There has been anecdotal talk that Microsoft's aggressive Windows 10 upgrade/giveaway harmed PC sales, since it's known most people upgrade to a new OS via a new PC purchase rather than doing a software upgrade. Now Gartner has confirmed this theory.In an interview with The Register (and confirmed with the analyst by me), Gartner research director Ranjit Atwal told the publication, "People with older PCs upgraded to Windows 10 and held onto them. Microsoft didn’t expect that number to be so high."+ Also on Network World: Credibility and trust: Microsoft blows it +To read this article in full or to leave a comment, please click here
Have you opted for lower car insurance premiums via installing an insurance-supplied dongle? If so, then did you realize that dongle could narc you out when brake pedal usage is used a biometric identifier? Kiki der Gecko
If you are thinking surely not, then think again as researchers had nearly a 90% accuracy in identifying drivers via brake pedal sensor data after only 15 minutes of driving.To read this article in full or to leave a comment, please click here
Conscientious sysadmins face a dilemma on December 31, when a new leap second will threaten the stability of computer systems and networks.Scientists occasionally add a leap second to Coordinated Universal Time (UTC), the time reference most clocks are set by, so as to keep it in step with the earth's gradually slowing rotation. If they didn't, then clocks would be off by about a minute at midday by 2100.Computer systems don't like leap seconds as they are programmed to expect the same number of seconds in every minute of every hour of every day. The various ways of tricking them into accepting the extra second -- stretching out all the other seconds in the preceding minute, hour or day, repeating the same second twice, or creating a 61st second in a minute, can cause chaos as they affect different computers in different ways.To read this article in full or to leave a comment, please click here
Tom Hollingsworth, a CCIE and author of a popular blog called “The Networking Nerd,” used that forum last week – smack in the middle of Cisco’s annual user conference -- to issue a blistering critique of the CCIE routing and switching written exam. “The discontent is palpable,” according to Hollingsworth. “From what I’ve heard around Las Vegas this week, it’s time to fix the CCIE Written Exam.”That contention has received broad though not unanimous support on Twitter and comments on the post itself. As for Cisco, it tells me they’re always open to suggestions.To read this article in full or to leave a comment, please click here
Oracle has released a new quarterly batch of security updates for more than 80 products from its software portfolio, fixing 276 vulnerabilities.This is the largest Oracle Critical Patch Update (CPU) to date. The average number of flaws fixed per Oracle update last year was 161, according to security vendor Qualys. Furthermore, out of the 276 security flaws fixed in this update, 159 can be exploited remotely without authentication.At the top of the priority list should be the Java patches, which address 13 new vulnerabilities. That's because Java is used in a lot of applications and is installed on a large number of systems."Customers really do need to apply these Java CPU patches as soon as possible," said John Matthew Holt, the CTO of application security firm Waratek, via email. Among the patches that require urgent attention are those for the HotSpot Java virtual machine for desktops and servers, which received high CVSS (Common Vulnerabilities Scoring System) scores, Holt noted.To read this article in full or to leave a comment, please click here
Avoid summer's plummeting productivityImage by Thinkstock Investment in employee education and learning increases engagement and makes employees more productive. If you find your workload is a bit light during the summer months, consider sitting down with your manager to identify existing professional development programs or courses to add to your skill set, Battles says. If you can't physically attend courses, take advantage of virtual training tools and online massive open online courses.
1. The more you knowImage by Thinkstock To read this article in full or to leave a comment, please click here
Skype is leaving behind its peer-to-peer roots and going all in on the cloud. While the popular messaging app made it this far by facilitating connections between computers for video calls and other communications, it's moving to a cloud architecture that is supposed to improve performance and expand the service's capabilities.According to Skype Corporate Vice President Amritansh Raghav, the architecture shift has taken three years of work. It is supposed to provide a number of benefits, including improved message syncing across devices. Certain Skype features are already built on top of the new cloud infrastructure, including the mobile group video calling and live translation features that the service introduced recently.To read this article in full or to leave a comment, please click here
One year after the initial, faltering release of Windows 10 “RTM” (build 10240) and almost nine months after the arrival of Win 10 Fall Update (version 1511), we finally have a new tenant at the apex of the Windows 10 “as a service” heap. Windows 10 Anniversary Update, aka Redstone 1, aka version 1607, is available to Windows Insiders.
The update should start rolling out to Windows 10 version 1511 users on August 2.To read this article in full or to leave a comment, please click here
The U.S. Department of Human Services has released new guidance for health care organizations that focuses on the growing threat of ransomware, stresses the need for better education and regular backups, and confirms that a ransomware attack against plain-text health information is, in fact, a breach that must be disclosed.
The guidance recommends that organizations identify the risks facing their patient information, create a plan to address those links, set up procedures to protect systems from malware, train users to spot malware, limit access to sensitive information to just the people who need it most, and have a disaster recovery plan that includes frequent data backups.To read this article in full or to leave a comment, please click here
Federal authorities have shut down several alleged tech support scammers working out of Florida, Iowa, Nevada and Canada, freezing their assets and seizing control of their businesses.The action was one of the largest in the U.S. against scammers, who bilk consumers out of an estimated $1.5 billion annually with bogus tales of infected Windows PCs and Apple Macs, high-pressure sales tactics, and grossly overpriced services and software.After the Federal Trade Commission (FTC) filed complaints against six companies and six individuals in late June, courts shuttered alleged scammers doing business under names like Big Dog Solutions, Help Desk National, Help Desk Global, PC Help Desk, Inbound Call Specialist, BlackOptek CE, 9138242 Canada and Digital Growth Properties. Five of the six operated as a single enterprise, muddying the waters with multiple names.To read this article in full or to leave a comment, please click here
Twitter has a problem.In fact, it has several problems. On the one hand, its iconic 140-character limit has helped make the service popular and easy to use. On the other hand, many tweeters desperately want to say more than they can squeeze into those 140 characters. And on the third hand, Twitter continues to struggle monetizing its vast user base.A simple formula to save Twitter
Fortunately, I have an immodest proposal designed to solve all three problems in one fell swoop. And all it takes is a single, relatively simple formula.Ready? Here goes:If Twitter users want to exceed the 140-character limit, all they have to do is pay for the privilege. But instead of a flat fee, my clever formula works to maximize all of the important values.To read this article in full or to leave a comment, please click here
In part 1 of this mini-series looking at the new wireless mesh networking aimed at home systems, I looked at Luma’s system. Instead of a single router providing coverage for the house, a mesh system uses multiple nodes that work in conjunction with each other to provide greater coverage and faster speeds.So here's part 2, in which I tested another wireless mesh system - this one from San Francisco-based startup eero. Like the Luma devices, the eero system comes in a three-pack of nodes (it costs $499), but you can also buy individual nodes for $199. You can get away with using just one node as its own Wi-Fi router/access point as long as you connect it to your modem (cable/DSL), but the added benefits of the mesh kick in when you add the second, third or any additional nodes. In the three-pack, the system includes power cables for each eero node, and one Ethernet cable that links the first node into your cable modem or WAN connection.To read this article in full or to leave a comment, please click here
IBM's Watson may be putting its cognitive muscle to work battling cancer and cybercriminals, but it's no slouch at shopping, either. On Wednesday, retail brand Macy's announced that it's testing out a new mobile service that lets in-store shoppers ask Watson for help.Dubbed Macy’s On-Call, the tool gives smartphone-equipped shoppers a way to ask Watson questions about a store's products, services and facilities by typing their questions into a mobile browser. It's delivered through location-based engagement software from IBM partner Satisfi, which accesses Watson from the cloud, and it works in both English and Spanish.To read this article in full or to leave a comment, please click here
As a naturally paranoid person, I wiped the Moto G4 and G4 Plus that I recently tested before returning them to Motorola. This isn’t the first tutorial about how to wipe an Android phone, but it is the first one written by a paranoid person.
In this tutorial, one more step, critical to safely wiping an Android device has been added. There could be an evil entity extracting personal information from lost, stolen or discarded Android phones or those sold by the unwary on by Craig’s List and Ebay. Maybe not, but I don’t want to find out. To read this article in full or to leave a comment, please click here
There is a new generation of mini-PCs out there -- small, inconspicuous but powerful. They offer a number of advantages for businesses over laptops or more traditional desktop systems.
First, they can be placed where most traditional desktops and laptops won't fit, and can be set up in creative ways, such as in a drawer, on the underside of a desk or on the back of a display. As a result, they are perfect for places like call centers or school computer labs, where you want to maximize space and keep the computers out of sight.
They also don't use a lot of electricity, so they are excellent for environments where electrical current can be an issue, such as a construction site trailer. In fact, one of the units we review, the InFocus Kangaroo Pro, is so small and power-efficient that it can run for more than an hour on battery power.To read this article in full or to leave a comment, please click here
Suprisingly long historyImage by ThinkstockRansomware has been the most pervasive cyber threat since 2005. According to publicly available information, ransomware infections have outnumbered data breaches 7,694 to 6,013 over the past 11 years.To read this article in full or to leave a comment, please click here
A few weeks ago I found myself in a meeting with the technical team at a major investment company that uses mainframes to support the massive amounts of data they work with every day. I spend just about all of my time talking with mainframers, but this conversation took a bit of an odd twist: they wanted to talk about application programming interfaces (APIs).It wasn’t what I expected, but after thinking about it more, it makes perfect sense. After all, APIs are driving just about everything these days. It’s no wonder so many people are (unironically) talking about the “API economy.”+ Also on Network World: The cloud’s silver lining: the mainframe +To read this article in full or to leave a comment, please click here
So I ask a colleague to name the most famous city “welcome” sign other than Hollywood and he answers without hesitation: “Las Vegas.”Not anymore.The Las Vegas Review-Journal reports that the crash occurred just before 7 a.m. on Sunday and that the driver of the pickup suffered no injuries.The “Welcome to Fabulous Las Vegas” sign did not fare as well, as you can see in this Facebook video:
Naturally, the sign has its own Wikipedia page, which has already been updated with news of the accident (I love Wikipedia) and begins:To read this article in full or to leave a comment, please click here
Governments may order telcos to retain customer data, but only to fight serious crime, a top European Union judge has advised.Lobby groups European Digital Rights (EDRi) and Privacy International welcomed the recommendation, saying it adds to a growing body of legal opinion opposing mass data retention. It could even, said Privacy International, derail the U.K.'s Investigatory Powers Bill, introduced in March by Theresa May, then home secretary and now prime minister.Advocate General Henrik Saugmandsgaard Øe advised that a general obligation to retain data may be compatible with EU law, but cautioned that laws imposing such obligations should respect personal privacy and impose strict controls on access to the retained data, its security, and the period it is kept. Furthermore, such obligations can only be justified when strictly necessary in the fight against serious crime.To read this article in full or to leave a comment, please click here
Democratic National Committee hacker Guccifer 2.0 gave The Hill another batch of pilfered DNC documents; these are different than those files which included information on 11,000 donors given to The Hill last week. At that time, Guccifer had claimed that the press had been forgetting about him, that WikiLeaks was “playing for time” and he still had documents to dump.To read this article in full or to leave a comment, please click here