JavaScript programmers have many good tools to choose from—almost too many to keep track of. In this article, I discuss nine text editors with good support for developing with JavaScript, HTML5, and CSS, and for documenting with Markdown. Why use an editor for JavaScript programming instead of an IDE? In a word: speed.To read this article in full or to leave a comment, please click here(Insider Story)
Years ago it would have been unthinkable to give up control to securing your most valuable assets. But for some companies the risk of handing the security keys to a third party is less than the idea of facing the daily barrage of attacks.When asked why a company would cede control, many vendors said it depends on the level of staffing that company has. If the expertise is lacking, why take the chance. Or if it is a small to midsize enterprise, maybe there is just not a budget for creating a security staff up to the level needed. Therefore, partnering with a managed security services provider (MSSP) has become almost a must when faced with worries over data theft and the number of mobile devices entering the workplace. To read this article in full or to leave a comment, please click here
Stereotypes of any kind are harmful to your organization. And generational stereotypes -- millennials are lazy, entitled and needy; baby boomers are cranky Luddites who hate change; generation X … well, hates everything and everyone -- are no different. Perpetuating these stereotypes negatively impacts diversity and inclusion as well as engagement, productivity and morale, and it makes teamwork and collaboration difficult, if not impossible.Some of the most pervasive stereotypes surround millennials; those who are roughly 20 to 35 years old, says William A. Schiemann, CEO of Metrus Institute. Schiemann says he's continually faced with clients' confusion and misunderstanding about generational differences, and the stereotypes that arise from this confusion.To read this article in full or to leave a comment, please click here
Blame it on poor copy data management, compliance requirements or the internet of things (IoT), but data storage volumes are growing exponentially, and that growth shows no signs of abating. Managing skyrocketing storage demands on limited resources is a top challenge for many enterprises. To alleviate the burden, many organizations have turned to the cloud.To read this article in full or to leave a comment, please click here(Insider Story)
Great for hikes, trips to the beach, or any sunny place you find yourself, this waterproof and shockproof power bank will harness the sun to keep you fully juiced all day. Features a hook for easy attachment to your pack or bag, eco-friendly silicone rubber, and comes in several colors. The solar power bank averages 4 out of 5 stars from nearly 800 people on Amazon (read reviews), where its typical list price of $24.99 has been reduced 28% to $17.99. See the discounted solar charger on Amazon.To read this article in full or to leave a comment, please click here
If yet another cybersecurity expert wanted to warn the general public about the risks associated with the internet-of-things (IoT), it is as likely as not that the warning would go in one ear and out the other. But when a sixth grader hacks an audience of security experts and “weaponizes” his smart teddy bear, it might just snag the attention of parents who have disregarded warnings about the dangers and bought internet-connected toys for their kids anyway.At the International One Conference in the Netherlands on Tuesday, 11-year-old Reuben Paul set out to ensure that “the Internet of Things does not end up becoming the Internet of Threats.” Judging by security experts’ awed reactions on Twitter, Paul made a lasting impression.To read this article in full or to leave a comment, please click here
Averaging 4.5 out of 5 stars from over 17,000 people on Amazon, this popular smartphone car mount locks and releases the device with just a push of a finger and features a telescopic adjustable arm. iOttie's mount opens to 3.2 inches in width, which makes it compatible with even "Plus" sized phones. The list price of $19.95 has been discounted right now 36% to just $12.75. See this deal on AmazonSee this deal on Amazon.To read this article in full or to leave a comment, please click here
Microsoft’s top lawyer has blamed the government’s stockpiling of hacking tools as part of the reason for the WannaCry attack, the worldwide ransomware that has hit hundreds of thousands of systems in recent days.Brad Smith, president and chief legal officer, pointed out that WannaCrypt is based on an exploit developed by the National Security Agency (NSA) and renewed his call for a new “Digital Geneva Convention,” which would require governments to report vulnerabilities to vendors rather than stockpile, sell, or exploit them.To read this article in full or to leave a comment, please click here
IBM has some new options for businesses wanting to experiment with quantum computing.Quantum computers, when they become commercially available, are expected to vastly outperform conventional computers in a number of domains, including machine learning, cryptography and the optimization of business problems in the fields of logistics and risk analysis.Where conventional computers deal in ones and zeros (bits) the processors in quantum computers use qubits, which can simultaneously hold the values one and zero. This -- to grossly oversimplify -- allows a quantum computer with a 5-qubit processor to perform a calculation for 32 different input values at the same time.To read this article in full or to leave a comment, please click here
Apple can try and spin it any way it wants, but the harsh reality remains that iPad sales have been slumping for years. In fact, it's been quite a few years since Apple has seen year-over-year iPad sales growth over the course of a quarter, despite Tim Cook's assertions that the iPad remains the future of computing.That debate aside, there do appear to be some shakeups comings to Apple's iPad lineup, a fact that shouldn't be all that surprising given Cook's remarks regarding the iPad earlier this year. "We've got some exciting things coming on iPad and I'm optimistic about where things are headed," Cook said about three months ago.That being the case, there are reports that Apple at WWDC this year will introduce a brand new 10.5-inch iPad Pro with an edgeless display. Now what makes this particularly intriguing is that Apple will reportedly fit said 10.5-inch display into a form factor no bigger than the current 9.7-inch iPad model. While it's perhaps too soon to say with any certainty, Apple's upcoming edgeless iPad may be Apple's last real chance at injecting a bit of life into its tablet lineup.To read this article Continue reading
SAP has added machine learning to its Leonardo IoT software suite to help businesses handle data gathered from smart devices more intelligently.It unveiled the additions to Leonardo -- and a cloud of other news -- at its customer conference, Sapphire Now, in Orlando on Tuesday.Leonardo runs on SAP Cloud Platform and provides a number of services to process data from the internet of things, including streaming and predictive analytics. Now, those predictive capabilities will include machine-learning tools tuned to work with the rest of the Leonardo components."It's about adding intelligence to existing business processes and integrating with the core systems of record. Leonardo's capabilities can be infused into SAP applications," said Mike Flannagan, SAP's senior vice president for analytics. "We see Leonardo as something that will help customers transform processes."To read this article in full or to leave a comment, please click here
The world of DevOps is a transformative new trend in the way applications are built and run. A hybrid engineer who both develops code for an app and manages the infrastructure operations the app runs on requires tools geared for multiple aspects of the application lifecycle process.+MORE AT NETWORK WORLD: Serverless Explainer: The next generation of cloud infrastructure | What you need to know about Microservices +To read this article in full or to leave a comment, please click here
Virtualization-based security software vendor Bromium surveyed security professionals about their behavior toward ransomware. The results were surprising. For example, 10 percent of them admitted to paying a ransom or hiding a breach. More alarming, 35 percent admitted to ignoring their own security protocols.To read this article in full or to leave a comment, please click here(Insider Story)
The Internet of Things – the connecting of billions of everyday and industrial devices using tiny sensors that transmit data and share information in the cloud – is revolutionizing the way we live and do business.To read this article in full or to leave a comment, please click here(Insider Story)
Google wants to take on what may become one of the biggest cloud-computing needs of the next few years with a service that will manage IoT devices and help developers bring the data they generate into applications that use Google's analytics platforms.Its Google Cloud IoT Core, announced in a blog post on Tuesday, may be a good use of Google's reach, number-crunching power and device OS expertise. But the problem it aims to solve is daunting, and competitors are already focused on it.The good news for enterprises is that there are several solutions to IoT sprawl already available or taking shape. Just last week, VMware introduced Pulse IoT Center, the latest broad-based platform for setting up, managing and scaling IoT infrastructure. Cloud rival Microsoft has Azure IoT Hub, with a similar mission. Cisco Systems, General Electric and Nokia are also in the game.To read this article in full or to leave a comment, please click here
There are some fresh public cloud offerings on the horizon for SAP database customers, thanks to Microsoft Azure and Amazon Web Services. Both companies have announced new infrastructure services for the HANA database software aimed at giving customers tons of memory for workloads that need it.Azure customers will get access to M-series virtual machines that offer up to 3.5TB of RAM, designed for use with SAP’s database software. In addition, Microsoft announced Tuesday that it's working on new SAP HANA on Azure Large Instances to offer users between 4TB and 20TB of memory on a single machine specifically for use with software like the SAP Business Suite 4 HANA (S/4HANA).To read this article in full or to leave a comment, please click here
A group of hackers that previously leaked alleged U.S. National Security Agency exploits claims to have even more attack tools in its possession and plans to release them in a new subscription-based service.The group also has intelligence gathered by the NSA on foreign banks and ballistic missile programs, it said.The Shadow Brokers was responsible for leaking EternalBlue, the Windows SMB exploit that was used by attackers in recent days to infect hundreds of thousands of computers around the world with the WannaCry ransomware program.To read this article in full or to leave a comment, please click here
As I read about the WannaCry ransomware attack, my brain is racing with thoughts about the causes and effects of this global incident. Here are my two cents:1. Ransomware continues to be a growth business, and a bit of work can provide a serious return. The FBI estimated that ransomware payments topped $1 billion in 2016, and I wouldn’t be surprised if we saw 100 percent year-over-year growth. 2. For those of us who’ve been in cybersecurity for a while, WannaCry brings back memories of the internet worms we saw back in the 2000s (i.e. Code Red, Conficker, MSBlast, Nimda, etc.). Once one person on a network was infected, WannaCry simply went out and infected other vulnerable systems on the network. I knew that worm techniques would come back, but I always thought they’d be used as a smokescreen for other attacks. Looks like ransomware and internet worms can be as compatible as chocolate and peanut butter.To read this article in full or to leave a comment, please click here
The tally of damage from the WannaCry ransomware attack keeps growing, but it’s still not even close to bad enough to force real changes in cybersecurity. According to The New York Times, more than 200,000 machines in more than 150 countries around the world have been infected, but the responses being discussed still center around patches and passwords, updates and antivirus, backups and contingency plans. To read this article in full or to leave a comment, please click here
The Shadow Brokers are back once again, offering buyers not just exploits, but also “compromised network data from Russian, Chinese, Iranian, or North Korean nukes and missile programs.”Seemingly capitalizing on the success of WannaCry ransomware, which used EternalBlue and DoublePulsar – tools developed by the NSA’s Equation Group – the Shadow Brokers want to sell new exploits every month to people who pay a membership fee.The hacking group dubbed its new monthly subscription model “TheShadowBrokers Data Dump of the Month;” the service kicks off in June. The Shadow Brokers claim not to care what Data Dump of the Month service members do with the exploits. The group teased:To read this article in full or to leave a comment, please click here