Archive

Category Archives for "Network World Wireless"

8 data storage and recovery tips

Today, small businesses have as many (or nearly as many) options for data storage as much larger businesses. But with so many data storage options, how do you choose the right one for your business? Here’s how can you ensure your critical data will be available in the event of a disaster.To read this article in full or to leave a comment, please click here(Insider Story)

How core values shape these 5 tech giants

Growing from a startup to a large business requires consistent focus and dedication, and you can typically find those driving principles in a company's mission statement. While mission statements are usually more for investors or employees, they're a great way to find out what your favorite companies value.These five companies have embraced strong corporate values, each operating under a unique set of guidelines that have helped these once, small companies grow into the tech giants they are today.Twitter The company's mission statement is one simple sentence, "To give everyone the power to create and share ideas and information instantly, without barriers." One might argue that, technically, there is one barrier -- and that's the 140-character limit on Tweets, but let's not split hairs. Ultimately, Twitter wants to help create "free and global conversation," with a focus on constantly improving that discussion, rather than distracting from it.To read this article in full or to leave a comment, please click here

69% off Phaiser BHS-730 Bluetooth Sweatproof Sport Earbuds, Magnetic – Deal Alert

Phaiser's BHS-730 Bluetooth Sport earbuds are both highly rated and dramatically discounted on Amazon. Averaging 4.5 out of 5 stars on Amazon from over 7,800 people (read reviews), the list price of $160 has been reduced a significant 69% to just $50.  The BHS-730 uses the highest quality hardware, as well as Bluetooth 4.1 and A2DP stereo transfer protocols to produce bigger bass, lighter-than-air treble, and perfect phone call clarity every time. Bullet-shaped Comply T-400 M memory foam tips provide total isolation from external noise. It's designed to withstand the toughest environments, and the earbuds are made from Aviation Grade Aluminum-Magnesium-Alloy which doesn't add weight. And a LiquipelTM Nano-Coating means it can be dropped into water and will live to see another day. The BHS-730's are magnetized, so they stick to each other and stay securely around your neck when you need to take them out of your ears. Along with the earbuds you get a generous 7 sets of ear tips, a 60-day "no questions asked" return policy, and a lifetime sweatproof warranty as well. See the discounted Phaiser BHS-730 now on Amazon. To read this article in full or to leave a comment, please click here

6 tips for negotiating your next raise

In a recovering economy and a tight IT talent market, you have more leverage when angling for a raise. And the beginning of a new calendar year is a great time to ask for more money, as budgets are new and organizations begin to execute on their strategy and goals for the upcoming year.To read this article in full or to leave a comment, please click here(Insider Story)

Don’t become a dead-end developer

If you’re getting unclear direction from the boss, working long hours without proper compensation, or feeling like you can’t speak up, your career may already be accelerating toward a dead end. These are only a few of the symptoms of an engineering job gone wrong.Or maybe you feel like you’ve been pegged: the invisible developer, the awkward communicator, the underachiever. You’re juggling multiple projects, chasing bugs, learning new skills, but you don’t feel like you’re growing, and your career trajectory looks flat.[ Find out how to get ahead with our career development guide for developers. | The art of programming is changing rapidly. We help you navigate what's hot in programming and what's going cold. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ] What can you do about it?To read this article in full or to leave a comment, please click here

Why Linux users should worry about malware and what they can do about it

Preventing the spread of malware and/or dealing with the consequences of infection are a fact of life when using computers. If you’ve migrated to Linux or Mac seeking refuge from the never-ending stream of threats that seems to target Windows, you can breath a lungful of fresh air—just don’t let your guard down.Though UNIX-like systems such as Mac OS X and Linux can claim fewer threats due to their smaller user bases, threats do still exist. Viruses can be the least of your problem too. Ransomware, like the recent version of KillDisk, attacks your data and asks you to pay, well, a king’s ransom to save your files. (In the case of KillDisk, even paying the ransom can’t save you if you’re running Linux.)To read this article in full or to leave a comment, please click here

The war for cybersecurity talent hits the Hill

Many analysts and business leaders believe there is a severe need for qualified cybersecurity professionals in the U.S., something that has caught the eye of at least one key congressman.U.S. House Homeland Security Committee Chairman Michael McCaul (R-Texas) on Wednesday said more needs to be done to address the cybersecurity labor shortage.[To comment on this story, visit Computerworld's Facebook page.]"I agree 110% that we need to strengthen the workforce" of cybersecurity professionals, McCaul said during a meeting with reporters at the National Press Club.To read this article in full or to leave a comment, please click here

The unseemly world of Darkweb marketplaces

The genesis of underground markets goes back to when communication used to take place via Internet Relay Chat channels. Fast forward to the 21st Century with the evolution of cryptocurrencies and anonymous communications the underground market ecosystem has evolved.To read this article in full or to leave a comment, please click here(Insider Story)

Report: Attacks based on open source vulnerabilities will rise 20 percent this year

As open source code becomes more prevalent in both commercial and home-grown applications, the number of attacks based on its vulnerabilities will increase by 20 percent this year, predicted Black Duck Software, which collects statistics about open source projects.The number of commercial software projects that were composed of 50 percent or more of free, open source software went up from 3 percent in 2011 to 33 percent today, said Mike Pittenger, vice president of security strategy at Black Duck Software.The average commercial application uses more than 100 open source components, he said, and two-thirds of commercial applications have code with known vulnerabilities in it.To read this article in full or to leave a comment, please click here

How to handle security vulnerability reports

If there’s a flaw in your IT security — and there probably is — you can’t assume that someone in your organization will be the first to find it. But if you’re lucky, instead of ending up with ransomware or a data breach, you might hear about it from a security researcher or even a smart customer who’s spotted the problem and wants to warn you. Are you ready to listen?To read this article in full or to leave a comment, please click here(Insider Story)

Top 10 questions about Avaya’s networking business

The trials and tribulations of Avaya and the fate of its related businesses have been well documented in the press over the past six months. One of the business units I have been following most closely is the company’s networking business, as it has a differentiated product and could prove to be a significant asset to an acquirer. One of the challenges Avaya has had in networking is a lack of customer awareness into the product set or even the fact that Avaya is in networking. When I have brought the topic up with network engineers, I’ve received a number of questions about Avaya Networking. Below are the most common questions I have received: To read this article in full or to leave a comment, please click here

Tackling cybersecurity threat information sharing challenges

There’s been considerable talk in recent years about the importance of cybersecurity information sharing. After all, few organizations can really work in a vacuum and no single organization can see all of the threats laying in wait on the internet.And many CISOs find it helpful to share notes with others in their industry to compare which strategies and practices work best and compare program maturity levels. But the nearly two-decade effort to share such information hasn’t been smooth.Many organizations are wary of sharing sensitive cybersecurity information, especially with governments. Not only can such information jeopardize the security posture of an organization, it can damage customer impressions of a company and even affect stock values.To read this article in full or to leave a comment, please click here

50% off J5 Tactical V1-Pro Ultra Bright 3 Mode Flashlight – Deal Alert

Heavy duty, compact and tough as nails. Perhaps the last flashlight you'll ever need. That's how J5 Tactical describes their V1-Pro. A super bright 300 lumens LED produces an intense beam of light up to 600 feet with high, low and strobe modes. It can take a beating, is weather resistant, and works for hours on a single AA battery. With nearly 6,000 reviews on Amazon, it averages 4.5 out of 5 stars (read reviews). Its typical list price of $29.95 has been reduced by 50% to $14.95. See the discounted J5 Tactical V1-Pro flashlight now on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Reliability, not principally speed, will drive 5G

Brand-new research from a consultant and a trade body released last week estimates the deployment of 5G networks could create up to 3 million jobs. Accenture, along with CTIA, also predict the new radio networking technology will add $500 billion to the American GDP.That's good news. However, questions about 5G remain. And they’re unrelated to the actual physics of the technology—which doesn’t really exist yet. The questions include an important matter: What’s going to drive these kinds of high-flown claims, and why is 5G being trumpeted as special? Is it really such a quantum leap over existing networks?To read this article in full or to leave a comment, please click here

This Wi-Fi alternative rides on LTE rails

A group that sees enterprises and even consumers setting up their own LTE-like networks now has a formula to work from.On Tuesday, the MulteFire Alliance announced MulteFire Release 1.0, which defines an LTE-like network that can run entirely on unlicensed spectrum like the frequencies Wi-Fi uses. In some cases, it may be an alternative to Wi-Fi with more capacity, better security and easier handoffs from carrier networks, Alliance President Mazen Chmaytelli says.Users could include businesses that need highly predictable networks for time-sensitive industrial applications, stadium owners looking for a simpler way to speed up wireless for fans, and eventually consumers networking their homes. But none of these will happen overnight.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Dome9 offers multi-cloud security, adds native support for Azure

Dome9 Security, a cloud infrastructure security and compliance vendor, announced today that it is offering native support for the Microsoft Azure cloud platform.This is interesting because until now, Dome9 had strongly pushed an Amazon Web Services (AWS) story. The reasons for that are clear: AWS is the 1,000-pound elephant when it comes to cloud infrastructure, greatly eclipsing all other vendors in terms of market share. But reliance on a single vendor is risky, and the number of third-party vendors at AWS’ recent re:Invent conference that looked uncomfortable at AWS announcements shows the folly of being completely tied to one platform.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Fighting cybercrime using IoT and AI-based automation

Last November, detectives investigating a murder case in Bentonville, Arkansas, accessed utility data from a smart meter to determine that 140 gallons of water had been used at the victim’s home between 1 a.m. and 3 a.m. It was more water than had been used at the home before, and it was used at a suspicious time—evidence that the patio area had been sprayed down to conceal the murder scene.As technology advances, we have more detailed data and analytics at our fingertips than ever before. It can potentially offer new insights for crime investigators.One area crying out for more insight is cybersecurity.By 2020, 60 percent of digital businesses will suffer a major service failure due to the inability of IT security teams to manage digital risk, according to Gartner. If we pair all this new Internet of Things (IoT) data with artificial intelligence (AI) and machine learning, there’s scope to turn the tide in the fight against cybercriminals.To read this article in full or to leave a comment, please click here

Indian privacy case against WhatsApp gains momentum

A privacy lawsuit against WhatsApp in India over its new data sharing policy has got momentum with the country’s top court seeking responses from Facebook, WhatsApp and the federal government.The privacy policy of WhatsApp at launch in 2010 did not allow sharing of user data with any other party, and after Facebook announced its acquisition of the messaging app in 2014, it was “publicly announced and acknowledged” by WhatsApp that the privacy policy would not change, according to the petition filed by Indian users of WhatsApp.WhatsApp sparked off a furore last year when it said it would be sharing some account information of users with Facebook and its companies, including the mobile phone numbers they verified when they registered with WhatsApp. The sharing of information will enable users to see better friend suggestions and more relevant ads on Facebook, it added.To read this article in full or to leave a comment, please click here

Apple to release MacBook Pro models with 32GB of RAM this year

When Apple released its line of revamped MacBook Pros late last year, the response was surprisingly lukewarm. Even though Apple's new flagship notebook introduced us to the TouchBar, even the most die-hard Apple enthusiasts couldn't help but notice that Apple's new notebooks were a little underpowered and incredibly pricey.One of the more common complaints, at least from power users, was that Apple's new MacBook Pro maxed out at 16GB of RAM. While 16GB of RAM is more than enough for most users, folks who work with complex video and photography workflows will glady take all the memory they can get their hands on. And while Apple can arguably get away with a 16GB RAM limit on its MacBook and MacBook Air line, some pondered why Apple's Pro level notebook was subject to what was presumably an arbitrary ceiling.To read this article in full or to leave a comment, please click here

Intel thinks IoT will have a firm place in the stores of the future

Intel wants to level the playing field between online retailers and brick and mortar shops by introducing IoT technologies into physical stores. Currently, online retailers have access to information on what sorts of merchandise consumers look at, what they purchase, and what they don't. And Intel argues physical stores should have the same information.  In a Monday editorial on the company's site, Intel CEO, Brian Krzanich wrote:To read this article in full or to leave a comment, please click here