Amazon has activated a limited time discount on its popular Kindle Paperwhite e-reader, when you buy it bundled with a few essential accessories. The bundle includes the latest Kindle Paperwhite 6" E-Reader in black with Special Offers ($119.99), an Amazon Leather Cover ($39.99), and Amazon 5W Power Adapter ($19.99), all for $139.97, for a limited time, saving you $40. See the bundle on Amazon.To read this article in full or to leave a comment, please click here
Oracle co-CEO Safra Catz is joining President-elect Donald Trump's transition team, the team said Thursday. She will sit on its executive committee and remain in her position at Oracle.The appointment comes a day after Catz and other tech leaders met Trump in a high-profile meeting at his New York offices."I'm actually privileged and honored to even be here, and we are looking forward to helping you, and your administration," Catz said at the beginning of the meeting.+ ALSO: Trump to tech CEOs: We're there for you +To read this article in full or to leave a comment, please click here
What is it they say about failing to learn the lessons of history and being doomed to repeat it? However the famous saying goes, I think we can agree that the events of 2016 can be very instructive if we choose to pay attention.To read this article in full or to leave a comment, please click here(Insider Story)
In 2016, a battle started to heat up in the enterprise collaboration market. The stalwarts of business, as well as consumer tech giants and a set of new entrants, were all in the mix. In this increasingly crowded market, the varying apps and other services targeted businesses from many different angles.Here are our picks for the most significant collaboration developments of the past year.1) Facebook at Work (finally) launches as 'Workplace'
Facebook already owns consumer social networking, and with its new Workplace service, it set sights on the enterprise. The offering is designed to feel familiar to Facebook users but also remain separate from the company's consumer platform. (For more details, read our prelaunch history of Workplace.)To read this article in full or to leave a comment, please click here
IT sharpens its focusImage by ComputerworldWhat's the outlook for the tech year ahead? In general, IT executives are feeling optimistic as they head into 2017. According to the results of Computerworld's Tech Forecast 2017 survey, enterprises plan to continue on the path to digital transformation, deepening their commitment to big data and analytics, as well as cloud computing and software as a service (SaaS).To read this article in full or to leave a comment, please click here
A giftScam artists see the holidays as an opportunity to rip people off. This year is no different. PhishMe’s Chief Threat Scientist Gary Warner has caught a few to share.Paypal: Suspicious activityImage by PhishMeTo read this article in full or to leave a comment, please click here
The new Internet communication protocol, HTTP/2, is now being used by 11 percent of websites -- up from just 2.3 percent a year ago, according to W3Techs.The new protocol does offer better performance, but there is no particular rush to upgrade, and it's backwards-compatible with the previous protocol, HTTP/1.1.No security problems have been found in the protocol itself, but there are vulnerabilities in some implementations and the possibility of lower visibility into internet traffic, so it's worth waiting for everything to shake out.The pressure to switch is likely to come from lines of business, said Graham Ahearne, director of product management at security firm Corvil.To read this article in full or to leave a comment, please click here
The Professional Surge Protector CSP300WUR1 safeguards common home and office devices, such as computers and electronics, by absorbing spikes in energy caused by storms and electrical power surges. Designed for convenience, the portable CSP300WUR1 is ideal for travelers. It provides 600 joules of protection, has three surge-protected outlets, and a folding wall tap plug. Two USB ports (2.1 Amp shared) charge personal electronics, including smartphones, digital cameras, MP3 players, and other devices. A Limited-Lifetime Warranty ensures that this surge suppressor has passed high quality standards in design, assembly, material or workmanship and further protection is offered by a $50,000 Connected Equipment Guarantee. It currently averages 4 out of 5 stars on Amazon, where its typical list price of $22 has been reduced 49% to just $11.27. See the discounted CSP300WUR1 on Amazon.To read this article in full or to leave a comment, please click here
The BlackBerry smartphone is dead: Long live the BlackBerry smartphone.A week after it officially pulled out of the smartphone market, BlackBerry has agreed to license its brand to handset manufacturer TCL.The Chinese company will make and market future BlackBerry handsets worldwide except for India, Indonesia, Bangladesh, Sri Lanka and Nepal, where BlackBerry has already struck local licensing deals.This is hardly new territory for TCL, which manufactured BlackBerry's last two handsets, the Android-based DTEK50 and DTEK60.To read this article in full or to leave a comment, please click here
Evernote has reversed proposed changes to its privacy policy that would allow employees to read user notes to help train machine learning algorithms.CEO Chris O’Neill said the company had “messed up, in no uncertain terms.”The move by the note-taking app follows protests from users, some of whom have threatened to drop the service after the company announced that its policy would change to improve its machine learning capabilities by letting a select number of employees, who would assist with the training of the algorithms, view the private information of its users. The company claims 200 million users around the world. To read this article in full or to leave a comment, please click here
Security pros need to pay attention to malicious activities that don’t rely on actual malware to succeed, according to a study by Carbon Black.Attacks that exploited applications and processes legitimately running on systems – non-malware incidents – have risen from representing about 3% of all attacks in January to about 13% in November, the company’s “Non-malware attacks and ransomware take center stage in 2016” report says.“Non-malware attacks are at the highest levels we have seen and should be a major focus for security defenders during the coming year,” it says.The research included data from more than 1,000 Carbon Black customers that represent 2.5 million-plus endpoints. For measuring the non-malware attacks, the authors considered the malicious use of PowerShell and Windows Management Instrumentation were considered.To read this article in full or to leave a comment, please click here
According to pop culture’s portrayal of cybersecurity, the industry is hot property. Hacks and breaches not only dominate the real-world media, but they can be seen everywhere in TV and movies today.Granted, there have been some early examples of security issues playing a role in pop culture plot lines, such as the 1980s cult-classic Tron. But in recent years, Hollywood seems to have really picked up the mantle when it comes to cybersecurity. If the bright lights of TV and movies are to be believed, hackers are simultaneously the coolest and scariest people on the planet.Let’s take a look at five of the most common cybersecurity misperceptions as portrayed in TV shows and movies:To read this article in full or to leave a comment, please click here
The No More Ransom project, a coalition of law enforcement and security companies, has expanded with 30 new members and added 32 new decryption tools for various ransomware variants.The project, which consists of a website dedicated to fighting ransomware, was originally launched by Europol’s European Cybercrime Centre in partnership with the National High Tech Crime Unit of the Netherlands police, Kaspersky Lab, and Intel Security.The website has a tool that allows users to determine which type of ransomware has affected their files but also contains general information about ransomware, prevention advice, and instruction on reporting incidents to law enforcement.To read this article in full or to leave a comment, please click here
Posted to Reddit’s section devoted to networking by user felixdgniezno, this IPv6-enabled Christmas tree is garnering rave reviews from the kinds of people who read Reddit’s section devoted to networking and are amused by the notion of an IPv6-enabled Christmas tree.From the instructions found on the hosting site, which is located in Belgium, not surprisingly (I’ll explain why below):
Ping it to light it up!
2001:6a8:28c0:2017::AA:BB:CC for HTML Color #AABBCC
2001:6a8:28c0:2017::FF:00:00 for color RED
2001:6a8:28c0:2017::00:FF:00 for color GREEN
2001:6a8:28c0:2017::00:00:FF for color BLUE
2001:6a8:28c0:2017::FF:FF:FF for color WHITE
... and so on...To read this article in full or to leave a comment, please click here
Imagine if Twitter was offline for an entire day. Sure, some might be happy for the break, but the uproar that would greet a day with no access to the internet's public square would no doubt be loud and angry.Within the federal government, however, seeing collaboration, communication and database applications go offline for a day or longer is commonplace, a new survey has found.[ Related: Not dead yet: 7 of the oldest federal IT systems still wheezing away ]To read this article in full or to leave a comment, please click here
As President-elect Donald Trump met with high-tech business leaders in New York on Wednesday, some of their employees were affirming, in tweets, a decision to join the resistance.The Neveragain.tech pledge passed more than 1,000 signatures, it announced late Wednesday, hours after Trump had wrapped up his meeting with a dozen tech executives. Participating in the pledge means agreeing not to help the government create a database that can be used to target people based on race or religion or "facilitate mass deportations."[To comment on this article, visit Computerworld's Facebook page.]To read this article in full or to leave a comment, please click here
U.S. Federal Communications Commission Chairman Tom Wheeler will step down on Jan. 20, clearing the way for President-elect Donald Trump to appoint a Republican chairman and majority at the agency.Wheeler, a Democrat appointed chairman by President Barack Obama in late 2013, was the architect of the FCC's strong net neutrality regulations, approved by the FCC in February 2015. Ajit Pai, a Republican commissioner who's mentioned as a possible successor to Wheeler, has vowed to repeal the net neutrality rules and to take a "weed wacker" to other FCC regulations.To read this article in full or to leave a comment, please click here
A year ago my inbox staggered under the barrage of vendors that promised to apply big data and predictive analytics to the sales and marketing departments within organizations. I spent a lot of time writing about the space, talking with the multitudinous vendors and expressing my view that there were way to many vendors doing essentially the same thing and making some pretty big claims about what they could actually achieve for their customers.This market seems to have simmered down, however, and I’ve not see a lot of predictive analytics activity in the space.But where one buzzword dies and leaves a vacuum, another is sure to arise. And it seems to be the case that artificial intelligence (AI) is that latest buzzword du jour. The number of vendors, both of a large and startup variety, who have been talking about AI in recent months is legion. And the reason for that sort of talk: Buzzwords generate interest and investment.To read this article in full or to leave a comment, please click here
In rejecting a $335 million damage award to Cisco, a California jury gave Arista Networks a key verdict in part of the expansive patent infringement lawsuit the two networking companies are fighting over.While the jury found Arista had copied some of Cisco Command Line Interface it declined it declined to award in damages. The jury also found that Arista did not infringe the single patent remaining in the case as well as Cisco’s asserted copyrights in its user manuals.+More on Network World: Cisco Talos: Zeus spawn “Floki bot” malware gaining use, cyber-underworld notoriety+To read this article in full or to leave a comment, please click here
Security researchers are disturbed it took Yahoo three years to discover that details of over 1 billion user accounts had been stolen back in 2013.It means that someone -- possibly a state-sponsored actor -- had access to one of the largest email user bases in the world, without anyone knowing. The stolen database may have even included information on email ids of U.S. government and military employees.“It is extremely alarming that Yahoo didn’t know about this,” said Alex Holden, chief information security officer with Hold Security.Yahoo said back in November it first learned about the breach when law enforcement began sharing with the company stolen data that had been provided by a hacker. At the time, the company was already dealing with a separate data breach, reported in September, involving 500 million user accounts.To read this article in full or to leave a comment, please click here