BetaNews Staff

What enterprise app developers need to know about iOS 8 and iPhone 6

The iPhone 6 and iOS 8 have well and truly captured the public's imagination. The opening weekend sales of the latest iPhone were the best ever for a new Apple model, selling close to 10 million units, and over 52 percent of existing Apple users have upgraded to iOS 8.

Consumer adoption is bound to spill into the enterprise, just like with every other iPhone, but when it does, what new features will enterprise developers have at their disposal when developing for Apple's latest hardware and software? After sifting through over 4000 new APIs, here are the top highlights for enterprise developers.

Continue reading

Preparing the enterprise for the wearable technology revolution

The future of wearable technology is so bright we’ll soon all be wearing Google sunglasses.  Juniper Research expects worldwide spending on wearable devices to jump from $1.4 billion this year to $19 billion by 2018.

In another report, ABI Research claims that sales of wearable computing devices will exceed 485 million shipments worldwide by 2018. "Wearable technology such as smart glasses and those used for healthcare are better suited for the enterprise as corporate-liable devices. Smartwatches, on the other hand, will most likely follow the trend of BYOD into the enterprise," according to Jason McNicol, senior enterprise analyst for ABI Research.

Continue reading

US government's top security contractor took months to notice it had been hacked

The US government's leading security clearance contractor has been the victim of a cyber-attack that took months to even be noticed, according to recent reports. USIS, which specializes in "providing information and security services to government agencies and commercial enterprises", has come under fire for failing to spot the potentially harmful infiltration into its computer systems.

The breach, which was first revealed by the company and government agencies in August, is said to have compromised the personal records of at least 25,000 employees at the Homeland Security Department, and is reported to have cost the company hundreds of millions of dollars in lost government contracts.

Continue reading

What the digital skills gap means for your business

I'm sure you're aware of the looming "digital skills gap" and the terrifying figures attached to not addressing the problem. However in order to find a solution to the digital skills crisis, we must first define exactly what digital skills are.

In this article we spoke to Nick Millman, managing director at Accenture Digital UK, about defining what digital skills are and how the gap will affect your business.

Continue reading

Facebook explains why it split Messenger from main mobile app

Facebook CEO Mark Zuckerberg has finally explained the reason behind the company's decision to split Facebook and Facebook Messenger into two different mobile apps.

He said that the Facebook app was weighing down on messaging, making communication more difficult and slower.

Continue reading

Data breaches can have major consequences

Everything in life has consequences, and that goes especially for data breaches. Big data holds a significant amount of information that can lead to the identification of individual users -- this makes the privacy of users a primary concern and also means that the consequences of a breach can be even more damaging than usual.

Following a big data breach, not only does the aftermath serve to disrepute an organization, but it can also have a negative impact from a legal stand point. A security breach will affect a significantly larger group of people; therefore, organizations have to ensure that they achieve the correct balance between the use of the data and their users' privacy.

Continue reading

Privacy battle on the horizon

The new internet protocol known as Multipath Transmission Control Protocol enables easy privacy invasion, but also secures today’s networks.

On the internet, your traffic is not your own -- no matter how you roam. New multipath technologies, including one found hidden dormant in the internals of the newest Mac operating system, OS X 10.10 Yosemite, may provide consumers with more tools to gain control of their online communications. However, this freedom comes at a price, which network operators may not be willing to pay.

Continue reading

Flashback Friday: How Nokia went from paper merchant supplier to mobile phone giant

Let's face it, Nokia has seen better days. The Finnish company, which was once head, shoulders and knees above the competition in the mobile arena, has seen its market share dissipate over the last decade or so, and its once all-conquering mobile business is now firmly within the clutches of tech superpower Microsoft.

However, I'll bet most of you didn't know that Nokia is actually far older than most of the giants that have swarmed all over its old territory. The company was around long before anyone had even dreamt up the concept of the mobile phone. The present day firm's origins can be traced all the way back to the 1800s -- seriously.

Continue reading

Google cuts its cloud prices by up to 79%

cloud cost

Google Cloud’s long-awaited price cuts have finally been announced with various new features coming as part of the decreases that follow earlier cuts by its two main competitors in the space in Amazon Web Services and Microsoft Azure.

The search giant cut some products by almost 80 percent and added direct peering, container scheduling and a new container engine built on Google’s Kubernetes technology.

Continue reading

The hybrid cloud is set to reinvent IT environments once again

Public and private clouds have been rapidly adopted by businesses around the world over the past few years. However, the debate over the pros and cons of each model has led to the emergence of a new type of cloud that allows businesses to avoid making compromises. The hybrid model enables organizations to enjoy a combination of the scalability and flexibility of public offerings with the manageability and security of their private counterparts, so it's unsurprising to see them becoming so popular. Indeed, Gartner predicts that by 2017, half of large enterprises will use hybrid cloud.

So what makes this model so attractive for businesses, and what does the future hold for the hybrid cloud?

Continue reading

SaaS vs locally-installed software: The truth behind the security myths

Cloud login

I recently read a LinkedIn discussion about SaaS vs. locally installed software. There were many myths presented, mostly to suit the agendas of the vendors and their respective technologies (I know, I know -- shocking that such things would happen on LinkedIn).

The discussion spiraled towards the (incorrect) conclusion that treasurers are paranoid about cloud software's security issues. However, I've not personally encountered such paranoia. What I've instead found is that treasurers are inquisitive about any pitfalls a cloud delivery model presents -- as they should be. Most often they will engage their IT colleagues to evaluate the security, infrastructure, and technology of any proposed third party solution. Treasury is not often equipped to make this assessment, and would otherwise risk falling prey to the agenda (and technology choices) of the vendors. Security assessments typically focus on three areas:

Continue reading

Texting drivers are fully aware of the dangers

A new survey suggests that the vast majority of drivers text while behind the wheel, despite being fully aware of the dangers involved.

The research indicates that 98 percent of motorists who own a mobile phone and text regularly are aware of the risks, yet 75 percent still admit to texting while driving.

Continue reading

5 things your CIO needs to know about identity

When CIOs talk security they often use words like "firewall" and "antivirus." Here's why today's technology landscape needs a different vocabulary.

Modern businesses are more open than ever before, but that doesn't mean they are more secure. On the business side, companies are taking advantage of cloud computing by focusing on their internal competencies and outsourcing what they can to third-party vendors. On the consumer side, employees armed with devices are increasingly demanding flexible and frictionless access to data from anywhere.

Continue reading

Rare Apple-1 sold by Steve Jobs is going to auction

A working Apple-1 computer, sold by Steve Jobs out of his parents' garage in 1976, is to be auctioned in December, with estimates suggesting it will sell for hundreds of thousands of dollars.

Earlier this week, Christie's claimed that the machine could reach more than half a million dollars, with an auction last month seeing another Apple-1 device sell for $905,000.

Continue reading

The Internet Arcade lets you play 900 gaming classics in your browser

Fancy a spot of retro gaming? Never mind faffing around with emulator software, these days you can play the oldies and goldies right in your browser -- and a new site which has just launched offers almost a thousand arcade classics.

The Internet Arcade boasts some 900 arcade games, and runs them via a modified version of the JSMESS emulator, which was tinkered with by the site curator Jason Scott.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.