Digital innovation takes flight at SFO

Ian Law, CIO of San Francisco International Airport (SFO), is constantly at the intersection of a variety of business challenges. The obvious: running the technology powering air travel, passenger safety and well-being. The not so obvious: working with retailers, ride-sharing name brands and government agencies to make sure all operations are running smoothly.To read this article in full or to leave a comment, please click here(Insider Story)

Mayer to quit as CEO of new holding company after Yahoo sale to Verizon

After Yahoo sells its operating business to Verizon Communications, Marissa Mayer step down as CEO from the holding company that remains, according to a regulatory document posted Monday.However, Mayer and Yahoo still have not yet announced whether she will move with the operating business to Verizon or take another position. When Yahoo announced the deal with Verizon last July, Mayer said she planned to stay with the company."For me personally, I’m planning to stay," she said then. "I love Yahoo, and I believe in all of you. It’s important to me to see Yahoo into its next chapter."To read this article in full or to leave a comment, please click here

The best ways to Celebrate Pi Day 2017

It’s that time of year again: Pi Day! Image by Flickr/kok_sexton Pi enthusiasts around the world wait each year for March 14 to celebrate the mathematical constant that represents the ratio of a circle’s circumference to its diameter. Check out our tried and true tips for celebrating Pi Day, and be sure to check out our past year’s coverage for even more ideas.To read this article in full or to leave a comment, please click here

The best ways to Celebrate Pi Day 2017

It’s that time of year again: Pi Day! Image by Flickr/kok_sexton Pi enthusiasts around the world wait each year for March 14 to celebrate the mathematical constant that represents the ratio of a circle’s circumference to its diameter. Check out our tried and true tips for celebrating Pi Day, and be sure to check out our past year’s coverage for even more ideas.To read this article in full or to leave a comment, please click here

Cisco jumps on ex-Juniper exec Davidson for service provider biz

That was fast. Networking veteran Jonathan Davidson is re-joining Cisco a little less than a week after resigning as rival Juniper executive VP and general manager. Cisco/Jonathan Davidson Davidson is joining Cisco’s Service Provider Business Unit and will report to Yvette Kanouff, the senior vice president and general manager that unit.+More on Network World: Cisco’s Jasper deal – one year, 18 million new IoT devices later, challenges remain+To read this article in full or to leave a comment, please click here

Cisco jumps on ex-Juniper exec Davidson for service provider biz

That was fast. Networking veteran Jonathan Davidson is re-joining Cisco a little less than a week after resigning as rival Juniper executive VP and general manager. Cisco/Jonathan Davidson Davidson is joining Cisco’s Service Provider Business Unit and will report to Yvette Kanouff, the senior vice president and general manager that unit.+More on Network World: Cisco’s Jasper deal – one year, 18 million new IoT devices later, challenges remain+To read this article in full or to leave a comment, please click here

Carnegie Mellon director recognized for devotion to diversity in CompSci

The Computing Research Association has recognized Carnegie Mellon University’s Carol Frieze as its 2017 A. Nico Habermann Award winner in recognition of her efforts to promote diversity in computer science.Frieze directs Women@SCS, a student/faculty organization fostering opportunities for women, and the student-run SCS4ALL initiative to bring more underrepresented groups into the computing field. To read this article in full or to leave a comment, please click here

Rapid7 discloses multiple vulnerabilities in telepresence robot

You know the telepresence robots that roll around offices with a camera, microphone and iPad attached in order to give remote users a way to participate “face-to-face” in meetings? It would be trippy if an attacker were able to take control of such a robot, but also entirely possible. Today, Rapid7 revealed three security flaws it discovered in the mobile conferencing device Double Telepresence Robot. Rapid7 researcher Deral Heiland discovered three vulnerabilities: unauthenticated access to data, static user session management, and weak Bluetooth pairing. Two of three vulnerabilities disclosed to Double Robotics were patched in January, a really quick response considering the fixes were deployed about a week after the flaws were disclosed to the company.To read this article in full or to leave a comment, please click here

Rapid7 discloses multiple vulnerabilities in telepresence robot

You know the telepresence robots that roll around offices with a camera, microphone and iPad attached in order to give remote users a way to participate “face-to-face” in meetings? It would be trippy if an attacker were able to take control of such a robot, but also entirely possible. Today, Rapid7 revealed three security flaws it discovered in the mobile conferencing device Double Telepresence Robot. Rapid7 researcher Deral Heiland discovered three vulnerabilities: unauthenticated access to data, static user session management, and weak Bluetooth pairing. Two of three vulnerabilities disclosed to Double Robotics were patched in January, a really quick response considering the fixes were deployed about a week after the flaws were disclosed to the company.To read this article in full or to leave a comment, please click here

Old nemesis spam becoming significant way for attackers to subvert data

Spam is once again raising its ugly head as a chief way for attackers to grab protected data.IBM’s X-Force Threat Intelligence group said today that one of the key findings from its forthcoming Threat Intelligence Index for 2017 is that spam volume grew dramatically throughout 2016, bringing with its host of new malicious attachments harboring banking Trojans and ransomware.+More on Network World: IBM technology moves even closer to human speech recognition parity+“Attackers are not limited to a single set of tools, however. The ongoing expansion of domain name choices has added another instrument to the spammer’s toolbox: enticing recipients to click through to malicious sites, ultimately allowing attackers to infiltrate their networks,” wrote Ralf Iffert, Manager, X-Force Content Security in a blog about the spam findings. “More than 35% of the URLs found in spam sent in 2016 used traditional, generic top-level domains (gTLD) .com and .info. Surprisingly, over 20% of the URLs used the .ru country code top-level domain (ccTLD), helped mainly by the large number of spam emails containing the .ru ccTLD.”To read this article in full or to leave a comment, please click here

Old nemesis spam becoming significant way for attackers to subvert data

Spam is once again raising its ugly head as a chief way for attackers to grab protected data.IBM’s X-Force Threat Intelligence group said today that one of the key findings from its forthcoming Threat Intelligence Index for 2017 is that spam volume grew dramatically throughout 2016, bringing with its host of new malicious attachments harboring banking Trojans and ransomware.+More on Network World: IBM technology moves even closer to human speech recognition parity+“Attackers are not limited to a single set of tools, however. The ongoing expansion of domain name choices has added another instrument to the spammer’s toolbox: enticing recipients to click through to malicious sites, ultimately allowing attackers to infiltrate their networks,” wrote Ralf Iffert, Manager, X-Force Content Security in a blog about the spam findings. “More than 35% of the URLs found in spam sent in 2016 used traditional, generic top-level domains (gTLD) .com and .info. Surprisingly, over 20% of the URLs used the .ru country code top-level domain (ccTLD), helped mainly by the large number of spam emails containing the .ru ccTLD.”To read this article in full or to leave a comment, please click here

How much are vendor security assurances worth after the CIA leaks?

Following the recent revelations about the U.S. Central Intelligence Agency's cyberespionage arsenal, software vendors reiterated their commitments to fix vulnerabilities in a timely manner and told users that many of the flaws described in the agency's leaked documents have been fixed.While these assurances are understandable from a public relations perspective, they don't really change anything, especially for companies and users that are the target of state-sponsored hackers. The software they use is not less safe, nor better protected, than it was before WikiLeaks published the 8,700-plus CIA documents last Tuesday.To read this article in full or to leave a comment, please click here

How much are vendor security assurances worth after the CIA leaks?

Following the recent revelations about the U.S. Central Intelligence Agency's cyberespionage arsenal, software vendors reiterated their commitments to fix vulnerabilities in a timely manner and told users that many of the flaws described in the agency's leaked documents have been fixed.While these assurances are understandable from a public relations perspective, they don't really change anything, especially for companies and users that are the target of state-sponsored hackers. The software they use is not less safe, nor better protected, than it was before WikiLeaks published the 8,700-plus CIA documents last Tuesday.To read this article in full or to leave a comment, please click here

Today Only 48% off Omron 10 Series Bluetooth Wireless Blood Pressure Monitor – Deal Alert

The Omron 10 series wireless blood pressure monitor averages 4.5 out of 5 stars on Amazon from over 4,450 customers (read reviews). With a regular list price of $99.99, this 48% off deal puts it at just $51.99.  The bluetooth monitor is compatible with Omron's free iOS and Android apps. It features multi-color indicator lights which show if your readings is in the normal (green) or hypertension (orange) range. BP level bar displays how your reading compares to normal home blood pressure levels. An Easy-Wrap ComFit Cuff inflates around your entire arm to avoid incorrect cuff positioning. It automatically takes 3 consecutive readings one minute apart and displays the average, following guidelines set by the American Heart Association. An easy-to-read display with extra-large digits & backlight make results easier to read. The unit stores 200 readings in device or 100 each for 2 users, and operates with an included AC Adapter or 4 AA batteries. See the discounted Omron 10 series bluetooth blood pressure monitor on Amazon now.To read this article in full or to leave a comment, please click here

Fears arise that Trump has dropped ball on H-1B reform

President Donald Trump's administration has signaled that it has no immediate plans to change the H-1B program. Critics are roiled. They wanted Trump to act before April 1, the day the U.S. accepts visa applications for the new year.But no one knows for sure. New rumors circulate that Trump will act, maybe next week, but the White House won't say.The IEEE-USA said Friday that Trump's inaction on the H-1B visa "will cost American jobs." The group now believes that action before April is unlikely, and that may be because of something Sean Spicer, the press secretary, said this week.Spicer was asked at a press briefing Wednesday if there was any plan to "revamp the H-1B program by April 1." Spicer said the president was focused on border security.To read this article in full or to leave a comment, please click here

BrandPost: Three Automation Mistakes You Should Avoid

There has never been a more pressing need to automate data center operations—including the network, storage, compute, and apps. End-to-end data center automation might be the fastest route to delivering the on-demand IT services needed in today’s digital economy. As such, no organization can afford to stumble as it develops and deploys comprehensive automation strategies. Let’s take a look at three of the most common mistakes organizations make as they seek to automate their environments: taking on too much, focusing too heavily on a specific tool, and letting a vendor dictate their strategy.Mistake 1: Trying to boil the ocean. Trying to do too much, too soon, is often a recipe for disaster. When it comes to automation, this approach frequently results in unmet expectations as well as management’s diminished confidence in IT’s ability to deliver.To read this article in full or to leave a comment, please click here

Disaster recovery: How is your business set up to survive an outage?

Asynchronous vs synchronous. Dark disaster recovery vs. active architecture. Active/active vs. active/passive. No setup is objectively better or worse than another. The best one for you primarily depends on your level of tolerance for what happens when the server goes down.Security experts say how individual companies choose to save their data in anticipation of an outage depends on how long they can survive before the “lights” are turned back on. What level of availability does your company need? Is the face of your company an ecommerce site where even a few minutes offline can cost an astronomical sum? Will the cost of an active-active system outweigh the potential loss of business from an outage?To read this article in full or to leave a comment, please click here

Disaster recovery: How is your business set up to survive an outage?

Asynchronous vs synchronous. Dark disaster recovery vs. active architecture. Active/active vs. active/passive. No setup is objectively better or worse than another. The best one for you primarily depends on your level of tolerance for what happens when the server goes down.Security experts say how individual companies choose to save their data in anticipation of an outage depends on how long they can survive before the “lights” are turned back on. What level of availability does your company need? Is the face of your company an ecommerce site where even a few minutes offline can cost an astronomical sum? Will the cost of an active-active system outweigh the potential loss of business from an outage?To read this article in full or to leave a comment, please click here