14% off TP-Link Multicolor Dimmable Smart Wi-Fi 60W LED Bulb – Deal Alert

Control TP-Link's smart bulbs from anywhere with your tablet or smartphone, or with your voice via the Alexa service. Dim brightness, fine-tune light appearance from soft white to daylight, and choose from 16 million colors to set the mood. Set timers and countdowns, or create an on/off schedule. The bulb also features an "away" mode that randomly turns on/off to give the appearance you're home, when you're away. The 60W multicolor dimmable and tunable smart bulb from TP-Link averages 4 out of 5 stars from over 1,100 people on Amazon (read reviews), where its typical list price of $49.99 has been temporarily reduced 14%. See this deal on Amazon.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Digital transformation progress. Or not…

I go to a lot of conferences, and something I have noticed in the past year or two is that almost every conference will have a keynote speaker talking about digital transformation. Hell, people have even started calling it simply DT, and digital transformation keynoters have the usual suspects to call on for case studies—Uber, Airbnb etc.But every now and then I worry about how impactful the digital transformation story really is. I spend a reasonable amount of time with large organizations talking to them about their present and their future and helping them rethink what their business will look like in one, three or five years. Part of these conversations, obviously, center around digital transformation, since I am a firm believer that digital technologies will allow the agility and innovation with regards products, services and business models that these organizations need to survive.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Digital transformation progress. Or not…

I go to a lot of conferences, and something I have noticed in the past year or two is that almost every conference will have a keynote speaker talking about digital transformation. Hell, people have even started calling it simply DT, and digital transformation keynoters have the usual suspects to call on for case studies—Uber, Airbnb etc.But every now and then I worry about how impactful the digital transformation story really is. I spend a reasonable amount of time with large organizations talking to them about their present and their future and helping them rethink what their business will look like in one, three or five years. Part of these conversations, obviously, center around digital transformation, since I am a firm believer that digital technologies will allow the agility and innovation with regards products, services and business models that these organizations need to survive.To read this article in full or to leave a comment, please click here

Rough Guide to IETF 98: Internet of Things

The Internet of Things (IoT) is a buzzword around the Internet industry and the broader technology and innovation business. We are often asked what the IETF is doing in relation to IoT and in this short post I'd like to highlight some of the relevant sessions scheduled during the upcoming IETF 98 meeting in Chicago next week. Check out the IETF Journal IoT Category for more details about many of these topics.

Mat Ford

Possibly the worst mass invasion of internet privacy ever

In January, a bank in Edina, Minnesota, received a request for a $28,500 wire transfer from someone claiming to be local resident Douglas Junker. Though bolstered with a faked picture of a passport, the request later turned out to be fraudulent, and local cops were reportedly stymied on how to catch the thief. Until, that is, they came up with a novel idea: Hoping to find out how the fraudster got the picture, Edina Police Detective David Lindman applied for a search warrant to obtain the names, email addresses, account information and IP addresses of everyone in the entire town of 50,000 who had searched for any variation of the victim’s name between Dec. 1, 2016, and Jan. 7, 2017. To read this article in full or to leave a comment, please click here

Possibly the worst mass invasion of internet privacy ever

In January, a bank in Edina, Minnesota, received a request for a $28,500 wire transfer from someone claiming to be local resident Douglas Junker. Though bolstered with a faked picture of a passport, the request later turned out to be fraudulent, and local cops were reportedly stymied on how to catch the thief. Until, that is, they came up with a novel idea: Hoping to find out how the fraudster got the picture, Edina Police Detective David Lindman applied for a search warrant to obtain the names, email addresses, account information and IP addresses of everyone in the entire town of 50,000 who had searched for any variation of the victim’s name between Dec. 1, 2016, and Jan. 7, 2017. To read this article in full or to leave a comment, please click here

Minnesota police seek data on who Googled a victim’s name

Local police in Minnesota are trying to solve a bank fraud scheme by demanding Google give up data on people who looked up key search terms that may be related to crime.The warrant, issued to police in the city of Edina last month, is raising eyebrows among privacy advocates. It's a rare instance of U.S. law enforcement using mass data collection to solve a petty crime, said Nate Cardozo, an attorney with the Electronic Frontier Foundation.Edina police applied for the warrant to investigate a fraud case dealing with $28,500 that was wired out of a victim's bank account back in January.To read this article in full or to leave a comment, please click here

Credit-card breach hits another restaurant chain

Another sizeable payment card data breach has been discovered at a U.S. restaurant chain.In the latest example, several high-end eateries run by Select Restaurants in Cleveland were the victims of fraudulent cards used by customers at its restaurants, according to a report posted Thursday on KrebsOnSecurity, a reliable site written by reporter Brian Krebs. Krebs said he learned about the case from anti-fraud teams at multiple financial institutions investigating "a great deal of fraud on cards used at a handful of high-end restaurants around the country."To read this article in full or to leave a comment, please click here

Credit-card breach hits another restaurant chain

Another sizeable payment card data breach has been discovered at a U.S. restaurant chain.In the latest example, several high-end eateries run by Select Restaurants in Cleveland were the victims of fraudulent cards used by customers at its restaurants, according to a report posted Thursday on KrebsOnSecurity, a reliable site written by reporter Brian Krebs. Krebs said he learned about the case from anti-fraud teams at multiple financial institutions investigating "a great deal of fraud on cards used at a handful of high-end restaurants around the country."To read this article in full or to leave a comment, please click here

Get better sleep by adding more noise

The awesome 1980s girl band The Go-Go’s had a song about insomnia called “You Can’t Walk in Your Sleep (If You Can’t Sleep)” in which one lyric went “You can’t win you wonder why that sleep is one thing you can’t buy.” While technically true, you can buy something that will help you with your sleep. Several things, actually, as sleep technology continues to develop new ways to help us get our Zzzzzzs. In my case, I’ve discovered that while I’m a light sleeper, consistent noise like an air conditioner or fan help me sleep better than complete silence. So I was pleased to receive a sample of the Sound+Sleep SE (Special Edition, about $150) sound machine from ASTI (Adaptive Sound Technologies Inc.). The device offers 64 different non-looping sounds to help people fall asleep and stay asleep. In addition, an adaptive noise tech feature (optional for users) raises the volume of the sounds when it detects a disruptive noise, such as a person snoring or car horn. To read this article in full or to leave a comment, please click here

BrandPost: Empower IT Innovation with Cross-Domain Automation

Digital transformation has ignited a new economy where organizations are increasingly expecting IT to embrace a bigger role, drive business innovation, and move with greater agility. This often means IT must take immediate action to help the organization compete, or risk becoming irrelevant as line-of-business leaders go around IT and outsource projects to the cloud.Simply put, as your organization becomes increasingly digital, your ability to be agile is heavily dependent upon the agility of IT, which is why technology is at the heart of this new order.Automation is one of the key technologies organizations are embracing to achieve IT agility at the pace of today’s business. Unfortunately, while automation has been implemented in many domains within the data center, network automation has lagged behind. Additionally, automation tends to be implemented in silos within the data center, creating islands of automation that lead to disparate tools and highly disjointed operations. This siloed approach ultimately hinders the pace of service delivery and increases operational costs.To read this article in full or to leave a comment, please click here

Machine learning proves its worth to business

Machine learning couldn’t be hotter. A type of artificial intelligence that enables computers to learn to perform tasks and make predictions without explicit programming, machine learning has caught fire among the hip tech set, but remains a somewhat futuristic concept for most enterprises. But thanks to technological advances and emerging frameworks, machine learning may soon hit the mainstream.Consulting firm Deloitte expects to see a big increase in the use and adoption of machine learning in the coming year. This is in large part because the technology is becoming much more pervasive. The firm’s latest research shows that worldwide more than 300 million smartphones, or more than one-fifth of units sold in 2017, will have machine learning capabilities on board.To read this article in full or to leave a comment, please click here

Increasing HPC Utilization with Meta-Queues

Solving problems by the addition of abstractions is a tried and true approach in technology. The management of high-performance computing workflows is no exception.

The Pegasus workflow engine and HTCondor’s DAGman are used to manage workflow dependencies. GridWay and DRIVE route jobs to different resources based on suitability or available capacity. Both of these approaches are important, but they share a key potential drawback: jobs are still treated as distinct units of computation to be scheduled individually by the scheduler.

As we have written previously, the aims of HPC resource administrators and HPC resource users are sometimes at odds.

Increasing HPC Utilization with Meta-Queues was written by Nicole Hemsoth at The Next Platform.

How to use data analytics to improve project outcomes

Ted Friedman, vice president and analyst at Gartner, predicts the following three trends will drive fundamental changes in the use of data and analytics: Instead of just reflecting business performance, data analytics will become the driver of operations. Data and analytics will become infused in an organization's architecture from end to end, creating a holistic approach -- and this will include strategic project management in EPMOs (enterprise program management offices). Executives will use data and analytics for business strategy and growth, creating new additional roles for professionals. Experts share insights on how data improves project performance Companies of all sizes have been using data analytics to seek out opportunities, reduce costs, create efficiencies, make better and faster decisions, and ultimately increase customer satisfaction; this also translates at the project, program and portfolio levels since these greatly enable company-wide strategy.To read this article in full or to leave a comment, please click here

5 tips to help you find the right hybrid tablet

Hybrid tablets, 2-in-1 devices or detachable notebooks -- whatever you want to call them -- come in all shapes and sizes. In fact, the options are so expansive, it can be overwhelming to find the device that will best suit you.Whether you prefer a more traditional notebook experience or you're looking for a tablet that can perform like a notebook, it's more than likely the perfect option exists for you. But there's a lot to consider before you purchase a hybrid device, and these five tips will help you find your best option.[ Related story: 6 new 2-in-1 devices to watch for in 2017 ] To read this article in full or to leave a comment, please click here

6 tips to avoid job search depression

Searching for a new job can be a full-time job, It's a thankless, tiring -- and, yes, depressing task. Searching for roles, filling out applications, networking, tailoring endless versions of your resume to each potential job, interviewing, handling rejections -- the entire process can be so overwhelming and can leave you feeling unwanted, dejected and sad.To read this article in full or to leave a comment, please click here(Insider Story)

Coders and librarians team up to save scientific data

On a windy, snowy night in Dover, N.H., about 15 people gathered in an old converted mill, staring at computer screens and furiously tapping at their keyboards.The group – some students, some programmers, and at least one part-time dishwasher and data entry clerk – were braving the snowstorm and volunteering their time to try to keep scientific data from being lost.It was one of dozens of data rescue events spread out in cities from Toronto to Los Angeles, and Houston to Chicago. These events, many on university campuses, have been going on since December, bringing together software programmers, librarians and other volunteers who are trying to safely archive scientific data from government websites.To read this article in full or to leave a comment, please click here

How much is a bug worth?

1Password recently raised its top bug bounty reward from $25,000 to $100,000. They increased the amount to further incentivize researchers, according to its blog. Separately Google paid out $3 million last year for its vulnerability reward program.But how are these figures determined?David Baker, vice president of operations at Bugcrowd, believes these big bounties demonstrate that organizations are really starting to think about the market and where the market is pricing vulnerabilities.To read this article in full or to leave a comment, please click here

How much is a bug worth?

1Password recently raised its top bug bounty reward from $25,000 to $100,000. They increased the amount to further incentivize researchers, according to its blog. Separately Google paid out $3 million last year for its vulnerability reward program.But how are these figures determined?David Baker, vice president of operations at Bugcrowd, believes these big bounties demonstrate that organizations are really starting to think about the market and where the market is pricing vulnerabilities.To read this article in full or to leave a comment, please click here

6 of the most effective social engineering techniques

Social engineering is the strongest method of attack against the enterprise’s weakest vulnerability, its people. Criminal hackers recognize this fact. In 2015, social engineering became the No. 1 method of attack, according to Proofpoint’s 2016 Human Factor Report.These successful social engineering methods often use phishing and malware. But deceptive information assailants have more tools and approaches to draw on than these.That’s why CSO covers six of the most effective social engineering techniques that attackers use both on and off the internet, providing insights into how each one works, what it accomplishes, and the technologies, methods, and policies for detecting and responding to social saboteurs and keeping them at bay.To read this article in full or to leave a comment, please click here(Insider Story)