BetaNews Staff

How schools can use eLearning tech to keep up with Generation Z

It's well known that the Millennial Generation or the so called Generation Y who were born after 1982 are having a profound effect on business and government as they become workers and citizens.

But, what's also becoming apparent is how the children of the Millennials who have never lived without digital technology are going to shake up how our educational systems use technology for teaching and learning. These digital natives, often described as Generation Z, are entering schools and colleges with a digital outlook and set of behaviors that educational institutions need to respond to and harness.

Continue reading

How to avoid a big data nightmare

data overload

Big data is no longer just the domain of big companies. As the perception of big data moves from futuristic hype to real-world opportunity, the promise of improved decision making, increased operational efficiency and new revenue streams has more organizations actively engaging in data analysis projects than ever before. That no longer only means more enterprise organizations, either. Midmarket companies are jumping on the big data bandwagon in a major way.

In fact, a recent survey by Competitive Edge Research Reports indicates that an astounding 96 percent of midmarket organizations are either already in flight with a big data initiative, or plan to start one in the next year. That's a whole lot of companies whose big data projects are either going to sink or swim in the very near future.

Continue reading

BlackBerry creates new Technology Solutions unit for key assets

Blackberry has announced that it has a created a new unit to group together its most important assets. The new division will include the firm's cryptographic applications, its QNX embedded software and Project Ion platform for connecting devices.

The project has been dubbed the Blackberry Technology Solutions unit and will be led by Sandeep Chennakeshu, who was previously chief technology officer at Sony-Ericsson and president of Ericsson Mobile Platforms.

Continue reading

Is a lack of Wi-Fi truly good for business?

As the world packs its bags and forms an orderly queue in crowded departure zones, the plethora of smartphones, tablets and laptops coming along with us, highlights a need to stay connected on holiday. This is the age of the connected consumer. As travel surveys and online review sites repeatedly confirm, the most important amenity for the connected consumer is Wi-Fi.

Whether venues like it or not, wireless internet access is now as important to customers as electricity, or water in the bathroom, and for many more important than a clean room or a brilliant hotel restaurant.

Continue reading

Emerging markets say 'bigger is better' when it comes to smartphones

A new report from market research firm Jana has revealed that emerging markets prefer smartphones with a larger screen -- that is, "phablets".

Out of 1,386 smartphone users, over 50 percent of users expected their next phone to have a screen that's at least 5in or larger. The reason for the popularity of a large screen is that for many users in emerging markets the smartphone is their only portal to the Internet.

Continue reading

GCHQ accused of scanning entire nations for hacking vulnerabilities

The UK's Government Communications Headquarters (GCHQ) spy agency has been exposed scanning entire countries for server weaknesses that allow it to exploit vulnerable ports. According to reports, it does this using a tool called Hacienda, which is Spanish for estate.

The accusations came out in German newspaper Heise. "In 2009, the British spy agency GCHQ made port scans a 'standard tool' to be applied against entire nations," Heise reports. "Twenty-seven countries are listed as targets of the Hacienda".

Continue reading

Understanding the key trends in application development

Having recently attended Enterprise Apps World in June, I thought I would share my key takeaways from the show. It's clear that most organizations are looking at the implications of going mobile and are considering how enterprise apps will work within their mobile strategy.

IT teams are working to increase the productivity of their developers to build enterprise apps faster and more cost effectively, ensuring that they are multi-channel and built for mobile. As a result agile development is now a reality, and as an industry we have moved away from the old "waterfall" development days when big projects included long delivery times. Now businesses are looking for rapid response to change and incremental releases, as well as a time boxed development approach.

Continue reading

Battery-saving InkCase+ enters full production

E-Ink displays for smartphones are on the way after Oaxis’ InkCase+ concluded its Kickstarter campaign with over double the funding that it needed.

Oaxis’ 30-day campaign concluded with $207,073 raised from 1,516 backers and the original goal took under three hours to fall before it accelerated on to a level that saw two new rewards introduced for backers.

Continue reading

The right way to manage the downsides of BYOD

For many organizations, bring your own device (BYOD) is now a fact of life. More than 70 percent of employees use their own smart phone or tablet to access corporate data. However this doesn't mean we should simply accept the trend and moving on. While many organizations have seen benefit in exploiting employees' willingness to invest their own money in mobility, others have seen a rise in cost and complexity.

The built-in assumption that organizations will save money under BYOD by sidestepping the cost of devices doesn't tell the whole story. The price of mobility goes beyond hardware and there are a number of hidden costs under BYOD that mobility managers need to grapple with.

Continue reading

Harvard scientists develop a self-organizing thousand-robot swarm

The Harvard school of engineering and applied sciences (SEAS) have created the "first thousand-robot flash mob". The swarm consists of 1,024 "kilobots" that collaborate and provide "a simple platform for the enactment of complex behaviors".

Michael Rubenstein, a research associate at SEAS, said "Biological collectives involve enormous numbers of cooperating entities -- whether you think of cells or insects or animals -- that together accomplish a single task that is a magnitude beyond the scale of any individual".

Continue reading

Inside the dark underworld of cybercrime

Anyone who reads the news will have a clear idea of what "crime" involves. There are guns, welding torches, gangsters marauding through banks armed to the teeth. But the true extent of illegal activities stretches far beyond the violent crimes we are all too familiar with, and into a world where criminals operate comfortably from behind a screen.

In fact, the underground Internet economy of cybercrime is a mirror image of the world we see every day. There are employees, bosses and online marketplaces, as well as corporations that could give even some of the largest Silicon Valley giants a run for their money. It's a world where, instead of trading goods such as clothes or bicycles, people trade and sell illegal data, as well as the tools used to obtain it.

Continue reading

Google vs the British government and the fight to be forgotten

The current uproar around various facets of data collection and use -- be it "the right to be forgotten" or the emergency data legislation being considered by Prime Minister David Cameron in the UK -- is divisive to say the least.

If your only source of information is the mainstream press, you’d be forgiven for thinking it comes down to two immiscible sides of an argument. On one side there’s the posited right for governments and people to access whatever information they need, whenever they need it. On the other side are those who believe that they have an absolute right to privacy, whatever the threats governments say we’re facing.

Continue reading

Dell Latitude 13 Education Series 3340: The perfect notebook for school use [Review]

If you're specifying a notebook for your kids or your school, the attractive world of ultra-portables probably won't be top of your list of possibilities. Robustness, durability and value are far more likely to be your chief considerations. Dell's Latitude 13 Education Series 3340 is designed specifically to satisfy this kind of need. It's clearly built to last, and has both a specification and price that should appeal to the target audience.

The Latitude 3340 is not going to win any style awards, but it is very sturdy. The dark gray plastic chassis feels tough and is surrounded by rubber edges on the base and screen bezel. The hinge is similarly solid, and rotates 180 degrees so it can lie flat on the desk alongside the base, although the screen isn't touch-enabled so this facility is less useful than it could have been.

Continue reading

True password confessions of a security expert

Password tweezers

I have a confession. It's hard to admit, and I know it might make me a bit of a social pariah and an outcast in the industry I work in but I need to get this off my chest:

I used a single password for many online services *deep breath* for a long time.

Continue reading

Celebrities and identity theft

America loves celebrities. Scam artists, the only criminals we refer to as artists, are well aware of our fascination with the lives and sometimes untimely deaths of celebrities, and exploit this interest through a number of schemes aimed at turning the public's fascination into the identity thief’s treasure.

The sad and tragic death by suicide of Robin Williams has become the latest opportunity for identity thieves to exploit a celebrity death for financial gain. In one Robin Williams related scam, a post appears on your Facebook page -- it often can appear to come from someone you know, when, in fact, it is really from an identity thief who has hacked into the Facebook account of your real friend. The post provides a link to photos or videos that appeal in some instances to an interest in Robin Williams related movie or standup performances. However, in other instances, the link will appeal to the lowest common denominator and purport to provide police photos or videos of the suicide site. If you fall for this bait by clicking on the link, one of two things can happen, both of which are bad.

Continue reading

© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.