BetaNews Staff

A look ahead at the state of the database in 2016

Business database

With security breaches and controversies over encryption, thinking about securing the data inside organizations is in the spotlight. How best to store and manage data is on the minds of most CIOs as they head further into the New Year.

Here’s what to watch for in 2016

Continue reading

Intel Skylake-based PCs freeze during complex workloads

A bug in Intel’s Skylake architecture was discovered by a team of mathematicians called the Mersenne Community. The group has been using Intel systems to search for prime numbers for the past 20 years and had yet to encounter any problems until now.

According to the Mersenne community, they experienced system freezes while running GIMPS (Great Internet Mersenne Prime Search) Prime95 software. By employing tens of thousands of machines to run hand-coded assembly language 24 hours a day, this group has found all of the record prime numbers during the last 20 years.

Continue reading

The pros and cons of implementing a bug bounty program

Bag yourself $15,000 as an Azure or Project Spartan bounty hunter

A recent incident with the Facebook Bug Bounty program has led to many different reactions supporting both Facebook and the security researcher. Regardless of who is right in that whole story, the one fact is clear: the researcher went far beyond what the social media site had initially expected, and got access to the sensitive data the company didn’t really want to share with anybody, including the researchers’ community.

These days bug bounties have become very popular, raising more and more questions about their efficiency and effectiveness. We will try to understand how and if bug bounties can be used to test your corporate web applications. I intentionally omit bug bounties for stand-alone software (e.g. Chrome or various IoT applications) as it’s a different topic.

Continue reading

How to scale your DevOps efforts

Developer

All companies -- from retail, to media, to IoT -- are increasingly becoming software companies. Data loss, security threats, service downtime and performance issues can sink a business. As a result, DevOps has evolved from an island of marginalized system administrators to an organization-wide cultural shift.

Companies like Netflix, Ticketmaster and Etsy understand that DevOps entails established processes, interconnected systems for monitoring and diagnosing, and org-wide vigilance about incident response. As our businesses continue to become more software-driven, Heavybit’s community of developer-focused entrepreneurs, advisors and investors provide tips and tactics to scale your DevOps efforts:

Continue reading

Should your business build a mobile app?

You are thinking about having an app built to help grow your business. After all, the biggest and the best all have apps, so should you, right? Ideally, you do need an app for your business.

In fact, a recent study published by the Gallup Poll reports that 52 percent of the population checks its smart phones several times per hour, and of the remaining 48 percent, 20 percent of the people claim to check their phones once per hour. These numbers are a marketing team’s dream! So many easy to reach people in one place! So yes, you need an app!

Continue reading

Security trends to watch in 2016

pixel padlock

2015 was a year for the record books in information and cyber security. Dozens of new vulnerabilities were uncovered, and government organizations, businesses and individuals continued to find themselves victims of high-profile data breaches.

As we settle into the new year, we don’t expect this trend to slow down. We foresee more security issues on the horizon that must be addressed in order to ensure privacy for companies and consumers in the year ahead. Here are our predictions on what’s coming in 2016:

Continue reading

Leverage geographically-distributed development

Globe data

Geographically-distributed development, or GDD, has made a name for itself as an extremely-effective IT strategy model within global enterprises throughout the world. As a highly-advanced support tool, GDD replaces archaic methods of managing development projects that compromise a business’ operational goals and success.

Conversely, GDD establishes optimized communication, efficiency, cohesiveness and success potential within an enterprise. Because GDD is extremely accommodating as a support tool, businesses from one part of the world to the next can quickly respond to business changes as they occur.

Continue reading

Penclic R3: Not your typical mouse [Review]

Using a mouse for long periods can be uncomfortable and in severe cases may even lead to repetitive strain injury.

There are various pieces of kit on the market to help you avoid this including ergonomically designed mice and wrist rests. Taking a slightly different and more innovative approach to the problem is the Penclic which is a sort of fusion of mouse and pen.

Continue reading

Dell expands Latitude lineup with new laptops and hybrid devices

Dell has announced an expanded lineup of Latitude laptops, 2-in-1 devices and monitors at CES 2016 in Las Vegas. The new Latitude products are: Latitude 13 7000, Latitude 12 7000 and Latitude 11 5000.

The Latitude 3000, 5000 and 7000 Series have been completely refreshed with thin and light designs, excellent efficiency and powerful processing options.

Continue reading

Microsoft Intune update will improve Windows 10 support

Microsoft will release a service update to its Intune management software within the next week, introducing a number of new features and enhancements.

A large part of the update will be dedicated to Windows 10 support, ensuring that Intune is optimized for a number of features native to Microsoft’s new operating system.

Continue reading

Microsoft and Rambus team up for quantum computing research

handshake

Researchers at Microsoft are partnering with Rambus in order to evaluate the future memory requirements of quantum computing.

The two technology firms will share their resources and expertise in order to determine the types of computer architecture that will provide the biggest improvement to memory capabilities and overall system performance. Gary Bronner, vice president of Rambus Labs said that existing architectures are struggling to meet the increasing demands of real-time data consumption.

Continue reading

BlackBerry will only release Android devices in 2016

BlackBerry has heralded the new year with a new move -- that is, to shift to Android for its upcoming devices in 2016.

In BlackBerry’s statement, company CEO John Chen said that its BB10 operating system will take a back seat this year as the company intends to launch two Android-powered devices to accompany the BlackBerry Priv.

Continue reading

Intel Security and AirWatch team up to boost mobile protection

Intel Security has expanded its partnership with VMWare’s enterprise mobility subsidiary AirWatch, placing a greater emphasis on mobile security initiatives.

The two companies aim to help organizations cope with the numerous security issues posed by mobile devices, as well as integrating enterprise protection across PCs, operating systems, networks and the cloud.

Continue reading

Hybrid IT systems hinder innovation

Research from Sungard Availability Services, a provider of information availability through managed IT, cloud and recovery services, has revealed a dark side to hybrid IT systems.

Sungard’s findings based on a study which questioned 150 senior IT decision makers in UK organizations with more than 500 employees with an average IT spend of around £36m per year, found that over half of UK organizations believe that the complexity of their IT environment is hindering their ability to innovate.

Continue reading

Finding the right balance between business security and employee productivity

Don’t you wish you could give your users all the access they need, without worrying about them becoming frustrated with the increased security measures put on the business and then taking actions into their own hands to avoid those security measures in order to remain productive? Simply providing users with IDs and passwords for each application or data set will not keep your business secure…or productive... anymore. A truly successful security strategy must look at information in context, exploring the "who, what, when, where, and why" of access activities. Your strategy must understand where gaps exist, while supporting secure and convenient access to both legacy and emerging applications for users -- who expect to stay productive -- and the IT staff responsible for keeping the business secure.

The theory behind security is noble: IT should ensure that only approved users can access systems and data, that they access them only for the right reasons, and that they’re doing the right things once they’ve gained access. In practice, though, security has been a static process of IT administrators saying "no", denying access and placing barriers (multiple passwords and access protocols) between users and the resources they need to do their jobs.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.