6 reasons to try Linux today

There’s never been a better time to give Linux a try.Wait, don’t slam on that back button! I’m not one of those rabid “Year of the Linux desktop” types. Windows works just fine for hundreds of millions of people, and—sorry, Linux lovers—there’s little to suggest Linux usage will ever be more than a rounding error compared to Microsoft’s behemoth.INSIDER: SUSE Linux 12 challenges Red Hat That said, there are some pretty compelling reasons you might want to consider switching to Linux on your computer, or at least give it a hassle-free trial run.To read this article in full or to leave a comment, please click here

GitHub’s 7 top productivity tools for programmers

GitHub's 7 most popular productivity tools for programmersImage by Wikipedia; pixabayBorn of ingenuity -- or, in some cases, laziness -- programming tools created by developers for developers have become an essential component of modern software development. Developers seeking to enhance their productivity or simply cut down on keystrokes have enjoyed a boon of possibilities thanks to open source repo host GitHub.To read this article in full or to leave a comment, please click here

Michael Dell tells IT leaders all they need to know about the new Dell Technologies

In September, Dell and EMC finalized the largest ever merger of tech companies, creating privately held Dell Technologies - a "family" of companies that provides everything from PCs to hyperconverged infrastructure with annual revenue of some $75 billion. Ahead of next week's Dell EMC World conference, CEO Michael Dell spoke with IDG Chief Content Officer John Gallant about what Dell and EMC customers can expect -- in sales, service, product integration -- from this landscape-altering combination.I wanted to spend time talking with you about how your competitive approach, how the path you've taken, differs and offers benefit to customers compared to some of their other strategic providers today. I had the opportunity to talk to Hewlett Packard Enterprise CEO Meg Whitman some time ago about their very different approach with HP splitting apart. And Meg's comment was, and this is a direct quote from her, "Dell EMC has taken an entirely different strategy than we have. We decided to get smaller, they decided to get bigger. We decided to de-lever the company, they've chosen to lever up. We've chosen to lean into new technology like 3Par all-flash storage, our next generation of servers, high-performance compute, hyperconverged Composable infrastructure and Continue reading

Darkweb marketplaces can get you more than just spam and phish

The underground marketImage by ThinkstockUnderground markets offer a great variety of services for cyber criminals to profit from. These forums offer items ranging from physical world items like drugs and weapons to digital world items such as spam/phishing delivery, exploit kit services, "Crypters", "Binders", custom malware development, zero-day exploits, and bulletproof hosting.To read this article in full or to leave a comment, please click here

Why you need to create a social media policy

Whether it's Facebook, Instagram, Twitter, Snapchat or Reddit, chances are good that your employees are spending some time on at least one of these social networks during work hours. But before you run to IT and install company-wide web filters, there are a few things to consider about your employee's social media habits."Social media is more accessible than ever -- and it isn't going anywhere anytime soon -- so it's a great time for employers to get on board. If a company has a clear policy around social media usage at work and communicates those guidelines effectively, there should not be a need to block the sites, as employees will remain productive and engaged," says Tisha Danehl, vice president of Ajilon Professional Staffing.To read this article in full or to leave a comment, please click here

Hardcore fans mourn the death of Nexus by denouncing the Pixel

It seems Google would like people to think the Pixel is the first phone it has ever produced with its “Made by Google” ad campaign. The most devoted fans of the Android platform have never seen it that way. To them, the Nexus phones were about “pure Android,” but now they’re suddenly finding their phones have been demoted.Google has said there will be no new Nexus phones, and what's more, the Pixel and Pixel XL will get exclusive features that aren’t coming to the current Nexus line, and Nexus owners are understandably upset. How upset? Well, we cannot reprint some of what’s been said, if that gives you an idea.To read this article in full or to leave a comment, please click here

Yahoo shows that breach impacts can go far beyond remediation expenses

Companies that focus on the immediate breach remediation costs may be missing the big picture, and could be under-investing in security as a result.Several studies have come out recently trying to get a handle on the total costs of a data breach, with a large variation in costs - from less than $1 million on average, to $6 million - based on the data sets and types of included costs.But the actual numbers could be several times higher.Take the Yahoo breach, for example, which could lead to a $1 billion drop in the company's value.To read this article in full or to leave a comment, please click here

Yahoo shows that breach impacts can go far beyond remediation expenses

Companies that focus on the immediate breach remediation costs may be missing the big picture, and could be under-investing in security as a result.Several studies have come out recently trying to get a handle on the total costs of a data breach, with a large variation in costs - from less than $1 million on average, to $6 million - based on the data sets and types of included costs.But the actual numbers could be several times higher.Take the Yahoo breach, for example, which could lead to a $1 billion drop in the company's value.To read this article in full or to leave a comment, please click here

Future of collaboration software all about integration — not consolidation

Enterprise software makers have tried to blend social tools and consumer technology for at least a decade. It's been a slow process, but by 2020 the biggest names in business software will likely be well-known consumer brands, instead of the stalwarts that dominated the market for decades, according to Aaron Levie, CEO of cloud storage service Box. Outsiders are redefining the future of workplace collaboration, and some of these companies, including Facebook, are focused on specific tools or technologies instead of platforms that try to serve every business need. The one-vendor-for-all-things-enterprise approach has no place in today's business landscape, Levie says.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Beyond logging: Using SIEM to combat security, compliance issues

As connectivity grows, so do threats to the IT infrastructures under your care—and, by extension, your organization’s ability to profit and serve its customers. Security strategies that worked fine in the not-so-distant past have grown woefully inadequate as the technology terrain shifts. You’ve probably heard the acronym SIEM being thrown around a lot these days and for good reasons. As security experts, we know that perimeter defenses simply aren’t enough anymore, and we need a holistic view of our IT infrastructures.  + Also on Network World: SIEM market dynamics in play +To read this article in full or to leave a comment, please click here

IDG Contributor Network: Beyond logging: Using SIEM to combat security, compliance issues

As connectivity grows, so do threats to the IT infrastructures under your care—and, by extension, your organization’s ability to profit and serve its customers. Security strategies that worked fine in the not-so-distant past have grown woefully inadequate as the technology terrain shifts. You’ve probably heard the acronym SIEM being thrown around a lot these days and for good reasons. As security experts, we know that perimeter defenses simply aren’t enough anymore, and we need a holistic view of our IT infrastructures.  + Also on Network World: SIEM market dynamics in play +To read this article in full or to leave a comment, please click here

Samsung hikes recall incentives to retain Note7 customers

In a bid to retain customers, Samsung Electronics is giving larger financial incentives to people who choose to exchange the ill-fated Galaxy Note7 for another smartphone from the company, rather than seek a refund.In the U.S., the company is giving customers a US$25 bill credit through carriers and retailers to customers who return a Note7 for a refund or for any other branded smartphone. But if they choose to exchange the Note7 for any Samsung smartphone, they will get a whopping $100 bill credit from select retailers and carriers. The company did not immediately provide further details on the program.The company had earlier announced a $25 incentive for customers exchanging their Note7 for another Samsung product.To read this article in full or to leave a comment, please click here

Network Automation RFP Requirements

After finishing the network automation part of a recent SDN workshop I told the attendees “Vote with your wallet. If your current vendor doesn’t support the network automation functionality you need, move on.

Not surprisingly, the next question was “And what shall we ask for?” Here’s a short list of ideas, please add yours in comments.

Read more ...

IBM’s Cleversafe storage platform is becoming a cloud service

If dispersing data among storage nodes can make it more secure and less prone to loss, wouldn’t spreading it across far-flung cloud data centers make it even more so?If so, IBM has the right idea with its Cloud Object Storage service, which uses SecureSlice object storage technology that it acquired by buying Cleversafe last year.The storage-as-a-service offering becomes generally available on Thursday. It lets enterprises use both on-premises gear and the IBM Cloud to store unstructured data objects, which can include things like videos, photos and genomic sequencing data.To read this article in full or to leave a comment, please click here