How Moto Mods went from concept to product

The Moto Z and Moto Mods announcement last month caught the attention of everyone who has followed modular phone designs like Google Project ARA. The intriguing Moto Mods are the most viable modular design yet because consumers can add features to their phones, simply and cleanly without stressing them with a complex interconnection procedure or having to wait for the phone to reboot. The magnetic interface intuitively explains how it works and guides the user the first time a Mod is added to the Moto Z.I sat down with Paul Fordham, lead mechanical architect on the Moto Mods design team at Motorola, to talk about how Moto Mods were conceived and developed into a product. Interviewing software and electrical engineers can be tedious because of the high level of abstraction in their work. It was a pleasure to talk with Fordham, however, because mechanical engineers, like physicists, are tethered to the physical world, making for a very enjoyable and tangible conversation.To read this article in full or to leave a comment, please click here

Telegram’s encryption stymies French police but pleases their bosses

French government officials have been revealed as fervent users of Telegram, a messaging app that is frustrating their interior minister with its end-to-end encryption.Telegram's fans include the current head of the French judicial police, Christian Sainte, and his predecessor, Frédéric Péchenard. The app's security has also won over a number of legislators, including the French finance minister, who encourages his team to use it, according to Wednesday's edition of French newspaper Le Canard Enchainé.Telegram claims over 100 million monthly users of its secure messaging app, but it was the action of just one of them -- Normandy church attacker Adel Kermiche -- that prompted French interior minister Bernard Cazeneuve to call on Tuesday for investigators to be allowed to eavesdrop on Telegram users' conversations.To read this article in full or to leave a comment, please click here

Telegram’s encryption stymies French police but pleases their bosses

French government officials have been revealed as fervent users of Telegram, a messaging app that is frustrating their interior minister with its end-to-end encryption.Telegram's fans include the current head of the French judicial police, Christian Sainte, and his predecessor, Frédéric Péchenard. The app's security has also won over a number of legislators, including the French finance minister, who encourages his team to use it, according to Wednesday's edition of French newspaper Le Canard Enchainé.Telegram claims over 100 million monthly users of its secure messaging app, but it was the action of just one of them -- Normandy church attacker Adel Kermiche -- that prompted French interior minister Bernard Cazeneuve to call on Tuesday for investigators to be allowed to eavesdrop on Telegram users' conversations.To read this article in full or to leave a comment, please click here

When it comes to the iPhone’s headphone jack: I’m with Woz!

Apple co-founder Steve Wozniak may be a beloved figure in Silicon Valley, but he hasn’t had a big voice in Apple product decisions in a long, long time. And right now, that seems like a shame, as Woz is absolutely right to object to Apple’s widely reported plans to eliminate the headphone jack in the next model iPhone.+ Also on Network World: iPhone 7: Why abandoning the headphone jack makes sense +Wozniak told the Australian Financial Review this week, that if the iPhone 7 is “missing the 3.5mm earphone jack, that's going to tick off a lot of people.” And Wozniak doesn’t believe Bluetooth wireless connections—which work with a wide variety of devices—are the answer, claiming Bluetooth doesn’t sound as good as a wired connection.To read this article in full or to leave a comment, please click here

French submarine builder’s documents leak: A case of hacking for economic espionage?

DCNS, a French submarine builder, has allegedly been hacked – potentially for economic espionage reasons – and 22,400 pages of “secret” documents pertaining to its Scorpene-class submarine have been leaked.The Australian published redacted portions of the leaked documents, claiming to have seen thousands of pages outlining highly sensitive details about systems, sensors, specifications, tech manuals, stealth capabilities, antennae models, electromagnetic and infrared data, conditions under which the periscope can be used and more. The leaked documents reportedly detail “the entire secret combat capability of the six Scorpene-class submarines that French shipbuilder DCNS has designed for the Indian Navy.”To read this article in full or to leave a comment, please click here

French submarine builder’s documents leak: A case of hacking for economic espionage?

DCNS, a French submarine builder, has allegedly been hacked – potentially for economic espionage reasons – and 22,400 pages of “secret” documents pertaining to its Scorpene-class submarine have been leaked.The Australian published redacted portions of the leaked documents, claiming to have seen thousands of pages outlining highly sensitive details about systems, sensors, specifications, tech manuals, stealth capabilities, antennae models, electromagnetic and infrared data, conditions under which the periscope can be used and more. The leaked documents reportedly detail “the entire secret combat capability of the six Scorpene-class submarines that French shipbuilder DCNS has designed for the Indian Navy.”To read this article in full or to leave a comment, please click here

Startup IDVector anonymizes like Tor

A pair of former defense industry cyber security contractors is launching IDVector, a service that creates encrypted connections through an anonymizing network to shield users’ locations and to protect their machines from internet-borne attacks.IDVector Network passes customer traffic through a multi-node encrypted path before dropping it onto the open internet at locations removed from customers’ actual geographical locations.That tunneling makes it difficult for eavesdroppers to snoop content and identify where customers are located, making it possible for customers to use public Wi-Fi safely, say the company’s founders, CEO Ben Baumgartner and CTO Andrew Boyce.To read this article in full or to leave a comment, please click here

Startup IDVector anonymizes like Tor

A pair of former defense industry cyber security contractors is launching IDVector, a service that creates encrypted connections through an anonymizing network to shield users’ locations and to protect their machines from internet-borne attacks.IDVector Network passes customer traffic through a multi-node encrypted path before dropping it onto the open internet at locations removed from customers’ actual geographical locations.That tunneling makes it difficult for eavesdroppers to snoop content and identify where customers are located, making it possible for customers to use public Wi-Fi safely, say the company’s founders, CEO Ben Baumgartner and CTO Andrew Boyce.To read this article in full or to leave a comment, please click here

24% off Bose SoundSport in-ear headphones – Apple devices, Power Red – Deal Alert

Bose Sound Sport in-ear headphones deliver deep, clear sound for the music you love, with a durable design that stands up to the rigors of your day. Exclusive TriPort technology provides crisp highs and natural-sounding lows, while acoustic ports are positioned to resist sweat and weather, and hydrophobic cloth keeps moisture out. Proprietary Stay Hear tips conform to your ears' shape, so they stay comfortably in place all day long.  The Bose Soundpsort earbuds  currently averages 4 out of 5 stars on Amazon from 1,200+ people (read reviews) and  the Power Red model is currently discounted on Amazon from its its list price of $129.95 has been reduced to $99.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Simulations you can expect in Cisco’s ICND1 exam

Cisco is pretty clear on what you might need to configure in their new Interconnecting Cisco Networking Devices Part 1 (ICND1) exam. When you look at the exam blueprint, they use the language configure, verify and troubleshoot as opposed to just describe.What does this list of possible configuration topics look like? Here you go!  IPv4 addressing IPv6 addressing Pv6 stateless address auto configuration VLANs (normal range) spanning multiple switches Interswitch connectivity Layer 2 protocols (CDP, LLDP) Port security Inter-VLAN routingTo read this article in full or to leave a comment, please click here

9 top tools for corporate cloud collaboration

The nature of work has evolved rapidly during the last few years. Modern coworkers often have very different roles and responsibilities, and many work from multiple locations. Email is no longer an efficient tool for many of the tasks today's professionals perform, and face-to-face meetings are increasingly a rarity.Fortunately, a new generation of cloud-based collaboration tools are now available to help tackle some of these challenges. Here's a look at nine of the best options.1. Toggl for time tracking If you've been turned off by the complexity of past time-tracking solutions, Toggl may be a better fit. The great-looking time tracker works in a web browser, and it's an intuitive tool that helps monitor your productivity. Toggl works offline, too, and it automatically syncs time tracked offline the next time it connects to the web.To read this article in full or to leave a comment, please click here

What you need to do to stop data from leaving with exiting employees

It may come as a surprise, but more likely than not, when employees leave a company they’re taking company data with them. While it’s not always out of malicious intent, the amount of unprotected company information that walks out the door can result in bigger losses in the future.Biscom’s national study around data in the workplace revealed that more than one in four employees leave their job with company data. The study spotlights employees as a big security vulnerability to business data. To help prevent this, Bill Ho, CEO of Biscom, offers a few tips to minimize this threat.1. Establish clear employee policies on handling company data and informationTo read this article in full or to leave a comment, please click here

What you need to do to stop data from leaving with exiting employees

It may come as a surprise, but more likely than not, when employees leave a company they’re taking company data with them. While it’s not always out of malicious intent, the amount of unprotected company information that walks out the door can result in bigger losses in the future.Biscom’s national study around data in the workplace revealed that more than one in four employees leave their job with company data. The study spotlights employees as a big security vulnerability to business data. To help prevent this, Bill Ho, CEO of Biscom, offers a few tips to minimize this threat.1. Establish clear employee policies on handling company data and informationTo read this article in full or to leave a comment, please click here

The Dockerizing of VMworld 2016

Containers have landed…in VMs in the enterprise.

Screen Shot 2016-08-22 at 9.16.50 AM.pngDocker’s adoption continues to grow in the enterprise. There have been over 5 billion images pulls, and 60% of users are running Docker in production environments. Today Docker is run everywhere – from development to production; in the cloud, on virtual machines and bare-metal servers. Enterprise application teams around the world are seeing the value of Docker containers and how they help them containerize their existing applications to save money and better utilize infrastructure resources.

To get the latest with Docker and vms stop by our Docker booth #2362 at VMworld. Containers and vms are different but are complementary when it comes to application deployment. With their ability to optimize infrastructure resources, accelerate deployment and provide additional security, Docker containers bring some serious benefits to virtualized workloads within enterprise environments. Additionally, a Dockerized workload gains portability as containers move from VMs or bare metal systems, on prem or in the cloud. That same platform serves as the foundation for your new microservices applications as well.

 

The Docker booth experience you won’t want to miss:

Live demos – Three live  demos will be featured in the booth, including:

  1. Deploy your very first Docker container with a quick hands Continue reading

IDG Contributor Network: How bad is enterprise software? Really, really bad. But it’s not quite that simple.

There is a bit of a standing joke in the technology industry that revolves around enterprise software, the software that the largest organizations in the world use to run their core processes. While these solutions are robust and secure, the joke tends to be it's at the expense of the users, who often complain about poor user experience, inflexibility and essentially having to change the way they work within the business to suit the software. While user-centric design might be a huge buzzword in management circles, for those poor users of enterprise software, it seems to be a foreign concept.

+ Also on Network World: Where do mobile apps fit in the world of enterprise software? +

To read this article in full or to leave a comment, please click here