BetaNews Staff

Choose a cloud vendor that meets your needs

There is little doubt that cloud will play an increasingly important role as more and more organizations adopt cloud based strategies to underpin their IT infrastructures. Indeed, cloud hosting offers a wide variety of advantages to companies with the expertise to take advantage of it. Applications can be rolled out faster, resources can be rented rather than purchased and infrastructure can be right-sized to support monthly and seasonal peaks.

However, a global survey commissioned by iland in April 2014 and undertaken by analyst firm Enterprise Management Associates (EMA), highlighted that there are also plenty of challenges when moving to a new cloud based infrastructure. In fact, 91 percent of those surveyed experienced at least one unexpected challenge when moving to the cloud with pricing, performance, scalability and location all topping the list of issues.

Continue reading

What's your password backup plan?

cloud lock

After news broke earlier this month that hackers had gotten their hands on nearly 7 million Dropbox login credentials, the familiar media chorus of password safety tips soon followed. You likely saw the headlines: "How to Change Your Dropbox Password". "It’s Time to Enable Two-Step Authentication on Everything". "Never Ever Reuse Your Passwords".

It’s not that good password hygiene isn’t important. Enabling two-factor authentication, not using the same passwords for multiple sites, changing passwords every couple of months -- these are all aspects of a smart and savvy approach to protecting the files and data that you store online. But they’re not foolproof. As hackers grow increasingly sophisticated, even users following all the "rules" may see their login credentials compromised as part of an attack. Additionally, for companies whose employees use consumer-facing platforms, enforcing password safety rules can sometimes be a challenge. Whether it’s a result of hacker expertise or human error, when passwords fail, companies must make sure they have a backup plan in place.

Continue reading

How multimodal biometrics improves border control security

The use of biometrics by border control agencies worldwide is now commonplace. Many countries around the world are deploying or have already deployed biometric border security systems for accurate and fast identification of citizens and foreign travelers.

Border security biometric systems include national database deployments in entrance and exit systems, immigration, and e-passports, to track and manage the flow of humans across borders. More sophisticated technologies like multimodal biometrics identification are now considered more reliable to improve border control security.

Continue reading

UK national videogame museum set to open in 2015

A videogame museum is opening in Britain that hopes to become the "hub for videogame culture".

The National Videogame Arcade in Nottingham will display a selection of highlights from the National Videogame Archive, a collection of 20,000 objects owned by the Science Museum.

Continue reading

The NHS is still clinging on to Windows XP

NHS Trusts across the UK are risking a security meltdown due to the widespread presence of Microsoft’s outdated Windows XP OS with the government looking at another £5.5 million bill from Microsoft for support.

Citrix, the mobile workspace company, filed a freedom of information act request that found all the of 35 NHS Trusts questioned are still using Windows XP and that just five are utilizing desktop virtualization technology to handle migration away from it.

Continue reading

How to defeat network zombies this Halloween

Zombies are a staple of the horror film industry despite being absurdly ill-equipped to play the role of a predatory force unleashing Armageddon on the human race. They're embarrassingly slow and brainless, for starters. They have terrible personal hygiene, can't operate machinery of any kind, they can't drive and they even don't know how to use a computer or a smartphone. As if that wasn't bad enough, no one has properly explained why some people they kill become zombies and others are completely gobbled up.

Network zombies, on the other hand, are an all too real menace for the modern-day IT administrator. They are smarter than the average zombie, impossible to predict because they appear randomly without warning and dangerous because they cause downtime and lost productivity. Without the right approach, they are nearly impossible to locate and kill.

Continue reading

How mobile users think and behave online

The lines between business and personal mobile use are blurring as the way consumers use their devices becomes increasingly diverse. This is leading mobile users everywhere toward an always-connected existence, dominated by mobile devices, and where brands must work even harder to meet their visitors' needs.

With this in mind, Netbiscuits recently conducted a survey of more than 6,000 consumers from six countries, asking them for their insights and thoughts around mobile web usage and behavior. Here, Netbiscuits CEO Daniel Weisbeck recaps the top ten findings from the UK, US, Germany, China, India and Brazil.

Continue reading

How video conferencing helps businesses cut costs

While successful businesses vary wildly in how they operate, one aspect seems to be shared -- an established communication system, both internally and externally. Through this communication infrastructure, high-level leaders can stay connected with corporate leaders, managers, and lower-level employees, allowing for precise instructions, procedures, and overall progress, to be effectively communicated and comprehended by all parties involved.

The problem most businesses encounter is maintaining that line of communication. This is especially true for larger companies with establishments in various locales.

Continue reading

Tor user? Your computer could be infected with malware

Authorities are advising all users of the Tor network to check their computers for malware after it emerged that a Russian hacker has been using the network to spread a powerful virus.

Tor, which began as a secret project from the US Naval Research Laboratory, works by piling up layers of encryption over data, nested like the layers of an onion, which gave the network its original name, The Onion Router (TOR).

Continue reading

Keyless cars being targeted by high-tech thieves in London

Thefts of cars that use keyless fobs to gain access are on the rise after criminals gained the ability to hack into the car’s onboard computer and it is causing some luxury car owners to be refused insurance.

The Society of Motor Manufacturers [SMMT] reports that organized crime syndicates have been able to bypass the onboard security by using software only meant for mechanics and start vehicles using the ignition button present in many high end models, such as Range Rovers and BMWs.

Continue reading

Dell Optiplex 3020 Micro: A business PC that's small enough to fit anywhere [Review]

The miniaturization of components for the benefit of notebooks has had a knock-on effect for desktops. Using some of the same components, desktops can be made a lot smaller too, or even designed to fit behind a screen for an all-in-one system. The Dell Optiplex 3020 Micro is almost a notebook without a screen, but if you want a tiny no-nonsense system that will be almost invisible on a desk, or even fitted underneath, there is plenty to commend it.

The Dell Optiplex 3020 Micro's name is a little confusing, because there are actually two larger Optiplex 3020 models; only the word Micro denotes the rather different specification of this system. Measuring just 18.2cm along its longest edge, and weighing a paltry 1.28kg, the Micro is much smaller than the Minitower and Small Form Factor versions of the 3020. It's designed to sit flat on your desk, or an optional stand can be used to stand it vertically. There are VESA mounting options too, plus an all-in-one mount and a console including a DVD rewriter.

Continue reading

UK porn sites may have to implement over 18 age verification

In a push for a more family-friendly Internet, the UK government is considering plans that could mean porn and adult websites will soon have to verify that visitors are over 18 years of age.

The legislation is being drawn up by the Department of Culture, Media and Sport (DCMS), and would initially only affect UK-based websites. Similar to the verification tools already in use by gambling websites, the plans would also affect the owners of domains that sell guns or any other kind of adult content.

Continue reading

Building and securing the connected cars of the future

The number of people living in cities is expected to double by 2050, meaning congestion and pollution will increasingly be a problem for city dwellers. As a result the cities of the future will demand smarter traffic management solutions and more intelligent vehicles.

Experts say that car industry will develop more in the next decade than it has in the last fifty years due to the rise in connectivity and mobile technology. The industry is gearing itself up for the age of the 'connected car' but how will this manifest itself? What will cars look like five, ten even twenty years from now?

Continue reading

What is Magic Leap, the mystery startup valued at $1bn?

Silicon Valley startup Magic Leap is valued at over $1 billion. It just announced the close of its $542 million (£338 million) Series B, featuring investors led by Google, Inc., and including KPCB, Andreessen Horowitz, Obvious Ventures, Qualcomm and Legendary Entertainment. But there's a catch: no one quite knows what it is.

We love a good "mysterious startup" story, and Magic Leap has set our mystery senses tingling. The website for the startup is suitably vague, featuring only a beautiful animation of a tiny pint-sized elephant rearing and trumpeting out of a person's cupped hands. And a trippy picture of a whale flying over a beach.

Continue reading

The mobile device is the new company car

I've been in the market long enough to have lived the glorious years when as a salesperson, you would join a new company primarily because of the salary and benefits it offered above any other consideration.

At that time, one of the important benefits was the company car, and once you had it, the next question was; how flexible would the company be around its use?

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.