download
Career Tracker: What it takes to be a chief information security officer
CSO
To read this article in full or to leave a comment, please click here(Insider Story)
Lockheed Martin, Proctor & Gamble and Caterpillar have joined with 62 other organizations to create hardware and software guidelines for using augmented reality (AR) on the manufacturing floor.The guidelines are designed to guide AR technology vendors in developing future products for industrial businesses, both large and small. UI Labs and the Augmented Reality for Enterprise Alliance (AREA) announced the guidelines in a document released on Tuesday.To read this article in full or to leave a comment, please click here
Dumping Moore's Law is perhaps the best thing that could happen to computers, as it'll hasten the move away from an aging computer architecture holding back hardware innovation.That's the view of prominent scientist R. Stanley Williams, a senior fellow in the Hewlett Packard Labs. Williams played a key role in the creation of the memristor by HP in 2008.Moore's Law is an observation made by Intel co-founder Gordon Moore in 1965 that has helped make devices smaller and faster. It predicts that the density of transistors would double every 18 to 24 months, while the cost of making chips goes down.To read this article in full or to leave a comment, please click here
Apps that integrate with Slack can now include drop-down menus in the messages that they post to the service, as part of a push to improve the interactivity of third-party integrations.Slack's message menus let apps spawn clickable lists that users can choose from in order to take actions that developers have enabled. For example, using menus would allow users to pick a from a list of customers in a CRM system that integrates with Slack, assuming the developers have built their service to work with the new feature.Developing integrations with the broader universe of enterprise software is key to Slack’s longevity. Deeper integrations with a broad third-party ecosystem can help the service compete against Microsoft Teams and Google Hangouts Chat, according to Gartner Research Vice President Mike Gotta.To read this article in full or to leave a comment, please click here
In a few months, publicly trusted certificate authorities will have to start honoring a special Domain Name System (DNS) record that allows domain owners to specify who is allowed to issue SSL certificates for their domains.The Certification Authority Authorization (CAA) DNS record became a standard in 2013 but didn't have much of a real-world impact because certificate authorities (CAs) were under no obligation to conform to them.The record allows a domain owner to list the CAs that are allowed to issue SSL/TLS certificates for that domain. The reason for this is to limit cases of unauthorized certificate issuance, which can be accidental or intentional, if a CA is compromised or has a rogue employee.To read this article in full or to leave a comment, please click here
New estimates out this week from Synergy Research suggest that in the cloud computing market the big and getting bigger, and that in order to compete in this market, scale is key.+MORE AT NETWORK WORLD: Battle of the clouds: Amazon Web Services, Microsoft Azure, Google Cloud Platform + Synergy Research
Synergy Research data shows that 68% of the cloud market is served by hyperscale vendors, which means if you don't have scale, it's tough to compete. To read this article in full or to leave a comment, please click here
High-profile hacking attacks might dominate the headlines, but one of the biggest risks to your security isn’t software vulnerabilities or malware—it’s phishing attacks. There were more than 1.2 million phishing attacks last year alone, up 65 percent over 2015, according to the Anti-Phishing Working Group (APWG).+ Also on Network World: 25% to 30% of users struggle with identifying phishing threats, study says +
Phishing attacks usually come in the form of a fake email that appears to be from a legitimate source, such as your bank, employer or a website you use frequently. The idea is to get you to hand over the keys to your accounts by prompting you to type your login details and password into a fake website front. Victims click the link in an email and get taken to a website that looks just like the real thing, but in reality, it has been created to steal information.To read this article in full or to leave a comment, please click here
Seagate and IDC recently issued a white paper that predicted an explosion of the amount of data that we’ll be dealing with by 2025. As more device makers create Internet of Things devices, these devices will create tons of data for people to analyze.Two devices I recently had a chance to test produce a bunch of data, but in different environments. The HumX system by Verizon tracks and analyzes data from your car, while the Live Sense sleep sensor tracks and monitors your body during sleep. Verizon
The HumX by Verizon system includes an OBD reader, Bluetooth speaker (that clips onto a driver's visor) and smartphone app.To read this article in full or to leave a comment, please click here
This is a good time for open-source communication systems.The decentralized, free software, Twitter-esque social network Mastodon seems to be doing rather well. And now Wire, the end-to-end encrypted instant messaging platform, is releasing the source code for its server.The source for the Wire client was already available. But now the company is releasing the server source code, as well—up on GitHub and licensed under the AGPL.To read this article in full or to leave a comment, please click here
These days, it’s tough for any organization to keep up with cybersecurity operations. Why? Well, the bad guys are pretty persistent for starters, launching a blitzkrieg of attacks and new types of exploits all the time. OK, hackers are relentless, but we’ve always know this, and their behavior isn’t likely to change anytime soon. What’s really disturbing, however, is that a lot of problems associated with cybersecurity are based upon our own intransigence. And organizations aren’t struggling with one issue, rather cybersecurity operations challenges tend to be spread across people, processes and technology. When it comes to security operations, it’s kind of a "death by a thousand cuts" situation. To read this article in full or to leave a comment, please click here
The iPad made it possible to leave your laptop at home and still stay productive. You could write emails, watch movies, and surf the web all through a 9.7-inch touch screen display. It wasn't the first tablet, but it was one of the most popular. Apple sold 300,000 units on the first day and that hit a million in the first month. The cheapest model started at $499 and came with 16 GB of memory. Yikes!
To read this article in full or to leave a comment, please click here
The iPad made it possible to leave your laptop at home and still stay productive. You could write emails, watch movies, and surf the web all through a 9.7-inch touch screen display. It wasn't the first tablet, but it was one of the most popular. Apple sold 300,000 units on the first day and that hit a million in the first month. The cheapest model started at $499 and came with 16 GB of memory. Yikes!
To read this article in full or to leave a comment, please click here
The arrest last week of a Russian man in Spain was apparently for his role in a massive spam botnet and not related to an ongoing investigation into foreign tampering with last year's U.S. election.The botnet, called Kelihos, has enslaved hundreds of thousands of computers, and distributed spam and malware to users across the globe. However, the U.S. has taken action to dismantle the illegal operation, the Department of Justice said on Monday.The arrest of 36-year-old Peter Yuryevich Levashov, the botnet's alleged operator, was at first thought to be related to the ongoing U.S. investigation of presidential election-related hacking, but the DOJ said on Monday that wasn't the case.To read this article in full or to leave a comment, please click here
The Vastar breathalyzer is used to measure the concentration of alcohol in the human body. With a sensitive semi-conductor sensor, it takes only 5 seconds to show whether you can drive or not after drinking. It will show you high accuracy test results (up to 0.01mg/l). Four units of measurement can be converted (%BAC , ‰BAC, mg/l, mg/100ml). This breathalyzer is space-saving, lightweight and portable. Just put it in your pocket. With the current 39% off deal you can pick it up for just $18.99, a significant discount from its typical $32.99 list price. See the Vastar breathalyzer on Amazon.To read this article in full or to leave a comment, please click here
You will very soon be able to use Microsoft's Cortana voice assistant with the Raspberry Pi 3 and make cool devices that can accept voice commands.But for that, you'll need to upgrade the popular developer board, which can run Windows 10 IoT Core, to the Creators Update of the OS.You'll be able to use Cortana on Raspberry Pi similar to the way it works on PCs. You'll be able to ask for weather, time, traffic, or stock prices.Users will also able to build smart devices using Raspberry Pi 3 that will be able to accept Cortana's commands. But the devices will need to be based on Windows 10 IoT Core, not Linux-based OSes.Customized commands can be programmed for devices and could be related to reminders, look-ups, mapping, events, news, dictionary, and other "skills." To read this article in full or to leave a comment, please click here
A group of hackers that has been trying to sell exploits and malware allegedly used by the U.S. National Security Agency decided to make the data available for free over the weekend.The security community was expecting the password-encrypted archive that the Shadow Brokers group unlocked Saturday to contain previously unknown and unpatched exploits -- known in the industry as zero-days. That was not the case.As researchers started to analyze the exploits inside, it became clear that while some of them were technically interesting, the large majority were for old and publicly known vulnerabilities. Some appeared to have actually been sourced from public information and affect software versions that are several years old.To read this article in full or to leave a comment, please click here
Bring your phone and use it when you go swimming in the summer or skiing in the winter. This waterproof bag (3-pack), currently discounted by 35% on Amazon from $19.99 down to just $12.99. Great for using during outdoor activities including boating and swimming. It's flexible clear waterproof bag allows you to use your smartphone while keeping it safe and secure in the bag. They are IPX8 Certificated: Fully submersible and waterproof, it is designed for extreme condition. For more information and buying options, see the discounted waterproof bag on Amazon.To read this article in full or to leave a comment, please click here
Microsoft has for decades owned the intersection of collaboration, productivity and communication. However, as these services shifted to the cloud, it opened pathways for greater competition and flexibility in how organizations deployed applications for their workforce. Through G Suite, Google has stretched its resources and refined its family of apps for enterprise. The market is far from locked up, however, and analysts see at least some room for new players to emerge to challenge Google and Microsoft.Could Amazon be the dark horse of enterprise collaboration? The company has a dominating position in cloud-based infrastructure, but its moves in the application market, albeit reserved, have yet to deliver similar impact. But what if it decides to focus on the collaboration market?To read this article in full or to leave a comment, please click here
Imagine a fellow airplane passenger sitting next to you and yelling into his mobile phone for six hours during a cross-country flight.If simply thinking about that scenario gives you a headache, you're not alone. On Monday, the U.S. Federal Communications Commission killed a plan to allow mobile phone calls during commercial airline flights.Since 2013, the FCC and the Federal Aviation Administration have considered allowing airline passengers to talk on the phones during flights, although the FAA also proposed rules requiring airlines to give passengers notice if they planned to allow phone calls.To read this article in full or to leave a comment, please click here
Microsoft today announced it is acquiring Deis, a company that has been building open-source tools for rapid and easy creation and management of applications on Kubernetes, the open-source container cluster manager for automated deployment, scaling and management of containerized applications. This is not Microsoft’s first foray into containers. It announced plans to work with Google, which created Kubernetes before turning it over to a consortium, back in 2014. In February of this year, Microsoft made Kubernetes generally available on its own Azure Container Service.+ Also on Network World: Containers: IT history seems to be repeating itself +
Containers are an alternative to virtual machines in that they let organizations build, deploy and move applications to and from the cloud without a full virtual machine. Containers have a much smaller footprint and thus take up fewer resources.To read this article in full or to leave a comment, please click here