Archive

Category Archives for "Networking"

US safety agency wants improved safety standards for batteries

The U.S. Consumer Product Safety Commission said Tuesday that industry needs to learn from the Galaxy Note7 experience and put more safeguards in place during the design and manufacturing stages of lithium-ion batteries.CPSC said Samsung Electronics “has been accountable in taking steps to drive up the recall response rate and keeps pushing.” Samsung and the agency are working with the wireless industry, battery makers and electrical engineers to review voluntary standards for lithium-ion batteries in smartphones, said agency chairman Elliot Kaye in a statement.Samsung and external experts such as Exponent and Underwriters Laboratories will also share details from the investigation, she added.To read this article in full or to leave a comment, please click here

8 tips for organizing your workspace

Did you know that January 12, 2017 was national Clean Off Your Desk day? No? You're not the only one who missed the official day of observance, but you can still start the year off with a clean workspace. Organizing your workspace can help to organize your mind, too.Dan Lee, Director of standing desk company NextDesk, knows a little something about the design and functionality of desks; here are his eight tips for cleaning and organizing your workspace (and your mind) for the year ahead.To read this article in full or to leave a comment, please click here

Four lesser-known Wi-Fi security threats and how to defend against them

It’s common knowledge that the best way to protect your home Wi-Fi network is by using a strong password. This will keep uninvited guests away and protect your network so eavesdroppers can’t intercept your communications. And we’ve known for more than a decade now that the old Wired Equivalent Privacy (WEP) is so insecure that cracking it is practically child’s play.ALSO ON NETWORK WORLD: 9 tips for speeding up your business Wi-Fi Once you’ve protected your network with Wi-Fi Protected Access 2 (WPA2), here are four other vulnerability scenarios you should guard against.To read this article in full or to leave a comment, please click here

28% off Panasonic ErgoFit In-Ear Comfort Fit Noise Isolating Earbuds – Deal Alert

If you believe the reviewers on Amazon, you may not find a better sounding pair of earbuds at this price point, which at the current 28% discount is just $10.86. The ErgoFit earbuds from Panasonic are designed to fit comfortably and securely in your ear, isolating outside noise while delivering great sound with a wider frequency range than most comparable buds. The earbuds come in various colors and features a generous 3.6 ft. cord that easily fits through or around your clothes, coats and bags. The ErgoFit earbuds average 4.5 stars from over 39,000 people on Amazon (read reviews) which lends some credibility to Panasonic's claim that the earbuds deliver dynamic, crystal clear sound while successfully blocking ambient noise. Its typical list price of $15 has been reduced 28% to just $10.86.To read this article in full or to leave a comment, please click here

Four lesser-known Wi-Fi security threats and how to defend against them

It’s common knowledge that the best way to protect your home Wi-Fi network is by using a strong password. This will keep uninvited guests away and protect your network so eavesdroppers can’t intercept your communications. And we’ve known for more than a decade now that the old Wired Equivalent Privacy (WEP) is so insecure that cracking it is practically child’s play.ALSO ON NETWORK WORLD: 9 tips for speeding up your business Wi-Fi Once you’ve protected your network with Wi-Fi Protected Access 2 (WPA2), here are four other vulnerability scenarios you should guard against.To read this article in full or to leave a comment, please click here

Four lesser-known Wi-Fi security threats and how to defend against them

It’s common knowledge that the best way to protect your home Wi-Fi network is by using a strong password. This will keep uninvited guests away and protect your network so eavesdroppers can’t intercept your communications. And we’ve known for more than a decade now that the old Wired Equivalent Privacy (WEP) is so insecure that cracking it is practically child’s play.ALSO ON NETWORK WORLD: 9 tips for speeding up your business Wi-Fi Once you’ve protected your network with Wi-Fi Protected Access 2 (WPA2), here are four other vulnerability scenarios you should guard against.To read this article in full or to leave a comment, please click here

That online job candidate may be carrying a virus

January is the month when employees are most likely to think about changing jobs, according to a survey by Glassdoor. Almost one in five jobseekers cited January as the most popular month to make a move, which means that resumes, cover letters and reference contacts are eagerly shared through social media, email and company websites.Cyber thieves are eager to take advantage of the busy hiring season, too, and they’ve come up with several ways to infiltrate corporate systems. Security pros offer their tips on what to watch out for, and how to stop them.Cyber criminals use LinkedIn and other social media sites to bypass company defenses LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by network filters to allow HR departments the freedom to communicate with prospective job candidates.To read this article in full or to leave a comment, please click here

That online job candidate may be carrying a virus

January is the month when employees are most likely to think about changing jobs, according to a survey by Glassdoor. Almost one in five jobseekers cited January as the most popular month to make a move, which means that resumes, cover letters and reference contacts are eagerly shared through social media, email and company websites.Cyber thieves are eager to take advantage of the busy hiring season, too, and they’ve come up with several ways to infiltrate corporate systems. Security pros offer their tips on what to watch out for, and how to stop them.Cyber criminals use LinkedIn and other social media sites to bypass company defenses LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by network filters to allow HR departments the freedom to communicate with prospective job candidates.To read this article in full or to leave a comment, please click here

Cisco scrambling to fix a remote-code-execution problem in WebEx

Cisco’s Webex Browser Extension contain a critical bug that can open up customers’ entire computers to remote code execution attacks if the browsers visit websites containing specially crafted malicious code.The company says it is in the process of correcting the problem, and has apparently made a few initial steps toward a permanent fix. It says there is no workaround available.+More on Network World: 10 of the latest craziest and scariest things the TSA found on your fellow travelers+To read this article in full or to leave a comment, please click here

Cisco scrambling to fix a remote-code-execution problem in WebEx

Cisco’s Webex Browser Extension contain a critical bug that can open up customers’ entire computers to remote code execution attacks if the browsers visit websites containing specially crafted malicious code.The company says it is in the process of correcting the problem, and has apparently made a few initial steps toward a permanent fix. It says there is no workaround available.+More on Network World: 10 of the latest craziest and scariest things the TSA found on your fellow travelers+To read this article in full or to leave a comment, please click here

Cisco’s Spark Board looks like an iPad — and acts like one

The Spark Board meeting device that Cisco Systems introduced on Tuesday is not so much a whiteboard or a videoconferencing screen as a giant tablet that everyone in the room can share.There’s even a “home” button in the center of the bottom bezel that takes you back to the main menu. If Apple didn’t have a partnership with Cisco, you might even expect it to accuse the networking giant of copying its iPad design.But Apple and Cisco are in fact working together, so closely that iPhones can work with the Spark Board a little more smoothly than other phones do. And in developing the new all-in-one device, Cisco focused on simplicity and ease of use, which haven’t exactly been hallmarks of the networking giant’s products up to now.To read this article in full or to leave a comment, please click here

Cisco’s Spark Board looks like an iPad — and acts like one

The Spark Board meeting device that Cisco Systems introduced on Tuesday is not so much a whiteboard or a videoconferencing screen as a giant tablet that everyone in the room can share.There’s even a “home” button in the center of the bottom bezel that takes you back to the main menu. If Apple didn’t have a partnership with Cisco, you might even expect it to accuse the networking giant of copying its iPad design.But Apple and Cisco are in fact working together, so closely that iPhones can work with the Spark Board a little more smoothly than other phones do. And in developing the new all-in-one device, Cisco focused on simplicity and ease of use, which haven’t exactly been hallmarks of the networking giant’s products up to now.To read this article in full or to leave a comment, please click here

Cisco snatches AppDynamics from IPO market for $3.7 billion

Cisco has agreed to acquire AppDynamics for $3.7 billion in cash and assumed equity awards, scooping up the application performance management company just days before its expected initial public offering. The deal, which Cisco announced late Tuesday, is expected to close by the end of April.AppDynamics was going to be the first tech company to go public in 2017, with its initial offering set for Thursday, January 26. Tech industry insiders and investors were watching AppDynamics’s IPO closely, because Wall Street investors’ treatment of its business could signal how other companies would fare later in 2017.To read this article in full or to leave a comment, please click here

Android Instant Apps testing begins, gives developers 2 bites at the SEO apple

“Software companies are the medium through which investors give money to PR and advertising companies,” said Marv Goldschmidt, vice president of marketing at Lotus Development, a long time ago.His advice holds true today. The biggest problem mobile software developers have is getting their apps found, downloaded and installed. It isn’t creating great apps.Marketing campaigns boosting new-user download of an app are very expensive—so expensive that the leadership team at bookmarking app maker Pocket spent a week sequestered with designer impresario Jake Knapp focusing on the user experience to decrease early uninstalls, thus retaining more users per install without increasing marketing spend.To read this article in full or to leave a comment, please click here