Microsoft has tried in the past to make apps communicate, like with Object Linking and Embedding (OLE) in the 1990s. It worked, but in a limited fashion, allowing for linking data between Word and Excel. But if you wanted to share data from non-Microsoft apps, you were out of luck.Now, however, Microsoft has come out with a service (it's not right to call it an app) called Flow, which brings the If This Then That (IFTTT) functionality of the Web to desktop apps. IFTTT is a feature for Web services that generates actions based on conditions. It's how Twitter informs you when someone follows you, likes your tweet or responds to your tweet, for example.To read this article in full or to leave a comment, please click here
At the OpenStack Summit in Austin recently, one of the companies invited to keynote on the first day was a cloud, hosting and services vendor from France, OVH. Like most of the people in the room, the name OVH raised my eyebrows. I've been covering the cloud world since it existed, and I'd never come across the company. Maybe they were a new startup or something?It turns out that, far from being a new startup, OVH is a mature and expansive vendor. It's just that they're primarily involved in Europe in general, and France in particular. That looks set to change, however, and I took the opportunity to sit down with Pascal Jaillon from OVH to hear what the company is up to. The OVH product line spans traditional hosting, hosted Microsoft Exchange, domain name provisioning, and, of course, cloud.To read this article in full or to leave a comment, please click here
EMC is going back to basics -- but for a new generation of users -- on the first day of EMC World on Monday.This year’s annual user conference will be the last for EMC as an independent company, assuming Dell's pending US$67 billion acquisition goes through later this year as planned. Michael Dell will join EMC's Chairman and CEO on stage during the Monday keynote session.But EMC’s core storage business is likely to stay much the same in the short term, because it complements Dell, said Enterprise Strategy Group analyst Mark Peters.To read this article in full or to leave a comment, please click here
According to ESG research, enterprise organizations continue to invest in all types of threat intelligence (note: I am an ESG employee). For example, 60% of organizations have had a threat intelligence program in place for more than 2 years, 69% consume 6 or more open source or commercial threat intelligence feeds as part of cybersecurity analytics efforts, and 72% of enterprises plan on increasing spending on their threat intelligence programs over the next 12 to 18 months.Why is threat intelligence gaining momentum? Security professionals know that since they can’t block every conceivable cyber-attack, they need to collect, process, and analyze all types of internal and external security data to improve their incident detection and response capabilities. Many also want to use threat intelligence more proactively for threat prevention. In fact, 36% of enterprise cybersecurity professionals say that their organizations intend to use threat intelligence feeds to automate remediation actions over the next 24 months.To read this article in full or to leave a comment, please click here
Researchers from the University of Michigan and Microsoft Research took aim at Samsung’s SmartThings and came up with four proof-of-concept attacks that they believe should make SmartThings owners a bit paranoid by thinking about worst case scenarios in which hackers remotely take control of your home.If a hacker could unlock your door while you are sleeping, then your safety is at risk. If the door is unlocked while you were away, then you might have come home to discover all your cool tech is gone. If a hacker could continually set off your smoke alarm, then your sanity might be tested.None of those examples are out of the realm of possibility as the researchers exploited SmartThings framework design flaws and developed attacks which included stealing door lock PIN codes, changing the lock code, triggering a fake fire alarm and turning off vacation mode “all without requiring SmartApps to have capabilities to carry out these operations and without physical access to the home.”To read this article in full or to leave a comment, please click here
Australian entrepreneur Craig Wright is bitcoin creator Satoshi Nakamoto, he claimed on his personal blog and in media interviews on Monday. Within hours, skeptics were pointing to flaws in his claims.
Wright was first outed as the developer of the cryptocurrency by Wired magazine in December, but would not confirm the magazine's claims at the time. Days later the magazine said fresh evidence pointed to another possibility it had raised: that Wright may be a sophisticated hoaxer.To read this article in full or to leave a comment, please click here
Microsoft's Internet Explorer (IE) last month lost the No. 1 spot to Google's Chrome, marking a major milestone not only in IE's 21-year lifespan, but a dramatic changing of the desktop browser guard.According to U.S. analytics vendor Net Applications, IE and Edge -- which the firm tossed into a single bucket labeled "IE" -- fell 2 percentage points in April, the fifth straight month of a loss greater than a point, and the 16th of any size -- to end at 41.4% of the total global browser user share.Meanwhile, Chrome climbed 2.6 percentage points to take a narrow lead with 41.7%.Previously, Computerworld had forecast -- using long-term trends portrayed by Net Applications' data -- that Chrome would wrestle the No. 1 position from IE by the end of May.To read this article in full or to leave a comment, please click here
"Android" and "enterprise" are two words that traditionally haven't gone together. But with Google beefing up its Android for Work initiative -- and getting ready to launch more enterprise-friendly features with the upcoming Android "N" release -- the notion of companies considering Android for employees no longer seems far-fetched.To read this article in full or to leave a comment, please click here
Paul Valente, a Chicago Public Schools systems engineer, jokes that his employer is "a $7 billion organization with a $6 billion budget." Not surprisingly, the underfunded department has a short-staffed IT team, so Valente is always looking for ways to cut costs and streamline operations -- and he feels he has struck gold with an application rationalization scheme.To read this article in full or to leave a comment, please click here(Insider Story)
Database fans, start your clocks: Microsoft announced Monday that its new version of SQL Server will be out of beta and ready for commercial release on June 1. The news means that companies waiting to pick up SQL Server 2016 until its general availability can start planning their adoption.SQL Server 2016 comes with a suite of new features over its predecessor, including a new Stretch Database function that allows users to store some of their data in a database on-premises and send infrequently used data to Microsoft's Azure cloud. An application connected to a database using that feature can still see all the data from different sources, though. To read this article in full or to leave a comment, please click here
Herve Coureil spent more than two decades building a career before landing the top technology spot at Schneider Electric, which specializes in energy management and automation. Nothing unusual there -- except for the fact that Coureil spent most of his 23 years at Schneider outside of IT, in business and financial roles. In fact, he served as chief financial officer in Schneider's Critical Power and Cooling Services unit before becoming CIO in 2009.To read this article in full or to leave a comment, please click here(Insider Story)
Looking for a new job but can't seem to land one? Maybe your poor networking skills are to blame? A new national survey reveals that while HR professionals say employee referrals are the best source for finding great candidates, only 7 percent of job seekers are using referrals as part of their job search.The Active Job Seeker Dilemma survey, from Future Workplace, a research firm and workforce management consultancy and Beyond.com, a career and hiring marketplace, polled 4,347 U.S. job seekers and 129 HR professionals. The survey revealed a major disconnect between job seekers and the HR pros who are looking to hire when it comes to how candidates are identified.To read this article in full or to leave a comment, please click here
Results from two recent studies suggest that cybersecurity needs an overhaul at most companies with root causes of the problem including poor communication, a lack of employee awareness, slowed productivity and a lack of budget.In its 2016 Cybersecurity Confidence Report, Barkly, an endpoint security company, surveyed 350 IT pros to determine the top security concerns for 2016 and gauge how confident IT leaders are when it comes to cybersecurity issues. The survey looked at IT leaders' biggest security concerns, levels of confidence around security, number of breaches in 2015, amount of time spent on security, biggest priorities in IT and the downsides to current security solutions -- and, for the most part, the results were grim.To read this article in full or to leave a comment, please click here
Angler, Magnitude, and Nuclear are a few of the most commonly used exploit kits criminals are using to deliver a variety of payloads from botnets to ransomware. Exploit kits are really just a means for malicious actors to get in the door. Once their payloads are installed, the payload is unique to the criminal, and the payload delivered has a profound impact on business operations.The prevalence of exploit kits and the techniques favored by attackers changes quite often. Only a few years ago, Black Hole was the most popular exploit kit until its author, Dmitry “Paunch” Fedotov was arrested. In the years that followed his arrest, the use of Black Hole declined. Despite "Paunch" being sentenced to seven years in prison last month, exploit kit authors remain undeterred and vigilant in their derivatives.To read this article in full or to leave a comment, please click here
Microsoft’s message board/social network for business, Yammer, now allows administrators to invite people from outside of the Yammer network into groups for discussions and other messaging. The company made the announcement in the Yammer blog last week.Yammer is a high-powered message board Microsoft acquired in 2012 for $1.2 billion. It lets groups stay in regular contact while working on projects and has become a major component of Office 365. However, it operates in any environment, including stand-alone, to serve as an internal messaging platform the way Notes and cc:Mail tried to do years ago.To read this article in full or to leave a comment, please click here
Social Linux butterflies When most people think of “Linux nerds,” the first phrase that comes to mind typically isn’t “super-duper social.” But it should be. If you’ve ever been to a Linux convention, you’ve seen these social Linux butterflies firsthand. And that social nature extends to social media as well. What follows is a carefully crafted cross section of some incredibly interesting Linux nerds from the various social networks. These are not companies or projects; we’re talking about actual people, speaking for themselves, who are uniquely relevant in the Linux world.To read this article in full or to leave a comment, please click here
On any given day, more than 9,000 groups in 180 countries will gather somewhere in their local community to attend a “meetup,” according to the company that coined the term and originated the concept, Meetup.com. While topics range widely – from Texas Hold’em to plant-based nutrition – there are more listings for technology-focused topics than any other area, except careers/business.To read this article in full or to leave a comment, please click here(Insider Story)
Most IT departments have project road maps that will require open-source skills, but finding recent college grads with open source talent can be challenging.
Whether your company is planning an open-source-based big data implementation, installing an open-platform file manager, or adopting an open approach to customer relationship management, experts say traditional computer science departments might not be turning out students you need.
“We still see that the status quo in computer science is very much missing an open-source component,” says Tom Callaway, team lead for Red Hat’s University Outreach program. Therefore, hiring managers and recruiters should look to non-traditional schools that have committed coursework and even degree programs to open source.To read this article in full or to leave a comment, please click here
New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.CloudJumper nWorkspaceKey features: CloudJumper nWorkspace is a comprehensive Workspace as a Service platform for SMBs and the enterprise that simplifies IT while expanding access to desktops, software applications, data, and entire workspaces from any device or location. Users have access to thousands of applications or can add their own applications with ease using the platform. The fully packaged WaaS platform offers customers a choice of licensing models for greater flexibility and lower costs, including named user and concurrent user licensing options. More info.To read this article in full or to leave a comment, please click here
Robo-versatility on displayImage by ReutersWhile some of us wait patiently for a real-life version of the housekeeper from The Jetsons, today’s “working robots” are taking on a surprising variety of tasks, as evidenced by this collection of recent photos provided by Reuters.Waiting to buy an iPhoneImage by Reuters/Robert GalbraithTo read this article in full or to leave a comment, please click here