Amazon sale ends today: Prime Day-style deals on Echo speakers, Kindles and Fire TV sticks

The Amazon spring sale is ending today, along with your chance to bag big discounts on a range of Amazon’s finest devices. We’ve seen the best prices of 2019 on the likes of the waterproof Kindle Paperwhite, Fire TV Sticks and multiple Amazon Echo smart speakers.

We aren’t expecting to see any better deals than this anytime soon, either. You certainly shouldn’t worry about Amazon suddenly dropping an even better Easter Sale this weekend, for example, as Amazon’s Easter Weekend deals last year were nothing worth remembering – so this is it! You might be waiting for Amazon Prime Day 2019 if you want to see some of these cheap deals again.

The best Amazon sale deals

Amazon Echo Dot | £49.99 £29.99 at Amazon
This is the best price Amazon’s most popular smart speaker has been this year. Actually, after a massively successful Christmas sales season, it was sold out until late March, making today’s £20 discount even better. This is likely to be the best price you’ll see before the Amazon Prime Day deals event in the summer.
View Deal

Amazon 4K Fire TV Stick | £49.99 £34.99 at Amazon
4K streaming from an Amazon device used to come via a large box, then a rather clumsy hanging dongle after that, but Amazon has now refined the powerful technology into this tiny stick and made it even cheaper than the older devices too. An absolute bargain at £34.99 especially with the new Alexa voice remote too.
View Deal

Kindle Paperwhite | £119.99 £99.99 at Amazon
Amazon revamped the already excellent Paperwhite towards the end of last year by waterproofing the design and making the backlit screen flush with the bezel, meaning you no longer have to worry about dust or strands of hair getting caught at the edge of the screen. All this without increasing the price! Previously if you wanted a waterproof Kindle you’d have to shell out for the top-end Kindle Oasis for £229. We’ll take this one for £99 instead thanks!
View Deal

Those are our favourite three deals in the Amazon sale today, but there are lots of other discounts available too. If you’re after a cheap smart speaker with a screen you might be tempted by the Amazon Echo Dot for £94.99 (save £25). If you want a bigger sound than the Echo Dot offers, the larger version is on sale too. Get the Amazon Echo for £64.99 (save £25). 

If you already have a great speaker setup at home but would like to make them ‘smart’ by adding Alexa features, you want to grab an Echo Input for £19.99 (save £15).

Need a cheap tablet? iPad ‘deals’ making you sad? Then how about this for a sweet deal? Get the Amazon Fire HD 8 for just £59.99 (save £20). That’s a great deal for a reliable slate. That’s only £10 more than the 7-inch version, but we’re not massive fans of that one as it doesn’t come with an HD screen.

The non-4K Fire Stick Stick is just £24.99 (save £15), making it a super cheap way to add smart features to your TV or add apps that your older smart TV might be missing – we find some older models don’t come with Amazon Prime video installed for example. To be honest though, we think it’s worth spending the extra tenner on the version we highlighted earlier instead.

There are plenty of other bargains to be had until midnight tonight too. TVs, laptops, coffee machines, smart home products, gardening items, DIY tools and so on. Hurry though as this Amazon sale ends tonight.

How to outsource software development successfully

The importance of technology to businesses across all economic sectors is at an all-time high. While medium-sized businesses and Fortune 500 companies have been competing to secure tech talent for the past decade and more, small business owners are beginning to realize that new technology and consumer-focused software is becoming a must-have for companies of every size.

The ultra-low unemployment rate of under 2% for software engineers makes the search for experienced programmers particularly difficult for all but the most recognizable of businesses. That’s why so many firms are turning to software outsourcing companies to help them secure the best tech talent, no matter where a particular software engineer is located. 

Read on to learn how to successfully outsource development for your business.

Choosing the right outsourcing partner

The single most important part of the software outsourcing process involves selecting the right outsourcing partner. The industry is bursting at the seams with new companies interested in capitalizing on the increasingly large tech industry; however, many of these firms simply do not have the experience or resources necessary to serve as a trusted business partner. 

When you begin your outsourcing search, it is important to look for things like a potential partner’s industry reputation, past work, recruitment process, and knowledge of the field. A thorough initial assessment will ensure that your next software development project begins on the right track.

Image Credit: Shutterstock

Image Credit: Shutterstock

(Image: © Image Credit: Wright Studio / Shutterstock)

Selecting the best outsourcing model

The first step in outsourcing development services is to figure out exactly what type of outsourcing model is right for your business. This process begins with an internal assessment, which involves taking an honest look at your in-house development team’s experience, capabilities, and weaknesses. Most companies do not maintain an extensive software engineering staff, for good reason, so there may be quite a few gaps to fill. In addition, it is important to properly assess your team’s project management skills and experience leading this sort of large-scale initiative. 

Once your initial assessment is complete, it’s time to look closely at the most popular software outsourcing models. Staff augmentation is one of the most widely-used partnerships. This outsourcing arrangement involves filling key weaknesses in your in-house staff by bringing in skilled software engineers on an as-needed basis. Alternatively, you may want to consider outsourcing development to an autonomous delivery team, which consists of a project manager, software engineers, and testers who can take an idea and create a piece of custom software with little supervision. This arrangement is particularly valuable for companies without the time or staff necessary to develop custom software in-house.

Set clear expectations

Perhaps the most frustrating situation that new managers can find themselves in is having spent several months and a huge sum of money collaborating with an outsourcing partner, only to realize that the final product does not meet expectations. Yet, many businesses find themselves in this exact situation during their first experience outsourcing development. 

The best way to avoid this scenario and ensure that your development project goes off without a hitch is to make sure that your goals and design expectations are as clear as possible from the very beginning. In addition, make sure that several assessment points are built into the process so that you can quickly identify progress and offer suggestions before too many resources have been invested.

Image Credit: Pixabay

Image Credit: Pixabay

(Image: © Image Credit: Pixabay)

Open communication

Setting up a clear line of communication from the very beginning of the project is crucial to success in your next software development project. The best software outsourcing companies will have a set of processes in place to ensure that you stay updated on your team’s progress (if using an autonomous delivery team) or that your outsourced developers are properly integrating into your team and following internal procedures (if using staff augmentation services). 

It is important that you speak with potential software outsourcing partners about their communication style and ensure that the strategy is clearly defined in writing. In addition, make sure to verify exactly what time of day your outsourced team is expected to be working if they are located in a different part of the world. 

Post-development strategy

So you’ve invested months (and possibly years) into developing this piece of amazing software. Where do you go from now? Many executives find that they were so busy focusing on completing this software development cycle that little thought was given to the post-release phase. 

The top software outsourcing companies will set up a maintenance plan at the start of the project, ensuring that there is a strategy to phase-out your augmented staff and redirect your in-house team’s attention once coding and testing are complete. Make sure that any potential outsourcing partners have a blueprint in mind on how to slowly phase-out contractors, train in-house staff on key responsibilities, and ensure that a regular software maintenance schedule is in place.

Paul Azorín, Founder and CTO at BairesDev

Go to Source

WiSA, the low-latency, wireless multi-channel audio standard is ready for take-off

There was a time when being an audio enthusiast meant living with wires. Lots and lots of wires. That was the price you had to pay for quality audio, especially if you wanted a home theater system with true surround sound. Well, if WiSA (Wireless Speaker & Audio Association) has its way—and considering how many industry heavyweights, including LG, Polk, and JBL are now on board, it likely will—your next audio system could be virtually wire free. Well, except for the wires in your power cables. I’ll get into that later.

First introduced way back in 2012, WiSA has largely been the province of all-in-one speaker/transmitter implementations from vendors such as Klipsh and Bang & Olufsen. WiSA is now concentrating on getting vendors of playback devices such as smart TVs and A/V receivers to support the standard—with great success. 

Why you might want WiSA

For starters, WiSA systems supports up to eight channels of uncompressed 24-bit audio. It’s super-easy to set up, and it eliminates cable connections between components, leaving only the power cables to worry about. WiSA delivers super-low latency, too—latency being the time it takes for an audio signal to travel from a source to emanate from the speaker.

enclave system hor Enclave Audio

Enclave Audio’s multi-channel WiSA audio system.

I’m not talking the 40-millisecond delay that’s considered low by the Bluetooth folks, but a mere 2.6ms at 96kHz sample rates (5.1ms at 48kHz), which is nearly imperceptible to humans. That means little to no compensation is required on the part of a TV or other audio device to keep audio in sync with dialog and on-screen action. That’s as great for watching movies as it is for playing video games on an Xbox or PlayStation.

What exactly is WiSA?

WiSA is an audio technology that establishes a discrete wireless local network exclusive to WiSA audio sources (TVs, receivers, video-game consoles, etc.) and destinations (speakers). It steers clear of with your Wi-Fi router and privately uses less-populated 5GHz frequency bands (with 24 RF channels available in the 5.1- to 5.8GHz spectrum) along with various techniques such as spread spectrum, error correction, and dynamic frequency hopping to avoid interference and maintain signal strength.

Earbuds, headsets, and portable speakers aren’t in the mix yet, simply because the current shipping module that Summit Wireless Technologies, Inc. showed me isn’t small enough for those form factors, and its power consumption is still too high. The specified power requirements, however, are stated to be about the same as that of Bluetooth. So according to WiSA, those types of products remain a distinct possibility. 

WiSA has a 30-foot range and supports 24-bit resolution with sampling rates of 44.1-, 48- and 96kHz without any compression or conversion. It can handle other sample rates by up- or down-sampling the material if the playback device doesn’t handle that natively.

If you’re not familiar, the CD standard is 44,100, 16-bit samples per second, which delivers a noise floor that’s low enough that most users won’t hear digital noise, and a sampling rate that’s fast enough to capture and play back frequencies up to 22.05kHz—that’s well beyond the range humans can hear. Supporting 24 bits delivers an even lower noise floor, and a 48kHz sampling rate takes care of supposed golden ears.

Google, Hyperledger launch online identity management tools

In two separate announcements last week, Google and Linux’s Hyperledger project launched tools aimed at enabling secure identity management for enterprises via mobile and other devices.

Google unveiled five upgrades to its BeyondCorp cloud enterprise security service that enables identity and access management for employees, corporate partners, and customers.

Hyperledger, the blockchain-based, open-source project under the Linux Foundation, announced that its Indy distributed ledger for identity management is now live after nearly a year of development.

Google wants to make its enterprise cloud platform the center of the universe for identity and access management (IAM) and security, according to Jack Gold, principal analyst with J. Gold Associates.

“Cloud, in the past, has been questioned by some organizations as not being as secure as on-prem[ises],” Gold said. “With these announcements, Google is trying to show that it can provide very high-level security features that are as good as, and in some cases even better than, on-prem solutions – even when running on their cloud.”

Google’s upgrades include context-aware enhancements through the launch of the BeyondCorp Alliance, which is a partnership with endpoint security and management vendors who feed device posture data into Google’s context-aware access engine.

context aware access high level architectu.max 1100x1100 1 Google

Context aware access high-level architecture

“Initially, we are working with Check Point, Lookout, Palo Alto Networks, Symantec  and VMware, and will make this capability available to joint customers in the coming months,” Google said in a statement.

Google’s G Suite customers will automatically get the upgrades.

There are a number of medium and some large enterprise customers who have standardized on G Suite, so the upgrades could prevent, “say, a hacker getting your credentials and trying to log in from London when the system knows you are actually in Boston,” Gold said.

“There is also an API that allows [identity and access management] functions to be added to any on-premises or public cloud web-based apps,” Gold continued. “It’s basically a service you can call. And they are working with the MDM vendors to make the link from devices to bring context info to the app servers in the cloud. This can help with access security and help avert data breaches.”

Additionally, Google added:

  • Security keys for Android phones based on FIDO (Fast IDentity Online) Alliance authentication standards, which it said will help defend against phishing attacks.
  • Cloud Identity enhancements, including single sign-on capabilities to thousands of cloud-hosted apps and integration with human resource management systems (HRMS).
  • General availability of Identity Platform, an encryption protected, single sign-in authentication tool.
  • And the availability of Managed Service for Microsoft Active Directory for select customers.

The most interesting upgrade, Gold said, is the addition of Google’s key technology to all Android phones (running Android 7 and above), which will turn the phone into a two-factor authentication device.

Everyone is carrying a phone these days, so the ability to work as a 2FA device without having to have something unique (like an RSA token), and [being] much more secure than via a text message, is pretty interesting,” Gold said. “It should be attractive and cost effective to many more enterprises beyond the extremely security-conscious regulated industries like financial and healthcare.”

Hyperledger Indy

Hyperledger Indy, a distributed ledger built for decentralized identity, leverages blockchain technology to create a platform for issuing, storing, and verifying credentials that are transferable, private, and secure.

“An enterprise can use Hyperledger Indy for managing employee identities and, with the right set-up and agents, manage them over mobile devices,” a Hyperledger spokesperson said via email. “However, the self-sovereign nature of Indy goes much further, as it lets individuals own their own data and creates trusted frameworks for employees, partners, customers, etc.”

With its activation notification, the Linux Foundation also announced it has a number of “diverse” people and organizations already building “real-world solutions” using Indy.

For example, the Sovrin Foundation has organized the largest production network powered by Indy. The Province of British Columbia was the first to deploy a production use case to the Sovrin Network with work on its Verifiable Organizations Network, a platform for managing trust at an institutional level.

Fintech firms, software makers, telecom providers and other businesses have joined forces to develop a blockchain-based network that will enable anyone to exchange digital credentials online and without the risk of unintentionally exposing any private data.

The companies are part of the Sovrin Foundation, a new nonprofit organization now developing the Sovrin Network, which could enable anyone to globally exchange pre-verified data with any entity also on the network.

The online credentials would be akin to identify information a person might have in a  physical wallet: a driver’s license, a bank debit card or a company ID.

Instead of a physical card, however, the IDs in digital wallets would be encrypted and link back to the institutions that created them, such as a bank, a government or even an employer, which, through the blockchain, would automatically verify information to a requestor.

The owner of the digital wallet can determine what information a requesting business receives, and no more.

British Columbia created an online directory service using an Indy-powered blockchain to enable businesses to quickly verify whether a client they’re dealing with is legally registered to do businessas as a corporation. The blockchain-based service can also find “Doing Business As” names registered by corporations.

In addition, BC’s blockchain ledger makes applying for credentials faster and less error prone, and issuing (and reissuing) credentials simpler and more secure, as well as being able to verify those credentials from anywhere in the world.

“Can we create a quick and easy way to navigate through the maze of services from your local, provincial, or federal governments?” BC’s product lead John Jordan said, referring to his time working for the federal government in Ottawa.

Jordan estimated BC spent about $1 million while Ontario and the Canadian government each spent another $300,000 to $500,000, mostly on salaries for a handful of developers to create the identify management system.

“We’ve got a $2 million investment that we’re all benefitting from, and we didn’t have to pay $2 million, right?” Jordan said. “So we actually saved taxpayers millions of dollars.” He noted that the larger team had richer ideas, delivered code faster, and tested it more thoroughly, a collaborative approach that benefited everyone.

Go to Source

Under-18s face ‘like’ and ‘streaks’ bans on social media

Facebook and Instagram face a ban on letting under-18s “like” posts on their platforms while Snapchat could be prevented from allowing the age group to build up “streaks”, under new rules proposed by the UK’s data watchdog.

The Information Commissioner’s Office (ICO) said these techniques exploit “human susceptibility to reward”.

This, it said, encouraged users to share more personal data and spend more time on apps than desired.

The proposal is part of a 16-rule code.

To ensure its success, the watchdog says that online services must also adopt “robust” age-verification systems.

Location tracking

In addition to calling for an end to children being exposed to so-called “nudge techniques”, the ICO advocates internet firms make the following changes among others for their younger members:

  • make privacy settings “high” by default
  • switch location-tracking off by default after each session and make it obvious when it had been activated
  • give children choices over which elements of the service they want to activate and then collect and retain the minimum amount of personal data
  • provide “bite-sized” explanations in clear language about how users’ personal data is used
  • make it clear if parental controls, such as activity-tracking, are being used

The ICO suggests that firms that do not comply with the code could face fines of up to 20 million euros (£17.2m) or 4% of their worldwide turnover under the General Data Protection Regulation.

“The internet and all its wonders are hardwired into their everyday lives,” commented Information Commissioner Elizabeth Denham.

“We shouldn’t have to prevent our children from being able to use it, but we must demand that they are protected when they do. This code does that.”

Her office is now seeking feedback as part of a consultation that will run until 31 May. It is envisaged that the rules would come into effect next year.

Bad nudges

Restrictions on Facebook’s like button – which registers a user’s interest in another user or advertiser’s post – and Snapchat streaks – which count the number of consecutive days two members have messaged each other – are not the only nudge behaviours being targeted.

The ICO also says that apps should not:

  • show boxes where the Yes button is much bigger than that for No
  • use language that presents a data-sharing option in a much more positive light than the alternative
  • make it much more cumbersome to select the high-privacy option by, for example, requiring more clicks to turn it on

However, the regulator said it was appropriate in some cases to use nudges that encourage children to opt for privacy-enhancing settings, or to take a break after using an online service for some time.

The ICO’s rules follow a proposal from the Department for Digital, Culture, Media and Sport (DCMS) for the creation of an independent tech watchdog that would write its own “code of practice” for online companies.

The suggestions have already been welcomed by the National Society for the Prevention of Cruelty to Children (NSPCC).

“Social networks have continually failed to prioritise child safety in their design, which has resulted in tragic consequences,” commented the charity’s Andy Burrows.

“This design code from the ICO is a really significant package of measures, but it must go hand in hand with the government following through on its commitment to enshrine in law a new duty of care on social networks and an independent regulator with powers to investigate and fine.”

The Internet Association UK – which represents Facebook, Snap and other tech firms – has yet to comment.

But the code has drawn criticism from the Adam Smith Institute think tank.

“The ICO is an unelected quango introducing draconian limitations on the internet with the threat of massive fines,” said its head of research Matthew Lesh.

“It is ridiculous to infantilise people and treat everyone as children.”

Go to Source

Outlook.com breach allowed hackers to read (some) emails for months

There’s some bad news for Outlook.com users, as it’s emerged that the webmail service has been compromised and some folks have had their accounts hacked, with the perpetrators even able to read emails in a limited number of cases – despite Microsoft’s initial denial that email content was viewable.

Details of the security breach were revealed when TechCrunch ran a report claiming that some Outlook.com accounts – and those with Hotmail email addresses (the old name for Outlook.com) or MSN.com users – had been compromised.

Apparently the hackers managed to get hold of a customer support tech’s login credentials, which they used to access the various consumer user accounts (paid business accounts weren’t affected).

Microsoft clarified that this “affected a limited subset of consumer accounts” and that the malicious activity began at the start of January 2019 and ran through to almost the end of March, so essentially lasted three months.

However, Microsoft said the hackers could only see the user’s email address, folders, and subject lines of messages (as well as addresses the user has emailed), but that they couldn’t actually read the contents of an email, or view attachments (or indeed gain access to the login credentials of the account).

The worry was that even limited information like email subject lines could enable malicious parties to concoct a more convincing phishing scam to aim at the user whose email they have (and they could also employ extra details like the names of friends, gleaned from the email addresses the user has contacted).

Emails have been read

However, it then emerged that matters were worse than Microsoft first admitted:  Motherboard spoke to a source who claimed that a ‘large number’ of accounts were affected, and what’s more, in some cases, contents of emails were read by the hackers – and Microsoft subsequently confirmed the latter was true.

Specifically, Microsoft admitted it had sent notifications of a security breach to some users which informed them that their email content had (potentially) been read, but that this only applied to a small amount of the affected users, around 6%.

We don’t know how many accounts that is, because Microsoft didn’t provide an estimate of the overall number of users who were hit by this hack.

Motherboard’s source further claimed that the hackers actually had access to emails for around six months prior to March, but Microsoft firmly denies that.

Despite the perpetrators not gaining access to account passwords, Microsoft is still recommending that if you’ve been affected, you should change your password just as a precautionary measure. Of course, if you have been affected then you should have had an email informing you of this by now.

It’s also worth underlining that it could be a good idea to keep an eye out for potential scam or phishing emails, because as we’ve already mentioned, the data gleaned from your email account – even things as simple as subject lines – could well be used to fashion a much more convincing attack to attempt to deliver malware onto your PC.

Go to Source

PlayStation VR patent wants to put you inside your pal’s games

A new PlayStation VR patent from Sony doesn’t want you alone to step into its virtual reality worlds, but representations of your friends too.

Siliconera spotted two new filings relating to Sony’s virtual reality headset which could point to the sort of experiences the company is planning for the future. The pair were filed in 2017 and 2018 respectively, suggesting that (if they’ve been pursued by Sony) they could soon bear fruit.

The first relates to live events. Sony’s patent describes a scenario where a user is in attendance at a real world location, such as a sports stadium, with the headset “anchoring” them “to a physical location in the venue”. 

They’d be surrounded by real-world attendees, letting them watch the event as if they were actually there. It sounds similar to other live VR applications, like Next VR, Melody VR or Oculus Venues.

‘It’s in the game’? You’re in the game

More interesting, then, is the second application. This one speaks of turning buddies from your PSN games list into spectators of your games as you play. So, rather than generic NPC crowds in the stands of a FIFA match or along the track of a Gran Turismo race, your friends could chose to have an avatar representation of themselves turn up in your game.

These avatars could be true to life, or any sort of stylized representation they choose to submit. They could either choose to spectate in real-time in virtual reality, or show their support through a “pre-programmed” clip.

It’s an interesting idea – especially in the context of the rise of eSports – and could make for not only more interesting crowds, but make the often-solitary feeling VR experience more communal. 

Here’s hoping Sony doesn’t apply it to something like a VR Grand Theft Auto though – we’re not sure we much fancy seeing our digital avatars mowed down by a maniac.

Go to Source