We didn't claim that our recent story titled "Lights out! Why IT shops are disabling wireless AP LEDs" was tackling one of the world's major problems, but it clearly addressed one of the tech world's ongoing annoyances.Roughly 300 comments have been made about the story by those who found it on the Slashdot website, others chimed in on Reddit, and more contacted me directly. (The original story was prompted by discussion among IT professionals at universities, seeking ways to reduce light pollution in dorm and hospital rooms.)To read this article in full or to leave a comment, please click here
The World Anti-Doping Agency (WADA) was hacked and confidential medical files of US Olympic athletes Simone Biles, Serena and Venus Williams and Elena Delle Donne were leaked online. The hackers dubbed the dump as “just the tip of the iceberg.”A group claiming to be the Fancy Bears' Hack Team took credit for the attack and accused American Olympic athletes of doping, of using “dirty methods to win.” Furthermore, the hackers claimed that although the US Olympic team had "played well but not fair,” it had “disgraced its name by tainted victories.”To read this article in full or to leave a comment, please click here
The World Anti-Doping Agency (WADA) was hacked and confidential medical files of U.S. Olympic athletes Simone Biles, Serena and Venus Williams, and Elena Delle Donne were leaked online. The hackers said the dump is “just the tip of the iceberg.”A group claiming to be the Fancy Bears' Hack Team took credit for the attack and accused American Olympic athletes of doping, of using “dirty methods to win.” Furthermore, the hackers claimed that although the U.S. Olympic team "played well but not fair,” it had “disgraced its name by tainted victories.”To read this article in full or to leave a comment, please click here
The World Anti-Doping Agency (WADA) was hacked and confidential medical files of US Olympic athletes Simone Biles, Serena and Venus Williams and Elena Delle Donne were leaked online. The hackers dubbed the dump as “just the tip of the iceberg.”A group claiming to be the Fancy Bears' Hack Team took credit for the attack and accused American Olympic athletes of doping, of using “dirty methods to win.” Furthermore, the hackers claimed that although the US Olympic team had "played well but not fair,” it had “disgraced its name by tainted victories.”To read this article in full or to leave a comment, please click here
The World Anti-Doping Agency (WADA) was hacked and confidential medical files of U.S. Olympic athletes Simone Biles, Serena and Venus Williams, and Elena Delle Donne were leaked online. The hackers said the dump is “just the tip of the iceberg.”A group claiming to be the Fancy Bears' Hack Team took credit for the attack and accused American Olympic athletes of doping, of using “dirty methods to win.” Furthermore, the hackers claimed that although the U.S. Olympic team "played well but not fair,” it had “disgraced its name by tainted victories.”To read this article in full or to leave a comment, please click here
It’s an all-too-familiar tale: A CIO pushes a new process, platform or digital transformation effort across the company and when it fails (as 70 percent of all change programs do, according to the famous statistic reported by Harvard Business Review), the CIO pins the blame on uncooperative end users.To read this article in full or to leave a comment, please click here(Insider Story)
Data scientists are in short supply. But so too are managers that understand data science and machine learning enough to spot the opportunities for using these disciplines to optimize their businesses.McKinsey Global Institute has projected that by 2018, the U.S. alone will face a shortage of 1.5 million managers and analysts with the necessary analytics and data science expertise to fill demand.The business side of machine learning
To combat this problem, Data science automation specialist DataRobot announced today that it has updated its DataRobot University curriculum with Data Science for Executives, a half-day offering that teaches executives interested in the benefits of advanced data science how to identify opportunities to optimize their business using machine learning.To read this article in full or to leave a comment, please click here
This power bank from Poweradd delivers huge power. Its 20000mAh capacity means you can charge an iPhone 6 eight times, Samsung S6 over five times, or a a large capacity iPad Air 2 almost twice. It will auto-detect the status of your device, to intelligently deliver power at the fastest possible speed with 2.1A max output. 900+ people rate this item 4.5 out of 5 stars on Amazon (read reviews), and its typical list price of $49.99 has been reduced a generous 56% to just $21.88.To read this article in full or to leave a comment, please click here
The initial challenge for the Internet of Things (IoT) was how to provide physical connectivity of small and often remote devices to the Internet. This issue has basically been solved with the plethora of wireless connectivity solutions. The real challenge for IoT is data organization, sharing and search on an unprecedented scale.Most discussions about IoT usually point out in passing that today’s machine data is concentrated in vertical, or isolated, data silos. However, they rarely explain why this is a problem. More important, they do not give a roadmap of how to solve this problem going forward. I will try to provide some insight on both points.To read this article in full or to leave a comment, please click here
The first batch of iPhone 7 and 7 Plus reviews are out after five days of hands-on time, and the early word is mostly positive. The camera in particular is a stand-out, and the two lenses on the 7 Plus produce results that easily stand up to the competition, the Samsung Galaxy S7.As expected, dealing with the lack of a headphone jack was perplexing to some and outright irritating for others. But the impressive cameras on both iPhones, plus the improved battery life and water resistance, make them easier to use on the go.To read this article in full or to leave a comment, please click here
Surreptitious smartphone services quietly tracking us as we move around have gotten privacy fiends up in arms. However, academics reveal that location tracking is not all about finding ways to sell us stuff. Researchers and scientists are altruistically using the data, too.In one case, they're using mobile device-based mobility patterns to track exposure to pollution with more accuracy, another in metropolitan planning.+ Also on Network World: Wi-Fi-tracing delivers vast insights into behavioral patterns +To read this article in full or to leave a comment, please click here
The U.S. Government Accountability Office has said that the internet domain name system is unlikely to be government property, ahead of the planned transfer by month end of the oversight of key technical functions supporting the internet, including the domain name system, to an independent multistakeholder body."It is unlikely that either the authoritative root zone file—the public 'address book' for the top level of the Internet domain name system—or the Internet domain name system as a whole" is U.S. government property, the GAO said in a legal opinion provided to legislators.The report by the Congressional watchdog comes ahead of a hearing on the issue Wednesday chaired by Republican Senator Ted Cruz from Texas. The Republicans are intent on blocking the transfer of the Internet Assigned Numbers Authority (IANA) functions, currently being operated by the Internet Corporation for Assigned Names and Numbers (ICANN) under a contract with the Department of Commerce, which expires on Sept. 30.To read this article in full or to leave a comment, please click here
The U.S. Government Accountability Office has said that the internet domain name system is unlikely to be government property, ahead of the planned transfer by month end of the oversight of key technical functions supporting the internet, including the domain name system, to an independent multistakeholder body."It is unlikely that either the authoritative root zone file—the public 'address book' for the top level of the Internet domain name system—or the Internet domain name system as a whole" is U.S. government property, the GAO said in a legal opinion provided to legislators.The report by the Congressional watchdog comes ahead of a hearing on the issue Wednesday chaired by Republican Senator Ted Cruz from Texas. The Republicans are intent on blocking the transfer of the Internet Assigned Numbers Authority (IANA) functions, currently being operated by the Internet Corporation for Assigned Names and Numbers (ICANN) under a contract with the Department of Commerce, which expires on Sept. 30.To read this article in full or to leave a comment, please click here
We’ve all heard tales of foreign intelligence entities breaking into hotel rooms and cloning a person’s hard drive while he or she is in the bar downstairs.You might dismiss it as the stuff of urban legend or Jason Bourne movies, but this style of attack does highlight one of the most basic weaknesses of today’s PCs: Their data is extremely vulnerable once an attacker has physical access to a machine. Cold boot attacks, USB exploits,or DMA attacks over FireWire, among other breaches, are all possible if a bad actor can get his or her hands on the hardware.To read this article in full or to leave a comment, please click here
We’ve all heard tales of foreign intelligence entities breaking into hotel rooms and cloning a person’s hard drive while he or she is in the bar downstairs.You might dismiss it as the stuff of urban legend or Jason Bourne movies, but this style of attack does highlight one of the most basic weaknesses of today’s PCs: Their data is extremely vulnerable once an attacker has physical access to a machine. Cold boot attacks, USB exploits,or DMA attacks over FireWire, among other breaches, are all possible if a bad actor can get his or her hands on the hardware.To read this article in full or to leave a comment, please click here
At a time when the configuration management market was dominated by Puppet and Chef, an open source project called Ansible emerged with a simpler approach to automating IT environments. An agentless system that was easy to learn, Ansible quickly earned a name for itself. Before long, the developers behind the project formed a company to offer commercial support. That company -- first known as AnsibleWorks, then Ansible -- was acquired by open source leader Red Hat in October 2015.Docker. Ansible offers modules for building and running Docker containers, orchestrating containers across a Swarm cluster, and managing Docker images. There are advantages to building Docker images from Ansible playbooks instead of Dockerfiles. When you build an image from a Dockerfile, the application or environment can only be deployed in a Docker container. But when you build an image using Ansible playbooks, the environments can easily be replicated on any infrastructure -- bare metal, cloud instance, virtual machine, or Vagrant.To read this article in full or to leave a comment, please click here(Insider Story)
At a time when the configuration management market was dominated by Puppet and Chef, an open source project called Ansible emerged with a simpler approach to automating IT environments. An agentless system that was easy to learn, Ansible quickly earned a name for itself. Before long, the developers behind the project formed a company to offer commercial support. That company -- first known as AnsibleWorks, then Ansible -- was acquired by open source leader Red Hat in October 2015.Docker. Ansible offers modules for building and running Docker containers, orchestrating containers across a Swarm cluster, and managing Docker images. There are advantages to building Docker images from Ansible playbooks instead of Dockerfiles. When you build an image from a Dockerfile, the application or environment can only be deployed in a Docker container. But when you build an image using Ansible playbooks, the environments can easily be replicated on any infrastructure -- bare metal, cloud instance, virtual machine, or Vagrant.To read this article in full or to leave a comment, please click here(Insider Story)
Apple Pay on websites launched on Tuesday with the release of iOS 10 for the iPhone and iPad -- and will hit Mac desktops when macOS Sierra launches next Tuesday.More than 200,000 websites -- including small and large retailers -- plan to support Apple Pay on their sites in coming weeks, Apple said Tuesday. Many of the sites include online retailers using e-commerce platforms run by Shopify, Demandware and IBM.The move means that online shoppers with iPhones, iPads and Macs updated with the latest operating systems can save time when finishing an online purchase through the Apple's Safari browser. Retailers that have signed up for the service are expected to see an uptick in the number of customers that finish a web purchase, instead of giving up because typing in credit information was considered too complicated, awkward or time-consuming.To read this article in full or to leave a comment, please click here
Apple Pay on websites launched on Tuesday with the release of iOS 10 for the iPhone and iPad -- and will hit Mac desktops when macOS Sierra launches next Tuesday.More than 200,000 websites -- including small and large retailers -- plan to support Apple Pay on their sites in coming weeks, Apple said Tuesday. Many of the sites include online retailers using e-commerce platforms run by Shopify, Demandware and IBM.The move means that online shoppers with iPhones, iPads and Macs updated with the latest operating systems can save time when finishing an online purchase through the Apple's Safari browser. Retailers that have signed up for the service are expected to see an uptick in the number of customers that finish a web purchase, instead of giving up because typing in credit information was considered too complicated, awkward or time-consuming.To read this article in full or to leave a comment, please click here
There's an iMessage app for that!With the launch of iOS 10, Apple has opened the floodgates by integrating third-party apps within its stock Messages app—and you can find them all within Apple’s dedicated iMessage App Store. Check out some of the best free ways to animate, coordinate, and add some flair your messages.To read this article in full or to leave a comment, please click here