Archive

Category Archives for "Network World Wireless"

Pivotal, Google team up for Kubernetes cloud management

Pivotal and Google have launched Project Kubo to apply Pivotal's Bosh tool for deploying and managing cloud software to Google's Kubernetes container orchestration platform.Currently in an alpha release stage, Kubo instantiates, deploys, and manages Kubernetes clusters on any cloud. Pivotal has been working on the project with members of the Google Cloud platform team.[ To the cloud! Real-world container migrations. | Dig into the the red-hot open source framework in InfoWorld's beginner's guide to Docker. ] Kubo can be used with existing production applications written in specific languages, and it can access platform primitives. Bosh, featured as part of Cloud Foundry, provides an open source tool chain for managing large-scale distributed services. It offers a combination of a virtual machine build tool, configuration and health management, and logging. Bosh has been used to build consistent, self-healing environments with zero downtime, Seroter said.To read this article in full or to leave a comment, please click here

Switching from Mac to PC: Choosing a laptop

I’m committed to switching from a Mac to a PC, and the next step is to start shopping. When you haven’t used anything but Macs for close to two decades, the sheer quantity and variety of Windows choices poses a challenge. So, while I researched which new Windows laptop would be a good fit for me, I spent some time experimenting with the first Windows computer I could get my hands on: my Mac.Easing into Windows via Bootcamp Most modern Apple computers come with Boot Camp Assistant—a program designed to help you turn your Apple computer into a machine that can dual-boot into Windows. A copy of Windows 10 Home can be had for $120 (or downloaded and used for free with limited options,) so using the OS with Boot Camp is a great way to see what Microsoft has to offer before you invest in a PC.To read this article in full or to leave a comment, please click here

How to remove ransomware: Use this battle plan to fight back

Ransomware doesn’t sneak into your PC like ordinary malware. It bursts in, points a gun at your data, and screams for cash—or else. And if you don’t learn to defend yourself, it could happen again and again.Armed gangs of digital thieves roaming the information superhighway sounds like an overwrought action movie, but the numbers say it’s true: Ransomware attacks rose from 3.8 million in 2015 to 638 million in 2016, an increase of 167 times year over year, according to Sonicwall—even as the number of malware attacks declined. Why steal data when you can simply demand cash?To read this article in full or to leave a comment, please click here

Why GE is winning the war for tech talent

Hiring enough tech talent to facilitate digital transformations typically tops the list of challenges CIOs face. They could do worse than follow the blueprint crafted by 125-year-old General Electric.The company has lured top tech executives from Apple, Google and Microsoft by underscoring the huge role GE plans to play in the so-called Fourth Industrial Revolution, an era defined more by software platforms and APIs than heavy metal. It has also overhauled a talent recruitment practice that was more suited for the industrial giant of yore by bringing in technical recruiters who offer the kind compensation packages pitched by Silicon Valley titans.To read this article in full or to leave a comment, please click here

IDG Contributor Network: How to avoid falling for the W-2 phishing scam

While this blog is nominally mine, I don’t come up with ideas in a vacuum. This article on W-2 scams sprung from a conversation I had with my colleague Steve Williams, who ended up being my co-author. Check out more about him at the end of this piece.Multiple times each year, LinkedIn feeds and information security forums light up with examples of the latest and greatest versions of phishing attacks. Most recently the hot stories have been about a simple targeted request that avoids links, attachments, and malware, plays friendly with email filters, and appears extremely urgent to the recipient. This form of phishing is known as the W-2 scam.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Intelligent automation points the way to future economic growth

As someone deeply involved in technology strategy, I’m often asked about the impact of automation. Will automation—specifically, intelligent automation—create prosperity and growth, or will it create a dystopian future where workers are increasingly replaced by software robots?I always answer—and believe—that intelligent automation is a vast opportunity, not a threat. By working hand in hand with intelligent technology, we can achieve greater things. It frees us from mundane, repetitive activities—unleashing creativity and letting us build stronger, more productive working relationships. Intelligent automation makes us more human, not less.Unprecedented productivity gains That’s why McKinsey’s recent report, A Future That Works, is so fascinating. It predicts that automation will increase productivity by up to 1.4 percent per year over the next 50 years. By comparison, the steam engine only drove 0.3 percent annual increases, and the IT revolution only raised productivity growth by 0.4 percent.To read this article in full or to leave a comment, please click here

IDG Contributor Network: The definition of work is shifting—here’s what you need to know

Back in the late 1990s, when I started my career with a job helping to develop IBM’s first ecommerce payment product, the term “work” was rather strictly defined. For the most part, my colleagues and I conformed to regular office hours, stationed at our desks on site. But even so, it was impossible to ignore the signs portending how the workplace was poised to change. My Nokia handset offered an exciting new kind of 24/7 connectivity, audio conferencing was gaining in popularity, and “telecommuting” was on the rise (to name just a few).+ Also on Network World: A mobile-first strategy improves employee productivity, study finds + Fast forward to today, and it’s clear that the definition of work is continuing to morph, now even faster than before. Savvy employers realize there is little time to waste and that they must adapt to a variety of cultural and technological changes if they want to attract and retain talent, improve employee performance and maintain a competitive advantage. Here’s what you need to know about this shifting landscape:To read this article in full or to leave a comment, please click here

IDG Contributor Network: Botnets: Is your network really protected?

The tech world moves at a tremendous pace, unleashing wave after wave of innovation intended to improve our everyday lives. Many new devices, from security cameras to fridges, or TVs to baby monitors, are now internet connected. This affords us remote access and facilitates the collection of data, which is ostensibly used to make our systems “smarter.”However, it also opens new doors into our offices and homes through which hackers can come uninvited.There were around 6.4 billion connected things in use worldwide in 2016, and that’s set to grow to 8.4 billion this year, according to Gartner. There’s no doubt that the Internet of Things (IoT) will bring many benefits, but it also brings greater risk.To read this article in full or to leave a comment, please click here

Review: Slow Internet? Firebind can sniff out the problem

We found Firebind to be an effective tool for reaching into branch office networks to diagnose internet-based performance problems. Firebind has a simple agent installation procedure and uses email-based alerting, so network managers won’t find it a burden to install or operate.To read this article in full or to leave a comment, please click here(Insider Story)

Zix wins 5-vendor email encryption shootout

Email encryption products have made major strides since we last looked at them nearly two years ago. They have gotten easier to use and deploy, thanks to a combination of user interface and encryption key management improvements, and are at the point where encryption can almost be called effortless on the part of the end user.To read this article in full or to leave a comment, please click here(Insider Story)

NASA Pi Day Challenge 2017: Don’t crater…

NASA is encouraging teachers to share its Pi Day Challenge with students on March 14, which is known in mathematical circles as Pi Day (i.e., 3.14). After all, who can't get fired up to learn more about the mathematical constant that is the ratio of a circle's circumference to its diameter?Jet Propulsion Laboratory for the fourth straight year has created an illustrated quiz aimed at students in grades 6 through 12 features four math problems (using pi) that NASA scientists and engineers must solve to understand space.Topics touched on in the quiz include Mars craters, a total solar eclipse, Saturn and the search for life beyond Earth.To read this article in full or to leave a comment, please click here

iPhone 8 Rumor Rollup: The Great iPhone 8 freak-out, no worries about Galaxy S8, new concept design

This past week featured the Great iPhone 8 freak-out, with more rumors that the 10th anniversary Apple smartphone would be delayed past September and that it might not even be called the iPhone 8 or the iPhone X. No, instead the Apple Watch-esque iPhone Edition is the latest possible name to be bandied about.THE NEW EDITION  Forbes picked up on a report from hit or miss Japanese site Mac Otakara that Apple is mulling iPhone Edition as the name for its next flagship smartphone. This name for the speculated to be $1,000 device would align with the top-end Apple Watch, dubbed Watch Edition. To read this article in full or to leave a comment, please click here

The Gearhead Toolbox, first opening, and look! Static web sites!

Welcome to the first opening of The Gearhead Toolbox. There are so many really amazing tools and services appearing these days I’m going to start regularly posting a selection from the Toolbox to make sure you know what’s hot. In this, the first installment, we focus on static web site generators and hosting.StaticGen, choosing a static web site generatorThere are lots of web publishing frameworks and a design that’s become extremely popular is static web sites. The rationale for sites built this way is that they are simple to host (there’s little or no server side configuration required) and compared to products like WordPress they present no attack surface making it trivially easy to secure your content from hackers. On top of that, without the overhead of running databases and tons of supporting backend code, static web sites are really fast so you’ll get better SEO ratings!To read this article in full or to leave a comment, please click here

70% off PaperPort Professional 14 – Deal Alert

One thing for certain is that every year we have to file our taxes. Stuck between gathering all the correct documentation and making sure you have everything you need in one place, it can become a strenuous process. Take control of your documents and have instant access to them all. From scanning and converting, to editing and sharing files, with PaperPort Professional 14 simplify document management and spend less time thinking about missing files and more on getting work done. Nuance is currently offering PaperPort Professional 14 at the discounted price of $600, a good deal considering its $200 list price. Check this deal now on Nuance.To read this article in full or to leave a comment, please click here

33% off YETI Hopper 20 Portable Cooler – Deal Alert

The YETI Hopper 20 ice-for-days portable cooler and is tough as nails so it can be hauled anywhere you want to take it.  It features a DryHide Shell and nearly indestructible straps will stand up to an abundance of abuse in the field.  It's HydroLok Zipper is completely leakproof, eliminating spills and locking in cold.  It can hold 18 cans, a limit of rainbow trout, or 20 pounds of ice.  The YETI Hopper 20 is currently selling at the discounted price of $199.99, a good deal considering its $299.95 list price. See this high-end portable cooler now on Amazon. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Tech crime as a service escalates

Criminals are increasingly offered crime as a service (CaaS) and are using sharing-economy ride-sharing and accommodation services, too, a major law enforcement agency says.Europol, the European Union’s policing office says tech-oriented CaaS is being offered to swathes of the underbelly of Europe. Criminals gain an advantage because they can perform crimes better and more efficiently, and they can work at scales greater than their existing technical proficiency.+ Also on Network World: Anonymous hacker causes dark web to shrink by as much as 85% + An estimated 5,000 internationally operating crime gangs are currently being investigated in the trading bloc, according to Europol.To read this article in full or to leave a comment, please click here

Anonymous hacker causes dark web to shrink by as much as 85%

An attack by Anonymous, the shadowy hacker crew that seems to alternate between good guys and bad guys depending on the issue, help cut the dark web down by as much as 85 percent, according to a new report. Anonymous turned its sights on Freedom Hosting II, a hosting service for Tor-based sites, at the start of February. Freedom Hosting II (FHII) was the host to over 10,000 dark web sites, many of them hosting images of sexually abused children. It was named after another host, Freedom Hosting, that Anonymous took down in 2011. An Anonymous hacker went after the service after they discovered the provider knew what was going on and did nothing to stop it. The hacker who did it told Vice it was his first hack, and he didn't intend to take down the site—just look through it. When he found large amounts of child porn, he deduced the site knew what was going on and he decided to take down the hosts. To read this article in full or to leave a comment, please click here

IBM pledge: Not only does Notes/Domino live, there’s no end in sight

Having begun my time here covering the late 1990s email/collaboration battles between Lotus Notes/Domino, Microsoft Outlook/Exchange, and, yes, Novell GroupWise, it’s interesting to see IBM, which bought Lotus in 1995, pledging to support Domino and Notes for, well, an open-ended long period of time.Not surprising, though.    In a blog post published yesterday, Ed Brill, vice president of product management and design for IBM Collaboration Solutions, laid out the company’s current thinking: “Notes/Domino 9.0 shipped in 2013, and IBM’s normal five-year support model meant that mainstream support could have ended in 2018. However, we know how important these products are to your business, and we are continuing to invest in new functionality. For IBM Notes/Domino 9.0, we have announced that product support will be extended through at least 2021, and extended support through at least 2024. There is no end of life planned for Notes and Domino, and we will continue to update the timeline for support as appropriate based on future releases and market requirements.”To read this article in full or to leave a comment, please click here