Here's a Bluetooth keyboard for your computer that you can also use with your tablet and smartphone -- switch between all three effortlessly by just turning the dial. And unlike other Bluetooth keyboards, Logitech has integrated a cradle so your device stays propped up at just the right angle as you type. Works with Windows or Mac, Android or iOS, and features a key layout you'll be familiar with on any of those platforms. Logitech's multi-device keyboard currently averages 4 out of 5 stars from over 1,350 people (read reviews) on Amazon, where its typical list price of $49.99 has been recently dropped 52% to just $23.99. See this deal now on Amazon.To read this article in full or to leave a comment, please click here
As is customary after a major service disruption, Amazon Web Services today released a post-mortem explaining why its Simple Storage Service experienced elevated error rates, causing many sites across the Internet to slow down or stop working on Tuesday.+MORE AT NETWORK WORLD: 5 Lessons from the AWS S3 outage and how to insulate yourself from the next one | Half of the top 100 retail websites had slow load times during the S3 outage, vendor finds +To read this article in full or to leave a comment, please click here
The relationship between humans and machines has captivated people for years—from robots that can win Jeopardy to those that can sense human emotions, the list is endless.Today, however, machines are no longer simply a novelty. The rise of analytics and artificial intelligence (AI) has become a key component of a business’ success. In the banking world, there are many examples to point to: self-service tellers, automated loan processing, payments, etc. But there’s one in particular that is fascinating—the robo-advisor.+ Also on Network World: AI as advisor, not magician +
Managing personal investments and wealth has traditionally been left to the experts—a team of wealth advisors and managers who met annually with clients. Robo-advising, the process of providing automated, algorithm-based portfolio management advice, is changing that.To read this article in full or to leave a comment, please click here
Set within a sinister plantation mansion in modern day rural America and taking place after the dramatic events of Resident Evil 6, players experience the terror directly from the first person perspective for the first time in the series. Embodying the iconic gameplay elements of exploration and tense atmosphere that first coined "survival horror" some twenty years ago, Resident Evil 7 biohazard delivers a disturbingly realistic experience that will define the next era in horror entertainment. Its typical list price has been discounted 33%, at least for now, to $39.99 on Amazon. See the Resident Evil 7: Biohazard for PS4 deal on Amazon right now.To read this article in full or to leave a comment, please click here
For the first time in a decade, we have competition in the x86 market. AMD is finally poised for a comeback with a true breakthrough in performance in its Ryzen line of processors, and Intel is reacting.Benchmarks show the Ryzen processors, a completely new design by Jim Keller, the same engineer who created the Athlon chip more than a decade ago and turned AMD from an also-ran into a real competitor (for at least a little while), outperform Intel's best and cost a lot less. The result is temporary sell-outs of some CPU pre-orders. To read this article in full or to leave a comment, please click here
Last week, Cisco held the European version of it’s Cisco Live event in Berlin. At these events, Cisco typically makes several product announcements and demonstrates many of its new products. Cisco Live is also a time for the company’s alliance and technology partners to showcase their own wares as they look to add value to the Cisco ecosystem. One of the more interesting announcements by an technology partner at the 2017 show was from VOSS Solutions, which extended its platform to support Cisco Spark Hybrid Services. The Spark platform has been red hot of late, as Cisco has made it the company’s main UC platform. During the show, the Spark Board garnered a lot of attention, including being part of Ruba Borno’s day 1 keynote. To read this article in full or to leave a comment, please click here
Google has expanded its Safe Browsing service, allowing Google Chrome on macOS to better protect users from programs that locally inject ads into web pages or that change the browser's home page and search settings.The Safe Browsing service is used by Google's search engine, as well as Google Chrome and Mozilla Firefox, to block users from accessing websites that host malicious code or malicious software. The service is also used in Chrome to scan downloaded files and block users from executing those that are flagged as malicious."Safe Browsing is broadening its protection of macOS devices, enabling safer browsing experiences by improving defenses against unwanted software and malware targeting macOS," Google said in a blog post Wednesday. "As a result, macOS users may start seeing more warnings when they navigate to dangerous sites or download dangerous files."To read this article in full or to leave a comment, please click here
The challenges of networking on college campuses can be serious business, particularly if, like the University of Washington, you’ve got to worry about not one but three distinct campuses.
And, as Washington’s director of mobile communications David Morton told Network World Wednesday at Aruba Atmosphere 2017, that challenge isn’t limited to those campuses.
+ALSO ON NETWORK WORLD: Amazon's AWS S3 outage impacted Apple's services + Cisco warns of NetFlow appliance vulnerabilityTo read this article in full or to leave a comment, please click here
Google has lessened one frustration with Gmail, in allowing you to receive attachments up to 50MB, but senders are still stuck at a 25MB limit for total attachment size.What's unclear is where the heck these 25MB-plus messages would be coming from since most email systems, like Yahoo and Microsoft Outlook, also have 25MB or lower limits on attachments.(A report out of BGR India suggests the upgrade really only applies to attachments sent from within Google G Suite apps.)MORE: Google Spaces headed to the graveyardTo read this article in full or to leave a comment, please click here
Staring at a Chapter 11 bankruptcy, Avaya told the court last week it wants out of the$350,000 annual payment for its San Francisco 49ers stadium suite and that the team’s recent miserable performance has made the suite harder to sell off.
According to a Reuters report, the cost of the license for the suite, $350,000 due this month, is a burden on Avaya's estate and the company is seeking court permission to reject the agreement which was signed for 10 years.To read this article in full or to leave a comment, please click here
The de.Light system (about $150) by XY-Connect (based in Singapore) is one of the more unique networking products I’ve tried in some time. The set includes an LED light bulb with Wi-Fi capabilities, gaining network access through a powerline adapter that users can plug into their home router. The system is designed to help fill any Wi-Fi blind spots within your home, giving client devices network access without needing to upgrade to a new router or switch.Here’s how it works: you plug the de.Light Adapter into a wall outlet near your existing router, then plug in the included Ethernet cable into one of your router’s LAN ports. The Adapter includes a passthrough power outlet, so you can then plug other things (like a power strip or other power cord) into it without losing the outlet. The adapter supports HomeplugAV, creating a powerline network throughout the power lines within your home. The light bulb (an LED device) screws into any light socket. The company says the bulb works better with overhead lighting sockets rather than mobile lamps, to give Wi-Fi coverage from the top downward into an area.To read this article in full or to Continue reading
Performance reviews and employee satisfaction surveys aren't always the best way to get honest feedback from employees. And as a result, more companies are moving to establish a feedback culture, which relies on fostering an open-culture through communication and frequent check-ins with employees.Ty Tucker, CEO of REV, a performance management platform vendor, emphasizes the importance of encouraging trust and patience when building a feedback culture."In the end, it doesn't matter if you have the best perks -- like a fancy cafeteria that offers free lunch or a gym in the office -- without trust, none of this matters. Although this business philosophy can take a lot longer to gain traction than simply sending out a survey, you will likely receive more honest opinions and genuine feedback if your employees trust you -- and vice versa," he says.To read this article in full or to leave a comment, please click here
Anyone who depends on their tablet throughout the workday knows that disaster can strike at any moment -- it can get accidentally pushed off a desk or dropped while you're running for your airline connection, or caught in a sudden storm, or sat on by your three-year-old.If you want to avoid last-minute catastrophes, then you may want to consider buying a ruggedized tablet.There were about 530,000 rugged tablets sold in 2016, about 0.3% of the overall computer market, making it a niche within a niche, according to Chetan Mohan, lead hardware and semiconductor analyst at market-research firm Technavio. He forecasts sales to rise to 720,000 systems by 2021, an annual increase of over 6% -- a rare portion of the PC market that is prospering.To read this article in full or to leave a comment, please click here
OK, we’re kidding a bit. Chrome is great. Google did a wonderful job with it—and continues improving it every day. The marketplace recognizes this, and many surveys show Chrome is the most popular browser by far.It’s not hard to see why. Chrome is stable, in part because its architects made a smart decision to put each web page in a separate process. It has excellent HTML5 standards support, loads of extensions, synchronization across computers, and tight integration with Google’s cloud services. All of these reasons and more make Chrome the popular choice.To read this article in full or to leave a comment, please click here
Prime your Pi for enterprise IoTImage by Logo by Raspberry Pi FoundationIoT is a sparkly new term for what the scientific community has been doing for a long time. But now, in its enterprise incarnation, we’re trying to place those data-gathering devices closer to the edge. Both researchers and businesses are essentially looking for “time series” data -- in other words, time-stamped data about the physical world around you. A great example of this can be found in the power industry, where companies are trying to obtain detailed information on power usage closer to their consumers, so they can build better usage models for the likes of rooftop solar.To read this article in full or to leave a comment, please click here
According to F-Secure’s The State of Cyber Security 2017 report, criminal hackers perform most cyber-attacks using basic, scriptable techniques against poorly maintained infrastructure. This will continue as long as there are loads of attack scripts and plenty of poorly secured networks.The number of attack scripts is climbing as elite hackers continue to create these scripts and sell them to others, says Itzik Kotler, CTO and Co-Founder, SafeBreach. There doesn’t seem to be any stopping this trend.CSO examines scriptable attacks and the part of the problem that you can control: getting your infrastructure in shape to shrug off these breaches.To read this article in full or to leave a comment, please click here
Preparing and responding to a cyberattackImage by ThinkstockCybersecurity incidents continue to grow in both volume and sophistication, with 64 percent more security incidents reported in 2015 than in 2014, according to a June 2016 report by the Ponemon Institute. The human instinct is to try to find those responsible. However, any attempt to access, damage or impair another system that appears to be involved in an attack is mostly likely illegal and can result in civil and/or criminal liability. Since many intrusions and attacks are launched from compromised systems, there’s also the danger of damaging an innocent victim’s system.To read this article in full or to leave a comment, please click here
Interested in producing your own podcast or video series entirely from a free software-fueled, Linux-powered computer? Here’s how I accomplish that task.Feel free to copy my exact setup for your own use. Or take some of my recommendations. Or ignore everything I say here and do things better than I do. Either way, hopefully this proves useful in your Linux-fueled media production endeavors.Podcasting and video hardware
The hardware setup for my daily recording is fairly simple. More often than not, I utilize a Blue USB Yeti microphone. It has exceptionally good sound (especially for the roughly $100 price tag) and functions as a sound device on every modern Linux distribution I’ve encountered.To read this article in full or to leave a comment, please click here
The U.S. Federal Communications Commission has halted new rules that would require high-speed internet providers to take 'reasonable' steps to protect customer data.In a 2-1 vote that went along party lines, the FCC voted Wednesday to stay temporarily one part of privacy rules passed in October that would give consumers the right to decide how their data is used and shared by broadband providers.The rules include the requirement that internet service providers should obtain "opt-in" consent from consumers to use and share sensitive information such as geolocation and web browsing history, and also give customers the option to opt out from the sharing of non-sensitive information such as email addresses or service tier information.To read this article in full or to leave a comment, please click here
More than 130 Android apps on the Google Play store have been found to contain malicious coding, possibly because the developers were using infected computers, according to security researchers.The 132 apps were found generating hidden iframes, or an HTML document embedded inside a webpage, linking to two domains that have hosted malware, according to security firm Palo Alto Networks.Google has already removed the apps from its Play store. But what's interesting is the developers behind the apps probably aren't to blame for including the malicious code, Palo Alto Networks said in a Wednesday blog post.To read this article in full or to leave a comment, please click here