13% off Ecobee3 Lite Wi-Fi Alexa Compatible Smart Thermostat – Deal Alert

Ecobee understands your local weather, schedule and desired comfort settings, to ensure your home is at the right temperature at the right time. Control it using your mobile device from anywhere, or using your voice via the Alexa service.  Get free monthly reports on how much energy you’ve saved and tips on how you can save even more. Ecobee monitors your heating and cooling systems and alerts you if it senses that something isn’t working properly. Currently the smart WiFi thermostat is discounted 13% off its typical list price, saving you $22.52. Get the Ecobee3 thermostat on Amazon now for $146.48. To read this article in full or to leave a comment, please click here

17% off Ecobee3 Lite Wi-Fi Alexa Compatible Smart Thermostat – Deal Alert

Ecobee understands your local weather, schedule and desired comfort settings, to ensure your home is at the right temperature at the right time. Control it using your mobile device from anywhere, or using your voice via the Alexa service.  Get free monthly reports on how much energy you’ve saved and tips on how you can save even more. Ecobee monitors your heating and cooling systems and alerts you if it senses that something isn’t working properly. Currently the smart WiFi thermostat is discounted 17% off its typical list price, saving you $29. Get the Ecobee3 thermostat on Amazon now for $139.92. To read this article in full or to leave a comment, please click here

Networking Field Day 15 – A new delegate emerges

Networking Field Day 15Yet again I find myself honored, and questioning their selection methods, by being selected for a Networking Field Day event. Networking Field Day 15 kicks off April 6 and 7th in San Jose California. Each and every Tech Field Day event is always an amazing opportunity to engage with vendors and industry peers. But trust me, I’m using the term peer rather loosely… While we may work in the same industry, many of these folks are way smarter than me! It seems the delegate list for NFD15 is certainly no exception to that rule! While I’ve met and become friends with roughly 75% of the “team” I get to meet a couple new faces which is always exciting. At least one of these faces I’ve spent hours talking to on Skype, but never actually met in person. I’m looking at you Nicolas. ;)

Networking Field Day Vendors

I took a look at the vendor list for this as soon as I heard they needed another delegate. Looking at the current line-up I got pretty excited, everything seems rather relevant to things I want to see! Looks like we’re going to see presentations from Gigamon, which specializes in the network tap and visibility market. I Continue reading

IDG Contributor Network: How to get the most out of data, services in a multi-cloud world

There’s no doubt that we’re quickly moving toward a multi-cloud-dominated world. By the end of 2018, over half of enterprise-class businesses will subscribe to more than five different public cloud services.1 The pragmatic reality for the vast majority of enterprises is that their IT, and thus their data and services, will span multiple data centers and computing clouds. This will accelerate fragmentation of data and systems that have to be seamlessly integrated to yield their full potential.Despite the benefits promised by public cloud, most enterprises can’t realistically move all their data off premises for various reasons—because data sets are too large to move in bulk or because of other preventative regulatory, privacy or security requirements, for example.  To read this article in full or to leave a comment, please click here

Chinese Researchers One Step Closer to Parallel Turing Machine

Parallel computing has become a bedrock in the HPC field, where applications are becoming increasingly complex and such compute-intensive technologies as data analytics, deep learning and artificial intelligence (AI) are rapidly emerging. Nvidia and AMD have driven the adoption of GPU accelerators in supercomputers and other high-end systems, Intel is addressing the space with its many-core Xeon Phi processors and coprocessors and, as we’ve talked about at The Next Platform, other acceleration technologies like field-programmable gate arrays (FPGAs) are pushing their way into the picture. Parallel computing is a booming field.

However, the future was not always so assured.

Chinese Researchers One Step Closer to Parallel Turing Machine was written by Nicole Hemsoth at The Next Platform.

Ask.com serves as a conduit for malware – again

Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same attack methods.In both cases attackers managed to infiltrate the Ask.com updater infrastructure to the point that they used legitimate Ask signing certificates to authenticate malware that was masquerading as software updates.And in both cases Ask Partner Network (APN), which distributes the Ask.com toolbar, told the security vendors who discovered the incidents that it had fixed the problem. The first one was discovered by security vendor Red Canary, and the second was caught by Carbon Black, whose researchers just wrote about it in their company blog.To read this article in full or to leave a comment, please click here

Ask.com serves as a conduit for malware – again

Businesses that allow the Ask.com toolbar in their environments might want to rethink that after endpoints equipped with the browser add-on were compromised last November and then again the very next month using pretty much the same attack methods.In both cases attackers managed to infiltrate the Ask.com updater infrastructure to the point that they used legitimate Ask signing certificates to authenticate malware that was masquerading as software updates.And in both cases Ask Partner Network (APN), which distributes the Ask.com toolbar, told the security vendors who discovered the incidents that it had fixed the problem. The first one was discovered by security vendor Red Canary, and the second was caught by Carbon Black, whose researchers just wrote about it in their company blog.To read this article in full or to leave a comment, please click here

Serving Up Serverless Science

The “serverless” trend has become the new hot topic in cloud computing. Instead of running Infrastructure-as-a-Service (IaaS) instances to provide a service, individual functions are executed on demand.

This has been a boon to the web development world, as it allows the creation of UI-driven workloads without the administrative overhead of provisioning, configuring, monitoring, and maintaining servers. Of course, the industry has not yet reached the point where computation can be done in thin air, so there are still servers involved somewhere. The point is that the customer is not concerned with mundane tasks such as operating system patching and

Serving Up Serverless Science was written by Nicole Hemsoth at The Next Platform.

Cobol plays major role in U.S. government breaches

New research is turning on its head the idea that legacy systems -- such as Cobol and Fortran -- are more secure because hackers are unfamiliar with the technology.New research found that these outdated systems, which may not be encrypted or even documented, were more susceptible to threats.By analyzing publicly available federal spending and security breach data, the researchers found that a 1% increase in the share of new IT development spending is associated with a 5% decrease in security breaches."In other words, federal agencies that spend more in maintenance of legacy systems experience more frequent security incidents, a result that contradicts a widespread notion that legacy systems are more secure," the paper found. The research paper was written by Min-Seok Pang, an assistant professor of management information systems at Temple University, and Huseyin Tanriverdi, an associate professor in the Information, Risk and Operations Department at the University of Texas at Austin.To read this article in full or to leave a comment, please click here

Cobol plays major role in U.S. government breaches

New research is turning on its head the idea that legacy systems -- such as Cobol and Fortran -- are more secure because hackers are unfamiliar with the technology.New research found that these outdated systems, which may not be encrypted or even documented, were more susceptible to threats.By analyzing publicly available federal spending and security breach data, the researchers found that a 1% increase in the share of new IT development spending is associated with a 5% decrease in security breaches."In other words, federal agencies that spend more in maintenance of legacy systems experience more frequent security incidents, a result that contradicts a widespread notion that legacy systems are more secure," the paper found. The research paper was written by Min-Seok Pang, an assistant professor of management information systems at Temple University, and Huseyin Tanriverdi, an associate professor in the Information, Risk and Operations Department at the University of Texas at Austin.To read this article in full or to leave a comment, please click here

Windows 10 ‘servicing stack’ update cripples some PCs

Some users have reported that one of this week's Windows 10 updates crippled their PCs, according to a thread on Reddit.They fingered the KB4013418 update as the most likely culprit. That update was marked simply as "Update for Windows 10 Version 1607" in Windows Update, and in the accompanying support document, tagged as a "servicing stack update."[ Related: Fix Windows 10 problems with these free Microsoft tools ] In Microsoft's parlance, a servicing stack consists of the executable file and associated libraries needed to install Windows and its updates.To read this article in full or to leave a comment, please click here

Google pulls virtual assistant ad after user outcry

Google Home users got a surprise on Thursday when their virtual assistants cheerily mentioned that the live-action remake of “Beauty and the Beast” is opening in theaters this weekend.The ad seems to pop up when users ask for a rundown of their day, which kicks off the Home’s “My Day” feature. That feature is supposed to offer users information about the weather, their calendars and relevant news. But at the end of the rundown, the Google Assistant offered the following unsolicited tidbit, according to a video posted to Twitter by Bryson Meunier :“By the way, Disney’s live action 'Beauty and The Beast' opens today,” it says. “In this version of the story, Belle is the inventor instead of Maurice. That rings truer, if you ask me. For some more movie fun, ask me something about Belle.”To read this article in full or to leave a comment, please click here

Augmented and virtual reality to see aggressive growth by 2021

Augmented and virtual reality are catching on, even if it is still early days for both.While some analysts at Strategy Analytics worry there aren't enough engaging 360-degree VR movies and other content on the market, IDC analysts on Thursday said there are plenty of early business-focused rollouts of AR to justify optimism.[ To comment on this story, visit Computerworld's Facebook page. ] IDC pointed to medical, industrial and marketing applications already in use and predicted a bullish, 10-fold spike for AR and VR headsets by 2021.To read this article in full or to leave a comment, please click here

Recruiters: Coding talent needed, degree optional

Employers who once focused on finding software development talent from top universities are now hiring developers who learned the trade from coding bootcamps, junior colleges, and online resources, technical recruiter HackerRank says.To read this article in full or to leave a comment, please click here(Insider Story)

Do you have an incident response plan in place?

Details matter when developing an incident response (IR) plan. But, even the most successful IR plans can lack critical information, impeding how quickly normal business operations are restored.This guide from Cybereason takes a closer look at nine of the often forgotten, but important steps that you should incorporate into your IR plan.Preparation across the entire companyGood security leaders should be able to get people from across the company to help develop the IR plan. While CISOs will most likely manage the team that handles the threat, dealing with the fallout from a breach requires the efforts of the entire company.To read this article in full or to leave a comment, please click here(Insider Story)

Future of tech policy murky under Trump administration

At the outset of the Trump presidency, there is considerable uncertainty around what the new administration might mean for tech policy, a deeply complex set of issues that were largely out of view on the campaign trail.As a candidate, Trump did not articulate a tech policy agenda, though he stressed the need for a tougher posture on cybersecurity.[ Related: What to expect from the Trump administration on cybersecurity ]Now in the Oval Office, Trump has a range of areas where he could advance polices that impact the tech sector, from immigration to privacy to curbing regulations on emerging technologies such as drones and health IT applications.To read this article in full or to leave a comment, please click here

Experts divided on value of Cyber National Guard

This past weekend at SXSW, two Congressmen suggested that the U.S. create a cybersecurity reserves system, similar to the National Guard, but the idea has received a mixed welcome from the cybersecurity community.According to House Rep. Will Hurd, a Republican from Texas, a national cybersecurity reserve could help strengthen national security and bring in a diversity of experience. Hurd, who has a degree in computer science from Texas A&M, has served as an undercover CIA officer and has worked as a partner at cybersecurity firm FusionX.He has been pitching the idea of a Cyber National Guard for a while, and has suggested that the government could forgive student loan debt for those who serve. It would also help ensure a cross-pollination of experience between government and industry.To read this article in full or to leave a comment, please click here