Archive

Category Archives for "Network World Wireless"

Intel asserts its trademark rights against John McAfee

Intel does not object to John McAfee using his personal name in connection with his business, but it objects to the use by the maverick entrepreneur and security expert of the McAfee trade name and trademark in a way that could confuse or deceive consumers or dilute the brand.The issue came up when John McAfee teamed with MGT Capital Investments, which had been until recently mainly into gaming sites, and announced in May that it is in the process of acquiring a diverse portfolio of cybersecurity technologies. MGT also announced that it intended to change its corporate name to “John McAfee Global Technologies, Inc.” with John McAfee at the helm of the new company.To read this article in full or to leave a comment, please click here

Tech execs tackling childhood cancer

It's been a few years since I've connected with network industry veteran Chris Lynch (See "Ex-Vertica CEO pledges to build high-speed railway for Big Data"), but when we did last talk he mainly had Big Data on his mind. Since then, he's started an early stage venture capital firm called Accomplice that indeed has invested in that field. And to book, his Twitter handle is @LynchBigData.To read this article in full or to leave a comment, please click here

Ex-NSA contractor hoarded two decades’ worth of secrets

The former National Security Agency contractor suspected of stealing U.S. hacking tools allegedly was found hoarding two decades' worth of classified materials.In a Thursday court filing, federal investigators provided new details on their case against 51-year-old Harold Martin, who was arrested in late August. Investigators have seized 50 terabytes of information from Martin, in addition to thousands of pages of documents, the filing said. Among them are classified operational plans against a known enemy of the U.S that Martin had no need to know about.On Wednesday, The New York Times also reported that Martin was found in possession of NSA hacking tools that have recently been put up for sale online. An anonymous group of hackers calling themselves the Shadow Brokers have been trying to sell the tools since mid-August, but it's unclear how they obtained them.To read this article in full or to leave a comment, please click here

32% off Asus 15.6-Inch Laptop, 2.1GHz Core i3, 4GB RAM, 500GB Hard Drive, Windows 10 – Deal Alert

Housing multiple USB 3.0 ports for fast data transfer and the latest 802.11ac wireless for fast Internet connectivity, Asus promises it'll be fast and easy to get things done with their F555 laptop. It comes loaded up with Windows 10, Intel's 5th generation Core i3 processor, a 15.6-Inch Full HD (1920*1080) display, 4GB RAM, a 500GB hard drive, an HD camera, and much more. It averages 4 out of 5 stars on Amazon from over 1,600 people, and its typical list price of $499.99 has been reduced a generous 32% to $339.99. See the discounted Asus F555LA-AB31 laptop on Amazon.To read this article in full or to leave a comment, please click here

How switching to Macs is paying off for IBM

Last year, IBM made a bold decision. The company let its employees choose between a Windows PC or a Mac for their own work machines. IBM staffers prefer Macs, so the company bought up 30,000 of them. This year, IBM has 90,000 Macs in use. But Macs are expensive, as we all know, so IBM must be spending a fortune on making the switch…right? Apparently not.IBM said Wednesday at the Jamf Nation User Conference that it’s actually saving money on each Mac: $273 to $543 per Mac over four years, compared to a Windows PC over the same time period. And no, that’s not because Microsoft is charging more. Fletcher Previn, IBM’s vice president of workplace as a service (yeah, that’s a real title), said Microsoft is giving IBM its best pricing ever. But Macs are still cheaper over their lifetime, and using them results in fewer service calls.To read this article in full or to leave a comment, please click here

Gartner: By 2020, you’ll say more to a machine than to your spouse

ORLANDO, Fla. -- The message at Gartner's Symposium/ITxpo is to prepare for a fast move to augmented reality, the decline of mobile apps, and a major shift away from web browsing to voice interaction.Many users will expect businesses, universities and governments to respond to these shifts, the market research firm said at its annual conference.Here's what Gartner sees arriving soon:1. By 2020, 100 million consumers will shop in augmented reality environments.A.R. will be "overlaying data on top of environments," said Gartner analyst Daryl Plummer. For instance, when you walk into a grocery store, "all the data about the different items will be floating in the air in front of those items," he said. The bulky and boxy glasses that customers need to see the augmented reality at the store will get more fashionable and will be easier to wear. A.R. also will be used in online shopping.To read this article in full or to leave a comment, please click here

Celebrating 12 years of Ubuntu

Happy birthdayImage by Thinkstock/UbuntuFounder Mark Shuttleworth announced the first public release of Ubuntu – version 4.10, or “Warty Warthog” – on Oct. 20, 2004. The idea behind what would become the most recognizable and widely used Linux distributions ever was simple – create a Linux operating system that anybody could use. Here’s a look back at Ubuntu’s history.To read this article in full or to leave a comment, please click here

42% off 17-Piece Precision Smartphone Repair Kit For iPhone, Android, Samsung and Others – Deal Alert

Save money by repairing your own device. This 17-piece tool set averages 4.7 out of 5 stars on Amazon from over 490 people (read reviews), and is discounted 42% off its typical list price. The 17-piece kit works with iPhones, iPads, Android devices, and more. It includes several hard to find tools, constructed of heavy duty materials and lightly magnetized to make the job easier.To read this article in full or to leave a comment, please click here

Tim Cook or Bill Gates as Clinton’s VP? It was considered

Apple CEO Tim Cook and Microsoft founder Bill Gates were both on a list of potential vice presidential candidates for Democrat Hillary Clinton, according to a leaked email published on Tuesday by Wikileaks.The email, apparently sent by campaign chairman John Podesta on March 17, named the two tech titans alongside 37 other people as "a first cut of people to consider for VP."Also on the list, published by WikiLeaks, was Gates' wife Melinda. She co-founded the charitable foundation that bears both their names.MORE ON NETWORK WORLD: 6 simple tricks for protecting your passwords Other business leaders that made the cut were General Motors CEO Mary Barra, Bloomberg News founder and former New York Mayor Michael Bloomberg, Xerox CEO Ursula Burns, Coca-Cola CEO Muhtar Kent, Rockefeller Foundation president Judith Rodin, and Starbucks CEO Howard Schultz.To read this article in full or to leave a comment, please click here

Intel’s revenue soars with help from the PC group

Though Intel’s PC group, data center, and Internet of Things businesses helped drive Intel to record revenue in its third quarter of 2016, all eyes seemed focused on one number: the company’s fourth-quarter forecast, which isn’t great. Intel achieved a 9 percent year-over-year increase in profits, up to $3.4 billion, and a 9 percent increase in revenue as well, to a record high of $15.8 billion.Unfortunately, the company’s projections for fourth-quarter revenues are actually slightly down: $15.7 billion, with some $500 million either way in terms of wiggle room. Traditionally, Intel sees its highest revenue in the fourth quarter, so the numbers provide an indication of how the holiday tech sales season is expected to go.To read this article in full or to leave a comment, please click here

The march toward exascale computers

It's good to be near the top of the list.As for the embargo's likely effectiveness, #1 on the Top500 list happens to be China's Sunway TaihuLight at the National Supercomputing Center in Wuxi. It sustains a performance of 93 petaflops using 10,649,600 cores, all of them 1.45GHz Sunway (also rendered ShenWay) SW26010 devices, which fit Dongarra's description of "lightweight" processors. And all were made in China.To read this article in full or to leave a comment, please click here(Insider Story)

Cisco revs up storage connections for data centers and WANs

Data is piling up, and storage keeps getting faster thanks to flash, so the networks that link it all together need to keep up, too.Both traditional Fibre Channel and more general-use protocols used in storage keep steadily ratcheting up performance. On Wednesday, Cisco Systems is boosting the speed of long-distance storage links for disaster recovery and business continuity. It’s also introducing higher speeds for IP (Internet Protocol) storage networks in data centers and enhancing its software to simplify storage management.Fibre Channel hangs on as the glue that binds together SANs (storage area networks) because it’s dependable and secure, said 451 Research analyst Steven Hill. A majority of large enterprise installations use it even though typically cheaper IP-based systems like iSCSI have been around for years, he said.To read this article in full or to leave a comment, please click here

Review: 6 Python IDEs go to the mat

Of all the metrics you could use to gauge the popularity and success of a language, one surefire factor is the number of development environments available for it. Python’s rise in popularity over the last several years has brought with it a strong wave of IDE support, with tools aimed both at the general programmer and those who use Python for tasks like scientific work and analytical programming. LiClipse provides precise controls over the runtime environment for Python projects. When you create a new project, you can choose which Python interpreter to associate with it, and what PYTHONPATH to use with specific launch configurations. This is useful if you have different revisions of Python installed side-by-side, and you want to ensure that a given project runs with a specific Python version. You don’t even have to use a Python interpreter that has been registered with the system; it can be an executable in a folder somewhere. The JVM-based Jython and the .Net CLR-based IronPython (which is back under active development) are also supported, along with the stock CPython interpreter. (PyPy is not explicitly supported, but should work as a drop-in replacement for CPython per its stated goals.) Continue reading

6 tips to handle a sick day at the office

With the start of cold and flu season, it's inevitable that you'll need to take some sick time. But some days, no matter how bad you feel, you just can't stay home -- deadlines, client meetings, software releases just won't wait. Of course, some folks actually want to work through minor illnesses because of their commitment to their job, or a lack of sick time, or because they feel guilty having co-workers pick up their slack.INSIDER 12 habits of successful tech CEO "There are a surprising number of people who don't want to stay home and nurse a cold or a sore throat. They'd rather work through the sniffles or pounding head, and while that's commendable, it can be difficult to work at your usual level of efficiency -- and that can be worse than being missing in action at the office," says Amanda Mitchell, corporate consultant and founder of executive coaching and management consultancy Our Corporate Life.To read this article in full or to leave a comment, please click here

CISOs, it’s time to bury the hatchet with your CIO

Historically, the head of security (CISO) reporting into the head of IT (CIO) has made a lot of sense.Both departments are – at their core – technical disciplines, and as such there is a need for the two to be in regular contact. They need to overlap on network infrastructure, information security, and IT compliance, not to mention overseeing the release of safe, bug-free code and the delivery of secure products.Yet this relationship is often lambasted by those working in the InfoSec community. Some describe it as ‘adversarial’ – with two very different people trying to achieve different objectives.CIOs will look to bring new business applications online, to maintain service-level agreements, and ensure that IT services are available for all users. Indeed, a CIO’s bonuses are often tied to KPIs around these very principles.To read this article in full or to leave a comment, please click here

The best programs to run Android apps on your Windows PC

From time to time you’ll hear about yet another effort to bring Android to the desktop. Yes, there’s an official effort to do this straight from Google by bringing the Play Store to a select number of Chromebooks.But what if you want this now, or don’t want to buy a new computer to experience what it’d be like to use Android apps on your PC? With a little bit of digital elbow grease, it’s possible. You can run some of your favorite apps and engage in Android gaming by trying out one of the many third-party solutions. I looked at several software choices that offer this, and came away with four solid options that will have you up and running with Android on your Windows PC rather painlessly.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Red Hat and Ericsson sign open source deal

Red Hat is well known as probably the most successful company built entirely on open-source software. Building a business on top of open source is a hard thing, especially so back in the early days of open source when no one had any real idea how the economics of a product that was free would translate into commercial success.But succeed it did, and Red Hat has created a huge business built entirely on offering services on top of open-source products.+ Also on Network World: Red Hat CEO: Open-source innovation is always user-led +To read this article in full or to leave a comment, please click here

IoT botnets powered by Mirai continue to grow

Level 3 Threat Research has noted an uptick in activity by new IoT botnets that are backed by the Mirai malware, with some attacks enlisting 100,000 individual hijacked devices.A significant number of these zombie devices are enslaved by more than one botnet, according to the research described in the Level 3 Beyond Bandwidth blog, and some of these botnets use overlapping infrastructure.Source code for Mirai was released Sept. 30, “which has inspired a significant number of new bad actors, all working to exploit similar pools of vulnerable devices,” the Level 3 researchers write.To read this article in full or to leave a comment, please click here

Murphy’s Law: The security version

Since the first of the month, I’ve heard colleagues and others report each of the 10 security variants to Murphy’s Law listed below. Murphy is not only alive but has been reincarnated. It’s worth reminding the gentle reader of various famous last words:1. All documents will be out of date or simply missing Documents will not be maintained. Documents will have pages missing. And authors shall be unavailable for any reason (deployed to Mt. Everest is preferred). No documents shall be in an understandable language, be edited, collated, or have referring URLs that do not 404, 401 or 5XX. Any good documentation shall be the only copy on a laptop that was stolen whilst unencrypted. To read this article in full or to leave a comment, please click here