to rapidly mature.

Continue reading

Popular business apps come with major security risks

risk jigsaw piece

The security firm Wandera SmartWire Labs has released a new report detailing how many popular business apps used by large enterprises leak data and present a multitude of security risks.

The company assessed the threats that exist on popular business apps and how they could be potentially damaging to large companies in Europe, the US and Asia. Wandera’s report was able to shed light on 10 apps, widely used by enterprise employees, that failed to employ secure data storage and protect information that could personally identify users.

Continue reading

Publishers to lose $27 billion by 2020 thanks to ad blockers

Online advertising

Publishers are set to lose $27 billion by 2020 thanks to ad blockers such as AdBlock Plus, a new report by Juniper Research says. Keeping in mind that the digital advertising spending worldwide sits at $197.48 billion (expected to grow to $252bn by 2018) according to Statista, that means ad blockers will account for almost 10 per cent of total digital advertising market.

Ouch.

Continue reading

Average salary of IT pros in UK is £40,000 a year

The average permanent salary of an IT professional in the UK has increased to a record high of around £40,000 per year, according to statistics from CV Screen.

The recruitment firm’s analysis shows that London earns the most in all of UK, with an average salary that is 14 percent above the national average. The rise in the national average salary, which marks as the highest average wage for the industry, represents a two percent increase over the last three years.

Continue reading

How does Proof of Concept (PoC) help tech startups secure investments?

Proof of concept (PoC) is a basic demonstration that showcases an idea in order to illustrate its scalability and profit potential. There is a misconception that if the design, idea or development needed for the final product will work, that is, then there is no need for a proof of concept. This is the first wrong assumption startup founders often make.

The next is not truly understanding what their PoC goes to prove, and how their proof of concept can be the gateway to their first round of funding.

Continue reading

Why changing your password is never enough

Password

It’s become more common than not in recent years to experience a security breach -- whether it’s your company records or your personal social media accounts, data on the web today is not as safe as it once was.

Often, people think that because their personal information is protected with a strong password, it’s enough to ward off hackers and cybercriminals. This, however, couldn’t be further from the truth. Let’s learn why.

Continue reading

Data archiving: What to ask before you invest

Data archiving is a practical way to rein in rampant data growth. It is also an excellent option for the users to keep their primary storage "clean". Additionally, data archiving helps improve the overall performance and efficiency of the backup/recovery environments.  In the event of disaster or even just everyday tasks, the appropriate archiving mechanism will offer a quick and complete way to access one's data as effortlessly as possible.

Archiving is one of the most financially responsible approaches to take from the operations side of your IT house. Ultimately, by investing in a data archiving structure, costs are significantly reduced with respect to both storage and data protection.

Continue reading

Businesses open to hiring ex-hackers to beef up security

The Hollywood scenario where people hire ex criminals to do their bidding, as no one else seems to have the necessary skills, has been replicated in real life, according to a new report by cyber-security service provider SecureData.

SecureData says more than a third of businesses (34 percent) would have no problems hiring an ex hacker to compensate for the lack of in-house cyber-security skills. I just wonder how you classify someone as an "ex hacker".

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.