Tagged With software

2

Most people are familiar with firmware on a very basic level given that they are often prompted to download firmware updates on computing devices such as smartphones, laptops, printers and routers. Yet many are oblivious to the potential security risks that firmware can bring. To address this, Google's malware scanning service VirusTotal can now help users identify harmful firmware.

3

When you're working on an app, as an individual or in a team, it's easy to let some of the smaller problems slide such as bugs that are not deemed to be high priority. But these small issues can pile up and before you know it they turn into a big problem that you can't ignore. Here are four simple rules to fix this.

2

We often wish to share electronic documents with friends, colleagues, business or government, and the software application we use to prepare these documents will save them in a particular format.

Any application that later loads the document will also need to be able to understand this format. If an organisation can control the format, and convince people to use it, then they can use this as a very powerful tool to create a monopoly in the market.

0

Over a decade ago, Atlassian created Jira, a bug tracking tool that has evolved and gained popularity with software developers for tracking and planning projects. It's the product that made Atlassian the most successful Australian startup and it has now been split into three standalone offerings to make it more accessible to business users, not just software developers.

2

Software development is a dynamic industry and developers are finding it a challenge to stay on top of new technologies for their profession. That's according the Applications Developers Alliance's first ever Developer Insights report. We breakdown the results the report's results.

5

We've been through the shareware era. We have donationware, subscription software and plain, old buy-it-in-a-box software. But the latest way to "pay" for software is by giving apps permission to access your location, camera and other data on your smartphone.

1

Selling a computer, smartphone or tablet should be as easy as wiping all your personal data off of it and handing it over to the buyer, but sometimes there are little hidden authentication tricks you might forget about. From iTunes to the Kindle app, here's everything you need to deauthenticate before you sell your device.

1

When your workplace shifts into a bring-your-own-device (BYOD) model, whether willingly or unwillingly, it quickly becomes apparent that full-blown office suites designed for keyboard and mouse access aren't going to be as useful. One solution to that dilemma is to develop single-purpose apps for tablets and mobiles. But how quickly can they be deployed, and will businesses cough up the money needed to build them?

0

People who use mobile devices to monitor their health may be surprised to hear that up until now, there has been little definitive guidance on what medical apps need regulatory approval. In some cases, this represents a real risk as mobile phone apps and devices attached to phones come onto the market that can measure everything from blood pressure to blood sugar as well as tell you what is in your urine.