The Dell Ultrasharp monitor has virtual borderless viewing ideal for a multi-monitor set-up; with more vertical resolution available on the U2415 16:10 monitor . Fully adjustable features like tilt, swivel, height adjust including pivoting both 90 Degree clockwise or counter-clockwise, allowing the thinnest possible edges to be placed side by side . Connect seamlessly to other peripherals simultaneously without compromising on picture quality via digital connectivity. A high current USB 3.0 charging port supplies twice the power for charging and powering BC1.2 compatible devices, and DP1.2 supports multi-stream transport. This monitor averages 4.5 out of 5 stars from over 1,00 people on Amazon (read reviews). The typical list price has been reduced 40% to just $239.85. See it now on Amazon.To read this article in full or to leave a comment, please click here
In a slowing PC market, Chromebooks siphoned market share away from Windows PCs in 2016 as their popularity grew outside the education market.Chromebook shipments grew by a stunning 38 percent in 2016 compared to 2015. Gartner estimated 9.4 million Chromebooks shipped, compared to 6.8 million units in 2015.The number is just a fraction of overall PC shipments, but growth came in an otherwise down PC market. Overall PC shipments in 2016 were about 270 million units, a decline of about 6.2 percent, according to Gartner.Looking forward, 2016 may go down as the best year ever for Chromebook shipment growth. Gartner is estimating shipments to continue growing in the coming years but at a slower pace.To read this article in full or to leave a comment, please click here
A new ransomware-for-hire scheme called Fatboy adjusts the ransom it charges based on international exchange rates so it’s more likely the victims get hit for the largest amount they can reasonably pay.Posted on Exploit, a Russian-language online forum, Fatboy automatically adjusts ransom demands according to where the victim is located, according to the Recorded Future blog.That adjustment is based on the Big Mac Index, which was created by The Economist as a way to show whether official international monetary exchange rates line up with the price charged for a certain product – the Big Mac burger sold by McDonald’s – from country to country. The index tells whether currencies are overvalued or undervalued based on what McDonald’s charges in each country.To read this article in full or to leave a comment, please click here
As a regular reader of Reddit’s section devoted to system administration, I have come to understand that subject lines such as “Found a leaky ethernet port” do no always mean what one might assume they mean. Today’s example:
“This is going to be a fun couple of days,” bemoans the Redditor who discovered this leak. “It's been raining for two days straight and it's expected to continue for another two.”To read this article in full or to leave a comment, please click here
Feeling exhausted, uninspired, cranky, unmotivated and burned out? You're not alone.According to a new study from professional service automation company Kimble Applications, which focused on professionals that track billable hours, the majority underreport the number of hours they work. This has broad implications for professions like IT consultants and contract software engineers, as well as attorneys and accountants, says Rob Bruce, vice president of strategy at Kimble Applications.[ Related story: Shattering remote worker stereotypes ] To read this article in full or to leave a comment, please click here
Advocates for strong net neutrality rules enforced by a powerful federal regulator may be on the ropes, but they are striking a defiant tone as they look to whip up grassroots opposition ahead of the effort to dismantle the FCC's open internet order.Later this month, the FCC is planning to hold a vote at its May 18 meeting that would begin consideration of an order reclassifying broadband service under communications law such that the commission would significantly limit its authority to police ISPs.The distinction in service classification is arcane, but in a practical sense the FCC under Chairman Ajit Pai is proposing to undo the legal underpinning of his predecessor's 2015 open internet order, which expanded the commission's oversight authority over the broadband sector, and established net neutrality rules that have been upheld in federal court.To read this article in full or to leave a comment, please click here
It could put an end to end-to-end encryption in services such as WhatsApp: The U.K. government wants telecommunications providers to help it tap their customers' communications, removing any encryption the provider applied.The government's desires are set out in a draft of the regulations obtained by Open Rights Group (ORG), which campaigns for digital civil rights."These powers could be directed at companies like WhatsApp to limit their encryption. The regulations would make the demands that [Home Secretary] Amber Rudd made to attack end-to-end encryption a reality. But if the powers are exercised, this will be done in secret," said ORG executive director Jim Killock.To read this article in full or to leave a comment, please click here
Microsoft's hardware partners will flood the market with Windows Mixed Reality headsets by the holiday season this year, offering up a new way to enjoy Windows 10.A Windows Mixed Reality headset from Acer is already being seeded to select developers by Microsoft, but isn't available to consumers yet.So far three PC makers -- Lenovo and HP as well as Acer -- said they would ship headsets later this year. Dell is still mulling a release date. The headsets will start at $299, the rough minimum price suggested by Microsoft.The headsets need to be wired to Windows 10 PCs. Once on, they will transport you to a virtual world where you can, for example, roam, Skype-chat and play Xbox games. It's like computing in a 3D world, without the use of a mouse or keyboard.To read this article in full or to leave a comment, please click here
NASA is looking to bolster the speed – from ten to 10,000 times -- of the software on its Pleiades supercomputer and is issuing a public challenge to get the job done.The catch is that the software the space agency is looking to squeeze all of that performance out of is based on Fortran – a program that has roots back to 1954.“This is the ultimate ‘geek’ dream assignment,” said Doug Rohn, director of NASA’s Transformative Aeronautics Concepts Program (TACP) in a statement.According to IBM: “From its creation in 1954, and its commercial release in 1957 as the progenitor of software, Fortran (FORMula TRANslator) became the first computer language standard, ‘helped open the door to modern computing,’ and may well be the most influential software product in history. Fortran liberated computers from the exclusive realm of programmers and opened them to nearly everybody else. It is still in use more than 50 years after its creation.To read this article in full or to leave a comment, please click here
Over the past year, a group of attackers has managed to infect hundreds of computers belonging to government agencies with a malware framework stitched together from JavaScript code and publicly available tools.The attack, analyzed by researchers from antivirus firm Bitdefender, shows that cyberespionage groups don't necessarily need to invest a lot of money in developing unique and powerful malware programs to achieve their goals. In fact, the use of publicly available tools designed for system administration can increase an attack's efficiency and makes it harder for security vendors to detect it and link it to a particular threat actor.To read this article in full or to leave a comment, please click here
Amazon Prime members get an exclusive 20% off of Prey. In Prey, you awaken aboard Talos I, a space station orbiting the moon in the year 2032. You are the key subject of an experiment meant to alter humanity forever – but things have gone terribly wrong.
There’s plenty about Microsoft’s new Windows 10 S that’s not fully understood, not the least of which is its built-in upgrade path to Windows 10 Pro. Which Windows 10 S device you buy and where you buy it, however, will decide whether you’ll pay a $49 fee for the the upgrade—or have Microsoft pay you with a year’s subscription to Office 365.With most Windows 10 S devices reserved for closely managed classrooms, there's arguably only one Windows 10 S device where the transition from Windows 10 S to Windows 10 Pro becomes an important decision: Microsoft's Surface Laptop, designed for college students. But as hardware vendors start shipping more laptops with Windows S installed, more users will have to consider how they handle this upgrade path. We'll explain what we know so far. To read this article in full or to leave a comment, please click here
Most businesses hire third-party providers to fill in when they lack in-house resources. It is often necessary to allow third-party vendors access to their network. But after Target’s network was breached a few years ago because of an HVAC vendor’s lack of security, the focus continues to be on how to allow third parties access to the network without creating a security hole.The use of third-party providers is widespread, as are breaches associated with them. Identity risk and lifestyle solution provider SecZetta claims that on average, 40 percent of the workforce make up third parties. A recent survey done by Soha Systems notes that 63 percent of all data breaches can be attributed to a third party. “The increased reliance on third-party employees, coupled with the growing sophistication of hackers, has led to the current identity and access management crisis that most businesses are faced with today — whether they realize it or not,” a SecZetta blog post stated. To read this article in full or to leave a comment, please click here
TrackingImage by ThinkstockIt is easy to overlook identity access management as static infrastructure in the background, and that's the chief problem: Too few organizations treat IAM as the crucial, secure connective tissue between businesses' multiplying employees, contractors, apps, business partners and service providers. Aaron Perry, president at Focal Point Data Risk, runs through some of IAM’s pitfalls.To read this article in full or to leave a comment, please click here
GUIs are great—we wouldn’t want to live without them. But if you’re a Mac or Linux user and you want to get the most out of your operating system (and your keystrokes), you owe it to yourself to get acquainted with the Unix command line. Point-and-click is wonderful whenever you need to do something once or twice. But if you need to repeat that task many times, the command line is your savior.The command line is a window into the full, awesome power of your computer. If you long to break free of the constraints of the GUI or think that programming or administering remote machines is in your future, then learning the Unix command line is definitely for you.To read this article in full or to leave a comment, please click here
There's a growing threat on the cybersecurity scene that could drain millions from unsuspecting businesses and leave them vulnerable to hacking threats.It isn’t a new strain of ransomware. It’s the cybersecurity industry itself.It's ironic, but the products vendors sell, and the marketing they use, sometimes leave buyers misinformed and less secure, according to several business directors who actually buy the tech. “There’s definitely a lot of vaporware,” said Damian Finol, an IT security manager at a major internet company. “There are definitely products that have really exaggerated claims about what they actually do.”For some vendors, it's more about the sale than about security, IT executives say. To close a deal, bad vendors tend to overpromise features that they claim will be added down the line but never materialize. That makes a buyer's job harder.To read this article in full or to leave a comment, please click here
Having trouble finding the right security products for your business? You’re not the only one.Today’s market is filled with hundreds of vendors and plenty of marketing hype. But figuring out which solutions are worthwhile can be a challenge, especially for businesses with little experience in cybersecurity. So we asked actual buyers of enterprise security products for tips, and here’s what they said. Damian Finol, security technical program manager at a major internet firm
Businesses have to do their research. That means looking at customer recommendations instead of relying on what vendors say. Testing the security products in house is also highly advised.To read this article in full or to leave a comment, please click here
To mom, with loveImage by Ultimate Ears, Looking Glass Design, ThinkGeek, Vik Muniz and MoMA StoreIf you're looking for Mother’s Day gift ideas that are less about gadgets and more about stellar product design, this is the collection for you. The tech quotient is low, but the design bar is high. The creators are artists, craftspeople and industrial designers – and their inspiration comes from science, technology, engineering and math.To read this article in full or to leave a comment, please click here
The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here
The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here