BetaNews Staff

Why you shouldn't embrace contactless payments on your phone

Changes in the payments industry are intrinsically tied to consumer behavior. How people pay, where they pay, and what they pay with, is determined by convenience.

As smartphones increasingly dominate the lives of consumers -- from how they search the internet to how they shop -- it is unsurprising that the next frontiers for payment innovation are widely anticipated to be within mobile commerce (m-commerce).

Continue reading

Kaspersky scanning your PC when visiting Facebook

Facebook has added security firm Kaspersky Lab to its roster of antivirus companies protecting its users from malicious software, the social media site has announced.

In a blog post by Facebook Security, the company said it is keeping users’ computers safe just by using Facebook, in the way that Kaspersky Lab, together with the likes of ESET, F-Secure and Trend Micro, runs a clean-up tool in the background while you use the social network.

Continue reading

Biggest healthcare technology advancements in 2015

According to the Association for the Advancement of Medical Instrumentation, "constant change is the new normal" for healthcare technology professions. Every year there are many impressive advances with medical equipment which allow medical professionals to manage diseases and improve the quality of lives for their patients.

Below we explain some of the most amazing hospital equipment technological advances of this year and what you can expect to see in your local clinics in future.

Continue reading

Google introduces Cloud Source Repositories -- new GitHub rival

Google closed its own project hosting site, named Google Code, earlier this year, in a move that allowed GitHub and Bitbucket to become the dominant platforms. The move away from project hosting only lasted a few months, with a new place called Cloud Source Repositories now available on the Google Cloud Platform.

Part of Google’s ever growing line of services on the cloud platform, Cloud Source Repositories allows users and teams to upload, build and deploy applications for the web and mobile.

Continue reading

Most IT pros will deploy Windows 10 in the next two years

A total of 73 percent of IT professionals will deploy Windows 10 within the first two years, a new report by Spiceworks shows.

The report, called Windows 10: Will it Soar? found that 96 percent of IT decision-makers are interested in Windows 10, and 60 percent of IT departments have tested or are actively testing the new operating system. The survey also found that 40 percent of companies plan to begin rolling out Windows 10 within the first year and an additional 33 percent expect to begin deploying Windows 10 within two years.

Continue reading

Android is the biggest target for mobile malware

Most of the malicious software for mobile devices targets Google’s Android operating system, a new report by Pulse Secure says.

Last year, almost one million individual malicious apps for Android were released, according to Pulse Secure’s Mobile Threat Report. That means the number of threats quadrupled in comparison to the year before.

Continue reading

Businesses struggle mining big data archives

Box file image

While some businesses saw an increase in revenue of more than £6 million, others struggle mining big data archives, a new study has shown.

The landmark study Mining for Insight: Rediscovering the Data Archive is an IDC white paper, just announced and published by Iron Mountain.

Continue reading

How to encrypt your emails

cloud encryption

If there’s one thing that Edward Snowden left us with, it’s the notion that our digital data isn’t all that safe and that the government knows what we did last summer. But in essence, that only applies to that data being created and used using standard tools -- emails, browsers, etc.

However, if you really want to keep your data private, including browsing history and email, there are ways to do it. They’re simple to use, accessible and close to impossible to crack.

Continue reading

Enterprise mobile apps to be in very high demand

The demand for new enterprise mobile applications is about to rapidly increase, a new research shows.

Sponsored by Kony, the new 451 Research global survey of IT management, IT development and line of business professionals found that more than half of the 480 respondents, from North America, Europe and Australia, plan to deploy 10 or more enterprise mobile apps during the next two years.

Continue reading

Box and IBM team up for cloud collaboration

IBM and Box have announced a global partnership that aims to transform work in the cloud by integrating existing products and services to develop new solutions for a range of industries and professions.

Box will combine its collaboration platform with IBM’s extensive portfolio of solutions in security, analytics, content management and social capabilities to partner in three key areas:

Continue reading

How six top companies are growing in the fierce tech world

buisness growth graph

Each year the technology industry is met with a number of challenges and the companies who rise to the top are those able to meet these challenges head-on and eradicate problems before they arise. So what companies have been able to do that most recently? This year, there seems to be six top tech companies that have proven themselves as industry leaders and overcome their roadblocks in unique ways.

It’s not easy rising to the top of the technology industry, particularly because so many other companies are vying for the spot. It seems industry leaders don’t necessarily make their efforts known, but rather go about their business as usual, finding new ways to transform processes. These companies create platforms that meet business and consumer needs, applications and tools that facilitate better business networking and promote sales, solutions that not only resolve problems but also prevent further issues, and so much more. When it comes down to it, these companies not only make technology better, they make the world better.

Continue reading

How to avoid total disaster while moving applications to the cloud or a data center migration

umbrella

Whether you’re the CIO of a large corporation or run your own enterprise, it’s imperative that you understand the benefits, as well as the inevitability, of data center migrations. Migrations advance business practices by creating greater tactical efficiencies, agility and by reducing costs. Because they provide such great opportunities, migration plans are often high on the list of strategic projects for CIOs, IT managers and other managers involved in corporate plans.

However, despite the hype, companies need to understand that data center migrations are among the riskiest and most complex undertakings an enterprise can pursue.

Continue reading

Internet of Things apps can be very profitable

Mobile cash

Although the Internet of Things is often regarded as a technology that is yet to really burst into life, a recent study reveals that it can already be hugely profitable.

An industry survey conducted by Progress and Harbor Research has found that 65 percent of IoT apps are generating revenue, with this figure expected to hit 80 percent by 2018.

Continue reading

Parents, keep your children safe online!

Google sets its sights on kids with child-friendly versions of YouTube and Gmail

Children are always just one click away from harmful content, and it’s the parents’ job to keep them safe, that’s the message of a new campaign for greater protection of children online.

The campaign, kicked off by Internet Matters, is called Protect Their Curiosity, and is urging parents to enable parental controls on all internet-enabled devices that children have access to.

Continue reading

Is Google Chrome spying on you?

Snooping

It seems as Google’s software, with the ability to listen everything being said in a room, was being installed on computers without the owners’ consent, and everyone’s freaking out about it.

It was first spotted by open-source developers who noticed that Chromium (open-source basis of Chrome) began remotely installing audio-snooping code that was capable of listening to users, The Guardian wrote in a report.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.