Archive

Category Archives for "Network World Wireless"

How to close up the holes in your network

The cloud is now a mainstream IT platform. Through its unlimited economies of scale and its ability to deliver IT resources dynamically whenever users need them, the cloud’s popularity permeates through businesses of all sizes and industries.To read this article in full or to leave a comment, please click here(Insider Story)

10 ways to put your old Android phone or tablet to use

Give your old phone or tablet a new lease on lifeImage by Derek WalterSo, you have a new phone that doesn’t leave your side. Sure, you can get rid of the old one through a resale site or donation, but there is another option: give it a second life with a different purpose.To read this article in full or to leave a comment, please click here

Intel’s new Kaby Lake processors: No performance gains

Intel recently released its newest generation of processors, the "Kaby Lake" generation, and performance tests are coming up wanting. It seems there is little to no gain at all from Kaby Lake over the prior generation, known as Skylake. I first heard of this a month ago, when the Chinese hobbyist site Expreview published a series of tests of Kaby Lake vs. Skylake. Kaby Lake runs at a higher clock speed than Skylake, but in one test they altered the clock so the two CPUs both ran at the same clock speed. At their stock settings, the Core i7-7700K (Kaby Lake) is up to 7.40 percent faster on average in single-threaded and up to 8.88 percent faster on average in multi-threaded performance compared to the Core i7-6700K (Skylake) when run at the stock settings. To read this article in full or to leave a comment, please click here

10 cool creative tech treasures at CES 2017

Creative inspirationImage by CESCES is always heaven on earth for the gadget obsessed. While glitzy car tech, virtual reality, home automation, and wearables tend to dominate the headlines, consumer tech companies didn’t forget about visually-oriented parents and teachers, students and photographers, and the artistically-inclined among us seeking that hidden gem that solves problems and boosts creativity. Here are some of the cool visual treasures launched at CES 2017, which promise to be available sometime this year.To read this article in full or to leave a comment, please click here

New products of the week 1.9.17

New products of the weekImage by invrisionOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Comodo Internet Security 10Image by ComodoTo read this article in full or to leave a comment, please click here

Windows 10 tips and tricks for Wi-Fi and networking

There have been many changes in Windows 10, especially since the first anniversary update last August, officially called version 1607. Here are some of the most important changes related to the Wi-Fi and networking aspects of Windows 10, along with some tips and tricks on using the new and improved features and navigating the revamped GUI.To read this article in full or to leave a comment, please click here(Insider Story)

Promoting cloud in a risk-averse organization

Our organization, like most large public bodies, is locked into formal bureaucratic procedures and, by general standards, is highly risk-averse. In addition, like other organizations of the United Nations System, it has a unique attribute which makes moving to the cloud a much greater leap than for most other organizations: UN System organizations enjoy a special status.In the aftermath of World War II, countries negotiating the Charter for the future United Nations agreed the organization should be in a position to function without interference from any single Member State. For this reason, a regime of privileges and immunities was developed. It is this special legal regime that ensures UN organizations are immune from the jurisdiction of national courts, that their premises cannot be entered by national enforcement agencies without their consent, and that their archives – including their data – cannot be accessed without their agreement.To read this article in full or to leave a comment, please click here

2017’s 25 geekiest 25th anniversaries

Early 90s notablesImage by Nintendo, Pan Books, Michael Hughes, Paramount PicturesA big year for technology – and technology-related events – 1992 saw the release of Linux under GNU, the sending of the first SMS message, IBM trotting out the ThinkPad and Simon, which was the first mobile phone to include PDA features (smartphone). The year also saw the launch of iconic videogame franchises Mario Kart and Mortal Kombat. And, perhaps worst of all, Microsoft unleashed upon the world the scourge that is PowerPoint. For previous versions of this series, please see: 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007.To read this article in full or to leave a comment, please click here

TV news anchor triggers Alexa to attempt ordering dollhouses

Last year, I was gifted an Amazon Echo; stunned, I stared at the gifter and thought to myself, have you ever met me…do you know me at all? The side of the Echo box listed features, starting with “fair-field voice control, with 7-microphone array and beam-forming technology to hear you from across the room.” Echo didn’t leave the box for six months.When I finally did open Echo, I was interested in comparing functions of Echo against those of ZOE; the latter smart home assistant was developed by Protonet with privacy in mind – nothing goes to the cloud so it couldn’t be turned into a surveillance device.To read this article in full or to leave a comment, please click here

The FTC’s IoT security case against D-Link will test its power

A Federal Trade Commission attempt to rein in a poorly secured IoT device is raising questions over whether the U.S. regulator has the power to crack down on vendors suspected of shoddy practices.On Thursday, the FTC filed a complaint against Taiwanese manufacturer D-Link Systems that charged the company’s internet routers and web cameras can easily be hacked, putting consumers at risk.But the FTC’s complaint doesn’t cite evidence that the products have been breached, only the potential for harm to consumers.That’s among the reasons D-Link is contesting the complaint. “Notably, the complaint does not allege any breach of a D-Link Systems device,” it said in a statement. To read this article in full or to leave a comment, please click here

Mac’s share falls to five-year low

Apple's Mac share of personal computers worldwide fell to a five-year low in December, mimicking the company's own numbers that have portrayed a four-quarter sales slowdown.According to web analytics vendor Net Applications, Apple's desktop and notebook operating system -- formerly OS X, now macOS -- powered just 6.1% of all personal computers last month, down from 7% a year ago and a peak of 9.6% as recently as April 2016.Net Applications measures operating system user share -- an estimate of the proportion of all personal computer owners who run a device powered by a specific OS -- by counting systems whose browsers reach websites of its clients.To read this article in full or to leave a comment, please click here

Microsoft closes the door on Visual Studio’s Team Rooms

Microsoft's Team Room collaboration capability for application lifecycle management soon will be no more. Instead, developers will need to rely on other options, such as Slack or Microsoft Teams.The company said this week that Team Rooms is to be deprecated from the on-premise Visual Studio Team Foundation Server at the next major version, and from the online Visual Studio Team Services platform later this year.[ Give yourself a technology career advantage with InfoWorld's Deep Dive technology reports and Computerworld's career trends reports. GET A 15% DISCOUNT through Jan. 15, 2017: Use code 8TIISZ4Z. ] "We don't have a name yet for this release, but it will be the version beyond TFS 2017 and associated updates," Microsoft's Ewald Hofman, TFS program manager, said.To read this article in full or to leave a comment, please click here

Why France’s new ‘right to disconnect’ law matters

France recently implemented a law giving workers "a right to disconnect" from email, messaging and calls after work. It may ultimately be ignored by many workers in France and scoffed at in the U.S., but it addresses a problem many employees deal with.Emails arriving at night, on weekends and during vacation can create stress and interrupt family life. An "always on" culture can hurt productivity in the long run because employees don't get time to rest and recharge, say researchers. Some companies see the problem.Daimler AG, the German automotive giant, has an optional email feature called "Mail on Holiday." It automatically deletes incoming emails during time off. An auto reply offers alternative contacts or suggests resending messages once the employee returns. It's available to 100,000 workers in Germany.To read this article in full or to leave a comment, please click here

Can government really fix the IoT mess?

The private sector often views government as the problem, not the solution. But, in the view of a growing number of experts, the opposite is true when it comes to addressing the rampant and increasing security risks of the Internet of Things (IoT).While it is not a unanimous view, there is general agreement that the blessings the IoT brings to modern life are being undermined by its curses – and that the market will not correct those curses.Its almost magical benefits are well documented and well advertised – self-driving cars and the ability to lock or unlock doors or adjust a home thermostat from hundreds of miles away were fantasies only a few years ago. But its billions of connected devices are so lacking in security that they are putting not only individual users at risk, but public and private infrastructure as well, including the infrastructure of the internet itself.To read this article in full or to leave a comment, please click here

T-Mobile’s Legere ‘rescues’ volunteer fire department, sticks finger in Verizon’s eye

Ever a social-media showman and tormenter of his competitors, T-Mobile CEO John Legere last night took to Twitter to lambaste Verizon’s decision to ding a volunteer fire company for $73,000 and offered to pick up that tab himself if necessary. And we don’t even know if the ponies played a part. Legere made his pledge on Twitter in response to yesterday’s Buzzblog post about a tiff between Verizon and the Chincoteague Volunteer Fire Company, which serves an island town of 3,000 in Virginia and is renowned for being caretakers of a herd of 150 wild horses, the Chincoteague Ponies, that has been the subject of a popular children’s book and movie. Legere’s tweet:To read this article in full or to leave a comment, please click here

When anti-malware vendors get into a slap fight, users lose

All is quiet on the Microsoft front, but there are other technology issues to address, which I will be doing in the next few blogs. The first is about a battle between two anti-malware vendors: PC Pitstop and Malwarebytes. --------------------------------------------------------Most software markets tend to consolidate around a handful or even one or two vendors. How many competitors are there for Photoshop, after all? But there are two markets that thrive and have a large number of players: gaming and anti-virus/anti-malware. It started about a month ago. On Dec. 7, PC Pitstop, maker of the PC Matic repair software and those obnoxious TV commercials, posted a ransomware test performed by AV Comparatives that included its PC Matic product and its many competitors, including Malwarebytes, the latter included for the first time. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Using artificial intelligence to teach computers to see

Creating a self-driving car should not be difficult, but it’s taking a while. Autonomous vehicles have been making headlines for years now, yet few of us have ever been in one or even seen one. We know that flying planes is more difficult than driving cars, yet pilots have enjoyed autopilot for decades. What gives?The answer is clear, or more precisely, clear vision. Pilots have used autopilot for decades in clear, open skies. Roads are more complex.The actual mechanics of operating a vehicle (accelerating, braking, steering, etc.) are all well understood and programmable. Most of the rules and logic of driving are programmable, too. But understanding and instructing vision is very complex. The good news is that incredible progress is being made, and the technology will have far-reaching implications.To read this article in full or to leave a comment, please click here

Samsung expects big profit despite Note7 crisis

The financial impact of the Note7 recall seems to be largely behind Samsung Electronics, which on Friday forecast that its profit has grown year-on-year by close to 50 percent in the fourth quarter.A major proportion of the profit of the largest smartphone company is expected to come from components such as memory chips and display panels, rather than from smartphones, according to analysts, a shift that was noticed in the third quarter as well."They were fortunate that their memory and displays businesses could offset the doom and gloom resulting from the Note 7 debacle last quarter," said Bryan Ma, vice president for devices research at IDC.To read this article in full or to leave a comment, please click here

FBI dispute with DNC over hacked servers may fuel doubt on Russia role

The FBI may have been forced into a misstep when investigating whether Russia hacked the Democratic National Committee -- the agency never directly examined the DNC servers that were breached.Instead, the FBI had to rely on forensic evidence provided by third-party cybersecurity firm CrowdStrike, which the DNC hired to mitigate the breach.“The FBI repeatedly stressed to DNC officials the necessity of obtaining direct access to servers and data, only to be rebuffed,” the agency said on Thursday in a statement.The incident threatens to spark more skepticism over whether the U.S. properly arrived at its conclusion that Russian cyberspies were responsible for the breach.To read this article in full or to leave a comment, please click here