Microsoft and iFixit launch a new gadget repair site
Microsoft and gadget repair website iFixit have announced the launch of Pro Tech Network, a service designed to teach more people how to fix gadgets.
The partnership should help give people the skills they need to fix devices, set up businesses and recycle the valuable materials within electronic products.
IBM signs landmark cloud computing security deal in China
In a country where state-owned enterprises are increasingly rejecting foreign technology that pose "security risks," IBM has revealed it will be helping bolster the security of a Chinese financial data firm using cloud-based risk analysis.
It's a significant move that executives are hailing as a model for future business in China, encouraging the country to embrace foreign technologies rather than shunning them.
Addicted to gadgets and constantly tired? That's the modern world!
The signs it's time to pull out of Bitcoin investment
7 essential Nokia Lumia 930 tricks and tips
Windows Phone handsets don't get more advanced than the Nokia Lumia 930. Its large screen and top-notch features make it a leading light, and it is the current flagship Nokia Lumia smartphone.
The Lumia 930 comes pre-loaded with Windows Phone 8.1, the latest version of Microsoft's mobile OS, and so there is plenty of good stuff for new owners to get their teeth into. I've teased out some of the key features here, so read on to learn more.
Advanced threat detection is more than a single moment in time
The changing nature of the threat landscape, and the ever-growing sophistication of hackers, means that the way organizations protect themselves against advanced cyber-attacks must change too. Hackers are no longer focused on what was traditionally deemed to be their destination -- the perimeter of the enterprise. They're now focused on the journey itself, leveraging an array of attack vectors, taking endless form-factors, launching attacks over time, and cleverly hiding the leakage of data.
The reason that many of them are successful, is that most security tools today focus on prevention only -- controlling access, detecting, and blocking, all at the point of entry. Typically, incoming files will be scanned only once, at an initial point in time, to determine if they're malicious.
Microsoft posts its worst-ever quarterly Surface loss
Microsoft’s Surface range of tablets has posted its worst single quarter loss since its launch leaving analysts to question whether the fledgling slate is still a viable option for the company.
Two separate sets of figures show that the Surface line of slates ended up posting negative gross margins for the final quarter of FY2014 and the experiment has ended up costing Microsoft $1.73 billion since it first launched.
Spreadsheets causing problems for small businesses -- according to Intuit
Some people love spreadsheets, it's a fact. It's also a fact that a lot of people dislike spreadsheets, and for companies that use them every day, their less-than-efficient aspect can be a hindrance to growth.
Or so says research from Intuit -- an online accounting software provider -- in an investigation of 200 UK small businesses.
BlackBerry now 'well on its way to recovery'
After slashing 60 percent of its workforce in a brutal three-year period of restructuring, it looks like the tide could be turning for beleaguered BlackBerry and its smartphone business.
An internal memo from CEO John Chen to all company employees was picked up by Reuters, revealing that BlackBerry has plans to grow once more.
Using monitoring to increase productivity
As the global recession recedes, economists are still puzzled by lagging productivity. Despite all the signs of recovery, workers are still producing less output per hour than they were before the crisis; robust economic growth will not return until productivity increases. IT’s role in driving growth has been considered in depth. The consensus is that increased investment in technology will help deliver much-needed boosts in productivity.
A study by the Center for Economic and Business Research has shown that since the 1970s, technology has increased the efficiency of office workers by 84 percent. Now, with businesses leaving years of uncertainty behind, investment in IT is beginning to pick up again. The most recent Gartner Worldwide IT Spending Forecast showed that global spending on IT devices will grow by 4.4 percent to some $689 billion this year. With this new technology, we should see productivity begin to increase.
Researcher claims passenger planes are vulnerable to cyber attack
A cyber security researcher has worked out ways to hack into passenger jets through the plane's Wi-Fi and inflight entertainment systems.
If confirmed, the claim could prompt a comprehensive restructure of aircraft security, and cast new scrutiny on the way aircraft electronic security has been managed in the past.
5 steps to the perfect mobile web strategy
It's not commonplace, but every so often, businesses tell me that their mobile traffic is still too low for them to make it a priority over the traditional PC web. In truth, the low traffic is probably a direct correlation to the poor user experience their visitors have when accessing a non-optimized website via a mobile device. It's a vicious circle, but things have to change.
Not having a mobile web strategy for a consumer-facing company means you're ultimately moving against the market and no business should be swimming against such a powerful tide as that means being left behind. So what is a good mobile web strategy? Here are five key questions you need to answer to know if your website is mobile ready.
China bans Kaspersky and Symantec antivirus
China has come down hard on US-based security company Symantec and its Russian counterpart Kaspersky, removing it from the list of approved antivirus providers in Chinese government computer systems.
The news comes amid a move from the Beijing government to limit Chinese dependency on foreign technology firms.
Research claims nearly one in ten Android apps is malware
As many as 9 percent of Android apps are fully or partially malware, according to a new piece of research, although the majority of the blame (as ever) lies with dodgy third-party app stores particularly in Asia.
The figure comes from Cheetah Mobile's latest security report for the first half of 2014, which collected 24.4 million sample files during those six months, and found that 2.2 million were viruses.
Wearable technology is easily tracked
Users of wearable technology can have their information tracked with just $70 worth of hardware, according to a new study.
Research carried out by security firm Symantec used a simple set-up combining a Raspberry Pi computer and a Bluetooth radio module, to scan for signals. The technology was taken to parks and sporting events where it was able to record data being broadcast from gadgets close by.
© 1998-2026 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.

