Cloud adoption set to rocket in 2015
A global survey carried out by Equinix has found that, over the next 12 months, the majority of business applications will be deployed to not just one, but multiple clouds across several geographies.
Of the 659 respondents, 77 percent said they planned to deploy to multiple clouds in the next 12 months and 74 percent expected cloud services to command a larger budget in 2015.
NoSQL is much more than just the cherry on top of the company cake
How do you define the success of a technology implementation? Should it be judged by how it helps to add short-term value in certain individual areas of business? Or should the yardstick be its ability to enable your entire organization to take a giant leap forward?
Clearly, it’s not possible for every piece of hardware or software introduced within a business to have a revolutionary, transformative impact. However, perhaps it’s worth considering whether or not you are at least maximizing the impact of the tools you have at your disposal and using them to drive as much value as you can. It’s important to remember that the elephant in the room in every technology purchase, is the question of 'why?'
Managing mobility in the age of BYOD
Mobile device management (MDM) solutions have been an enterprise mainstay for years, enabling IT to manage enterprise-owned smartphones and tablets in a way similar to how PCs and laptops are managed -- by taking complete control of them. But when it comes to personal mobile devices entering the IT environment via bring-your-own-device (BYOD) programs, MDM solutions struggle to provide the flexibility that IT now requires.
As the name states, MDM is focused on managing devices. It allows IT to control the entire environment of a smart device: provisioning, tracking usage and location, enforcing policies, ensuring security encryption, pushing approved enterprise apps to the device, and locking the device down or wiping it if necessary. It is a heavy-handed but very useful approach to managing corporate-owned smartphones and tablets. When it comes to personally owned devices, however, IT cannot take the same approach. Users don’t want to give IT complete control over their device. They don’t want their usage and location tracked when they aren’t at work. They don’t want to be limited in the kinds of apps they download and use. And they don’t want to give IT the power to access or wipe personal information, such as photos and text messages.
The nightmare challenge of developing apps for iPhone 6
The growth of mobile is considered to be the biggest shift in technology since the arrival of the internet. IDC’s mobile phone forecast predicts that total sales of smartphones will reach 1.2 billion units before the end of the year, a 23.1 percent increase over 2013. With the use of mobile devices now intrinsically linked to everyday life, it’s easy to see why British companies busy building apps for smartphones and tablets are forecast to generate £4bn in revenues this year.
The launch of the iPhone 6 and 6 Plus on September 9 created great commotion. Choose any major city, anywhere in the world and the scenes outside of Apple Stores on 9 September were the same. Hordes of consumers of all ages, social standings and demographics spent hours, and in some cases days, queuing as they waited to get their hands on the latest offering. In Australia Jack Cooksey, the first person to buy the iPhone 6, inadvertently crash tested it live on national television -- which has since gone viral. If we put the initial consumer excitement and hype to one side, the introduction of Apple’s largest ever handsets does present some very positive features. You have a larger screen, which obviously means more display space. The larger screen also means bigger virtual buttons within apps which (from a marketing perspective) enables organizations to drive more types of engagement on screen without cluttering the display. However, all of these new features and opportunities in the new handsets also inevitably complicate things for mobile app developers.
Businesses underestimating the Wi-Fi demand caused by BYOD
Enterprises continue to struggle with Bring Your Own Device (BYOD) as employees continue to demand the freedom that comes with mobility in accordance with new trends. Security has long been discussed as the primary challenge when it comes to BYOD. Yet, other reasons such as network access is fast becoming a key concern for IT departments but also the key frustration for employees.
When it comes to connectivity, employee expectation is that it just works and as such this expectation must not be overlooked when implementing a BYOD roll-out.
New report claims 81 percent of Tor users can be identified
A new report claims that more than 81 percent of Tor users are identifiable using a method that threatens Internet anonymity.
The study, titled "On the Effectiveness of Traffic Analysis Against Anonymity Networks Using Flow Records", claims that a technique known as traffic confirmation can be used to identify users.
81% of businesses set to move from Windows Server 2003 before support ends
A new report shows that the vast majority of businesses who are still running Windows Server 2003 are planning to upgrade before support for the OS ends on 14 July 2015.
This survey comes from Avanade (it was conducted by Vanson Bourne), and found that 63 percent of businesses are still running Server 2003. 81 percent of IT professionals whose company was still using Windows Server 2003 said they would shift from the platform before the deadline next summer.
Jolla teases 'something BIG' is coming
Wearhaus unveils 'social headphones'
If you’ve ever been to a silent disco, you’ll know that listening to music through a pair of headphones doesn’t necessarily mean that you have to shut out everyone around you.
Sharing music with friends that all wear headphones has traditionally been reserved for these kinds of parties, which is something the boys and girls from Wearhaus are trying to change.
How to overcome the hidden costs of virtualization
Virtualization has widely been seen as one of the most cost-saving server technologies to emerge in the last decade. The flexibility virtual machines allow to start up whole servers as and when they are needed, then shut them down when they are not, has in theory meant that general-purpose server hardware can be readily re-allocated from one task to another as necessary.
So there won’t be idle resources wasting money doing nothing, because that particular area has been over-specified. But the theory doesn’t always work this way in practice, as there can be hidden costs that the concept obscures. In this feature, we uncover some of these hidden costs, and discuss the steps a network administrator can take to address the impact.
ResMed unveils its non-contact sleep monitor
Sleep monitoring usually conjures up images of sensors placed all over the room or even in the bed making you think so much about the devices that you struggle to get off to sleep.
ResMed thinks it has the solution with its S+ system that it brags is the world’s first non-contact sleep system to come onto the market by using a wealth of data to give tips on how to sleep better.
Gartner: How Internet of Things will disrupt the world
Gartner research indicates that the rapid growth in the number of Internet-connected devices will become a powerful force for business transformation and will have a disruptive impact across all industries and all areas of society. Forecasts predict that 4.9 billion connected things will be in use by 2015, an increase of 30 percent compared to today, with the figure set to reach 25 billion by 2020.
Jim Tully, vice president and analyst at Gartner, explains how companies need to embrace IoT if they want to survive in the changing business landscape. "The digital shift instigated by the Nexus of Forces (cloud, mobile, social and information), and boosted by IoT threatens many existing businesses. They have no choice but to pursue IoT, like they’ve done with the consumerization of IT".
Is cyber insurance your last line of defense?
The recent spate of payment card breaches that have plagued the retail industry this year has prompted many merchants to consider investing in cybersecurity liability insurance policies to offset the costs associated with a breach recovery. These companies often make this choice based on the belief that the money they’ve spent to comply with industry security standards has failed to prevent these breaches from occurring, and there seems to be no other alternative. At least one recently filed claim has led to a lawsuit that will put these cybersecurity insurance policies to the test.
The key element of such lawsuits is determining liability -- who is at fault -- to determine whether the claims are justified and if the insurance companies will pay out. Finding a party liable for something means determining if the party was taking reasonable steps to prevent such actions from happening.
Mastercard and Visa working on new online payment verification system
Credit card giants Visa and Mastercard are planning to get rid of their current online security verification system, and replace it with something a bit more modern and secure.
You’re probably familiar with either Verified by Visa or MasterCard SecureCode, which pop up when you make an online purchase, just before the payment is officially put through. They ask you to input letters from an extra password to verify that it’s actually the card owner making the purchase -- but in contemporary terms, this is a relatively unsophisticated security measure.
WhatsApp and Facebook lead the way with global app engagement
Facebook’s stable of apps lead the way in Western Europe and around the world when it comes to user engagement on social media and messaging apps.
Mobidia’s new "Social Media & Messaging Engagement: Chat, Social, Videoconferencing, Rich Media and VoIP Apps" white paper found that social and chat apps dominate the top end of the mobile app usage scale and Facebook is a huge part of why.
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.