Archive

Category Archives for "Networking"

Windows 10 finishes first year on 1-in-4 Windows PCs

Windows 10 wrapped up its first year powering nearly one-in-four Windows PCs, a record adoption pace fueled by the now-expired free upgrade for consumers and many businesses.According to U.S. analytics vendor Net Applications, Windows 10 was on 21.1% of the planet's personal computers in July, and on 23.5% of those machines running Windows. The difference between its user share of all PCs and only those running Windows stemmed from the fact that Windows powered 90% of all personal computers, not 100%.The July increase of about 2 percentage points was larger than June's gains but fell short of May's; the latter was the largest one-month growth since August 2015, the first full month of availability.To read this article in full or to leave a comment, please click here

Office 365 training courses to increase your expertise

Microsoft's Office 365 subscription service makes the company's most popular apps and business tools available via the cloud, which means the features change often. Office 365 users, including beginners and veteran IT professionals, have a wide range of options for related training tools, depending on their needs and levels of expertise. Many free, basic training classes are available to teach the ins and outs of Office 365, but IT professionals will likely benefit more from intensive, and sometimes costly, seminars that can help prepare for formal tech support certification.Many IT pros, for example, must pass Microsoft Certified Solutions Associate (MCSA) exams to qualify as cloud applications administrators focused on managing Office 365. Microsoft's Office 365 suite constantly changes as the company introduces new versions of apps, and Microsoft updates the MCSA exams accordingly.To read this article in full or to leave a comment, please click here

Microsoft’s Windows 10 Anniversary Update is rolling out, but not to phones—yet

As expected, Microsoft said Tuesday that its Windows 10 Anniversary Update is beginning to roll out. Surprisingly, perhaps, Windows phones aren’t on the approved list.We found the Windows 10 Anniversary Update to be a positive step forward for users, with substantial updates to features you use the most. Since the AU is a standard update, you really don’t have to do anything to receive it: It will be downloaded and installed automatically.To read this article in full or to leave a comment, please click here

IRS warns on super summer scam scourge

In the ideal world the infamous Internal Revenue Service call scam should have faded away replaced by some other stupid ploy but alas…The IRS said today that the scammers have ramped up their efforts to grab even more money -- over $26 million -- and rip-off even more people -- -- 5,000 or so since last count.+More on Network World: IRS: Top 10 2015 identity theft busts+To read this article in full or to leave a comment, please click here

IRS warns on super summer scam scourge

In the ideal world the infamous Internal Revenue Service call scam should have faded away replaced by some other stupid ploy but alas…The IRS said today that the scammers have ramped up their efforts to grab even more money -- over $26 million -- and rip-off even more people -- -- 5,000 or so since last count.+More on Network World: IRS: Top 10 2015 identity theft busts+To read this article in full or to leave a comment, please click here

Hot products at Black Hat 2016

Demisto Free EditionKey features:  The free edition of Demisto’s  ChatOps platform automates and streamlines security operations and incident management processes. It includes the ability to create playbooks that can be shared to collaborate among organizations to combat cybercrime and imported to other products. orchestration and automation, advanced investigations, improved collaboration and much more. More info.To read this article in full or to leave a comment, please click here

Hot products at Black Hat 2016

Demisto Free EditionKey features:  The free edition of Demisto’s  ChatOps platform automates and streamlines security operations and incident management processes. It includes the ability to create playbooks that can be shared to collaborate among organizations to combat cybercrime and imported to other products. orchestration and automation, advanced investigations, improved collaboration and much more. More info.To read this article in full or to leave a comment, please click here

Selfie fits modern politics like a handshake

The selfie as a political toolImage by ReutersHolding or running for a political office in 2016? You had better be able to take a decent selfie, or at the very least understand your need – responsibility may not be too strong of a word – to abide by the voting public’s thirst for that smartphone snap. It’s like knowing how to properly lift and eat a local delicacy, or name-drop the state university’s football coach. Politics 101. It’s a non-partisan, worldwide requirement, too. Here are recent examples via Reuters:To read this article in full or to leave a comment, please click here

Layer 2 Routing—Haven’t we been here before?

We often think the entire Internet, as we know it, just popped out of “thin air,” somehow complete and whole, with all the pieces in place. In reality, there have been many side roads taken, and many attempts to solve the problem of pushing the maximum amount of data across a wire along the way. One of these ways came to mind this last week, when I ran across this story—

Also on the virtualisation list is the customer premises equipment (CPE), and this deserves a little explanation. Obviously every premises needs some sort of physical connection to the network providing the services. What CPE virtualisation refers to is making the CPE as generic as possible. —The Register

Pulling layer 2 into the network to centralize the edge—where have I heard this before? Maybe it was all those years ago, when I was in TAC, and we used to support Cisco 1001’s, or the LEX—LAN Extenders. The promise then was the same as the promise now: a lightweight, easy to manage device that would relocate all the intelligence from the network edge into the access layer of the “mother ship,” where it could be properly managed.

Remember Rule 11? If Continue reading

IDG Contributor Network: The Netflix Effect and the API Effect: Parallel paths to disruption?

The Netflix Effect has kicked off waves of disruption that are changing how the media business has run for decades. Similar to the Netflix Effect, the API Effect might fundamentally change the ground rules in the industries of companies that provide real-time communications applications to enterprise businesses. The implications for both universes have many parallels and portend possibly massive marketplace changes. What are the Netflix Effect and the API Effect? What is the Netflix Effect? In the media industry it is the waves of change set off by the disaggregation of content and content production from the traditional methods of creation and distribution (cable and television networks and movie studios).To read this article in full or to leave a comment, please click here

White House, NSF, NASA tout ambitious drone application plans

The National Science Foundation will devote $35 million in research funding over the next five years to accelerate the safe, intelligent, design and control of unmanned aircraft applications.+More on Network World: Hot stuff: The coolest drones+The announcement was part of a wide-ranging White House Office of Science and Technology Policy proclamation to, as it said, promote the safe integration and innovative adoption of unmanned aircraft systems across the United States.The White House Office of Science and Technology Policy is today hosting a workshop on “Drones and the Future of Aviation.”To read this article in full or to leave a comment, please click here

White House, NSF, NASA tout ambitious drone application plans

The National Science Foundation will devote $35 million in research funding over the next five years to accelerate the safe, intelligent, design and control of unmanned aircraft applications.+More on Network World: Hot stuff: The coolest drones+The announcement was part of a wide-ranging White House Office of Science and Technology Policy proclamation to, as it said, promote the safe integration and innovative adoption of unmanned aircraft systems across the United States.The White House Office of Science and Technology Policy is today hosting a workshop on “Drones and the Future of Aviation.”To read this article in full or to leave a comment, please click here

Kill a smartphone password with a scan of your eye

Remembering passwords can be a headache; instead, why not log into your computer with a scan of your eye?The hardware and software to make iris scanning a key feature is now reaching smartphones and PCs. The process is simple: An infrared scanner on a device will scan your iris, and verify its authenticity against encrypted information stored on the device.It's a notable feature in Samsung's Galaxy Note7 smartphone, which was announced on Tuesday. The smartphone has an iris scanner -- used to log in -- on top of its screen.There's an uneasy feeling about the flash of light projected into your eye, but experts believe iris scanning is a more secure form of biometric authentication than fingerprints.To read this article in full or to leave a comment, please click here

Kill a smartphone password with a scan of your eye

Remembering passwords can be a headache; instead, why not log into your computer with a scan of your eye?The hardware and software to make iris scanning a key feature is now reaching smartphones and PCs. The process is simple: An infrared scanner on a device will scan your iris, and verify its authenticity against encrypted information stored on the device.It's a notable feature in Samsung's Galaxy Note7 smartphone, which was announced on Tuesday. The smartphone has an iris scanner -- used to log in -- on top of its screen.There's an uneasy feeling about the flash of light projected into your eye, but experts believe iris scanning is a more secure form of biometric authentication than fingerprints.To read this article in full or to leave a comment, please click here

Cowboys running back aaalmost adds to our iPhone injury list

Dallas Cowboys running back Darren McFadden nearly worked his way into our next big list of real life ways people have been hurt using their phones.McFadden broke his elbow over Memorial Day weekend and his coach initially told the media that it happened when the running back attempted to catch a falling iPhone. That fit right in with injuries we came across when digging through a recent batch of U.S. Consumer Product Safety Commission data, collected from about 100 hospitals reporting emergency room visits into the National Electronic Injury Surveillance System. We discovered lots of trips and falls, not to mention a few animal bites allegedly caused by ringing phones startling the pets.To read this article in full or to leave a comment, please click here

This tiny device can infect point-of-sale systems and unlock hotel rooms

Millions of point-of-sale systems and hotel room locks can be hacked by temporarily placing a small, inexpensive device several inches away from their card readers.The device, due to be presented Sunday at the DEF CON conference in Las Vegas, is the creation of Weston Hecker, a senior security engineer at Rapid7. It was inspired by MagSpoof, another device created last year by security researcher Samy Kamkar.MagSpoof can trick most standard card readers to believe a certain card was swiped by generating a strong electromagnetic field that simulates the data stored on the card's magnetic stripe. Kamkar presented it as a way to replace all your cards with a single device, but Hecker took the idea and investigated what else could be done with it.To read this article in full or to leave a comment, please click here