Credit-card breach hits another restaurant chain

Another sizeable payment card data breach has been discovered at a U.S. restaurant chain.In the latest example, several high-end eateries run by Select Restaurants in Cleveland were the victims of fraudulent cards used by customers at its restaurants, according to a report posted Thursday on KrebsOnSecurity, a reliable site written by reporter Brian Krebs. Krebs said he learned about the case from anti-fraud teams at multiple financial institutions investigating "a great deal of fraud on cards used at a handful of high-end restaurants around the country."To read this article in full or to leave a comment, please click here

Get better sleep by adding more noise

The awesome 1980s girl band The Go-Go’s had a song about insomnia called “You Can’t Walk in Your Sleep (If You Can’t Sleep)” in which one lyric went “You can’t win you wonder why that sleep is one thing you can’t buy.” While technically true, you can buy something that will help you with your sleep. Several things, actually, as sleep technology continues to develop new ways to help us get our Zzzzzzs. In my case, I’ve discovered that while I’m a light sleeper, consistent noise like an air conditioner or fan help me sleep better than complete silence. So I was pleased to receive a sample of the Sound+Sleep SE (Special Edition, about $150) sound machine from ASTI (Adaptive Sound Technologies Inc.). The device offers 64 different non-looping sounds to help people fall asleep and stay asleep. In addition, an adaptive noise tech feature (optional for users) raises the volume of the sounds when it detects a disruptive noise, such as a person snoring or car horn. To read this article in full or to leave a comment, please click here

BrandPost: Empower IT Innovation with Cross-Domain Automation

Digital transformation has ignited a new economy where organizations are increasingly expecting IT to embrace a bigger role, drive business innovation, and move with greater agility. This often means IT must take immediate action to help the organization compete, or risk becoming irrelevant as line-of-business leaders go around IT and outsource projects to the cloud.Simply put, as your organization becomes increasingly digital, your ability to be agile is heavily dependent upon the agility of IT, which is why technology is at the heart of this new order.Automation is one of the key technologies organizations are embracing to achieve IT agility at the pace of today’s business. Unfortunately, while automation has been implemented in many domains within the data center, network automation has lagged behind. Additionally, automation tends to be implemented in silos within the data center, creating islands of automation that lead to disparate tools and highly disjointed operations. This siloed approach ultimately hinders the pace of service delivery and increases operational costs.To read this article in full or to leave a comment, please click here

Machine learning proves its worth to business

Machine learning couldn’t be hotter. A type of artificial intelligence that enables computers to learn to perform tasks and make predictions without explicit programming, machine learning has caught fire among the hip tech set, but remains a somewhat futuristic concept for most enterprises. But thanks to technological advances and emerging frameworks, machine learning may soon hit the mainstream.Consulting firm Deloitte expects to see a big increase in the use and adoption of machine learning in the coming year. This is in large part because the technology is becoming much more pervasive. The firm’s latest research shows that worldwide more than 300 million smartphones, or more than one-fifth of units sold in 2017, will have machine learning capabilities on board.To read this article in full or to leave a comment, please click here

Increasing HPC Utilization with Meta-Queues

Solving problems by the addition of abstractions is a tried and true approach in technology. The management of high-performance computing workflows is no exception.

The Pegasus workflow engine and HTCondor’s DAGman are used to manage workflow dependencies. GridWay and DRIVE route jobs to different resources based on suitability or available capacity. Both of these approaches are important, but they share a key potential drawback: jobs are still treated as distinct units of computation to be scheduled individually by the scheduler.

As we have written previously, the aims of HPC resource administrators and HPC resource users are sometimes at odds.

Increasing HPC Utilization with Meta-Queues was written by Nicole Hemsoth at The Next Platform.

How to use data analytics to improve project outcomes

Ted Friedman, vice president and analyst at Gartner, predicts the following three trends will drive fundamental changes in the use of data and analytics: Instead of just reflecting business performance, data analytics will become the driver of operations. Data and analytics will become infused in an organization's architecture from end to end, creating a holistic approach -- and this will include strategic project management in EPMOs (enterprise program management offices). Executives will use data and analytics for business strategy and growth, creating new additional roles for professionals. Experts share insights on how data improves project performance Companies of all sizes have been using data analytics to seek out opportunities, reduce costs, create efficiencies, make better and faster decisions, and ultimately increase customer satisfaction; this also translates at the project, program and portfolio levels since these greatly enable company-wide strategy.To read this article in full or to leave a comment, please click here

5 tips to help you find the right hybrid tablet

Hybrid tablets, 2-in-1 devices or detachable notebooks -- whatever you want to call them -- come in all shapes and sizes. In fact, the options are so expansive, it can be overwhelming to find the device that will best suit you.Whether you prefer a more traditional notebook experience or you're looking for a tablet that can perform like a notebook, it's more than likely the perfect option exists for you. But there's a lot to consider before you purchase a hybrid device, and these five tips will help you find your best option.[ Related story: 6 new 2-in-1 devices to watch for in 2017 ] To read this article in full or to leave a comment, please click here

6 tips to avoid job search depression

Searching for a new job can be a full-time job, It's a thankless, tiring -- and, yes, depressing task. Searching for roles, filling out applications, networking, tailoring endless versions of your resume to each potential job, interviewing, handling rejections -- the entire process can be so overwhelming and can leave you feeling unwanted, dejected and sad.To read this article in full or to leave a comment, please click here(Insider Story)

Coders and librarians team up to save scientific data

On a windy, snowy night in Dover, N.H., about 15 people gathered in an old converted mill, staring at computer screens and furiously tapping at their keyboards.The group – some students, some programmers, and at least one part-time dishwasher and data entry clerk – were braving the snowstorm and volunteering their time to try to keep scientific data from being lost.It was one of dozens of data rescue events spread out in cities from Toronto to Los Angeles, and Houston to Chicago. These events, many on university campuses, have been going on since December, bringing together software programmers, librarians and other volunteers who are trying to safely archive scientific data from government websites.To read this article in full or to leave a comment, please click here

How much is a bug worth?

1Password recently raised its top bug bounty reward from $25,000 to $100,000. They increased the amount to further incentivize researchers, according to its blog. Separately Google paid out $3 million last year for its vulnerability reward program.But how are these figures determined?David Baker, vice president of operations at Bugcrowd, believes these big bounties demonstrate that organizations are really starting to think about the market and where the market is pricing vulnerabilities.To read this article in full or to leave a comment, please click here

How much is a bug worth?

1Password recently raised its top bug bounty reward from $25,000 to $100,000. They increased the amount to further incentivize researchers, according to its blog. Separately Google paid out $3 million last year for its vulnerability reward program.But how are these figures determined?David Baker, vice president of operations at Bugcrowd, believes these big bounties demonstrate that organizations are really starting to think about the market and where the market is pricing vulnerabilities.To read this article in full or to leave a comment, please click here

6 of the most effective social engineering techniques

Social engineering is the strongest method of attack against the enterprise’s weakest vulnerability, its people. Criminal hackers recognize this fact. In 2015, social engineering became the No. 1 method of attack, according to Proofpoint’s 2016 Human Factor Report.These successful social engineering methods often use phishing and malware. But deceptive information assailants have more tools and approaches to draw on than these.That’s why CSO covers six of the most effective social engineering techniques that attackers use both on and off the internet, providing insights into how each one works, what it accomplishes, and the technologies, methods, and policies for detecting and responding to social saboteurs and keeping them at bay.To read this article in full or to leave a comment, please click here(Insider Story)

6 of the most effective social engineering techniques

Social engineering is the strongest method of attack against the enterprise’s weakest vulnerability, its people. Criminal hackers recognize this fact. In 2015, social engineering became the No. 1 method of attack, according to Proofpoint’s 2016 Human Factor Report.To read this article in full or to leave a comment, please click here(Insider Story)

How Google research can make the internet faster

Raise your hand if you think webpage load times are great -- not too slow at all.No one? Well, Google may have just made big strides to increase load time for websites, while not compromising anything in the process. So how did the tech giant do that?In IT Blogwatch, we hit refresh. So what is going on? DL Cabe gives us some background:Google...released a brand new, open-source JPEG encoder called Guetzli that can do two...neat things...it can decrease JPEG file size by 35% without a noticeable decrease in quality, and...it can increase the quality of an image without increasing file size at all. But what does that mean, exactly? Rafael Fariñas explains:To read this article in full or to leave a comment, please click here

How Google research can make the internet faster

Raise your hand if you think webpage load times are great -- not too slow at all.No one? Well, Google may have just made big strides to increase load time for websites, while not compromising anything in the process. So how did the tech giant do that?In IT Blogwatch, we hit refresh. So what is going on? DL Cabe gives us some background:Google...released a brand new, open-source JPEG encoder called Guetzli that can do two...neat things...it can decrease JPEG file size by 35% without a noticeable decrease in quality, and...it can increase the quality of an image without increasing file size at all. But what does that mean, exactly? Rafael Fariñas explains:To read this article in full or to leave a comment, please click here

NFS For Network Engineers

Without beating the ‘old drum’ without reason, sometimes you have to ask does the drum still need beating. Quick 5 minute articles like this one are always worth asking that question. As system administrators make the journey to SREs or ‘Site Reliability Engineers’, network engineers are also on the same trajectory. We might start from an expected Liam Neeson story point (I have some very specific skills etc), but it’s time to become a better Dad and just stop letting them take your daughter. Sometimes we just need to understand why it’s good to understand certain technology and in this case dream boat (I watched ‘The Accountant’ night, what an excellent film), NFS provides us with the ability to write and test code on remote machines for automation use cases. Sure, it’s just a network based file share, but the power of what it allows us to do is far more interesting.

Needless to say, on the same theme as the last blog post, this is another one that is anchored around StackStorm. With our trusty platform, when we create components for a pack like a actions and sensors, it’s important to have access to an IDE or set of Continue reading

The future of networking: It’s in a white box

Whether it’s food, beverages or automobiles, I want options and don’t want to be told what to do. I feel the same way about networking equipment. I’ve resented the fact that select vendors have had too much control in dictating choices over the years. I don’t think users should be told what, when and how they should buy, deploy and upgrade their network equipment. Luckily, those days are numbered thanks in part to the good work of the Open Compute Project, whose mission is to design and enable the delivery of the most efficient server, storage and data center hardware designs for scalable computing. To read this article in full or to leave a comment, please click here

The future of networking: It’s in a white box

Whether it’s food, beverages or automobiles, I want options and don’t want to be told what to do. I feel the same way about networking equipment. I’ve resented the fact that select vendors have had too much control in dictating choices over the years. I don’t think users should be told what, when and how they should buy, deploy and upgrade their network equipment. Luckily, those days are numbered thanks in part to the good work of the Open Compute Project, whose mission is to design and enable the delivery of the most efficient server, storage and data center hardware designs for scalable computing. To read this article in full or to leave a comment, please click here