DARPA developing secure data sharing wireless technology

The researchers at the Defense Advanced Research Projects Agency will later this month discuss a new software system that would let multiple levels of classified data traverse current commercial and military wireless networks while preserving the security of sensitive information. +More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2016+ The agency’s Secure Handhelds on Assured Resilient networks at the tactical Edge (SHARE) program will “secure tactical mobile handheld devices to support distributed multilevel information sharing without the need for reaching back to large-scale fixed infrastructure, create new networks based on resilient and secure architectures that work in challenging environments, and develop software that rapidly configures security across the network,” DARPA says.To read this article in full or to leave a comment, please click here

DARPA developing secure data sharing wireless technology

The researchers at the Defense Advanced Research Projects Agency will later this month discuss a new software system that would let multiple levels of classified data traverse current commercial and military wireless networks while preserving the security of sensitive information. +More on Network World: The weirdest, wackiest and coolest sci/tech stories of 2016+ The agency’s Secure Handhelds on Assured Resilient networks at the tactical Edge (SHARE) program will “secure tactical mobile handheld devices to support distributed multilevel information sharing without the need for reaching back to large-scale fixed infrastructure, create new networks based on resilient and secure architectures that work in challenging environments, and develop software that rapidly configures security across the network,” DARPA says.To read this article in full or to leave a comment, please click here

Should software developers have a code of ethics?

First, do no harm. This is the underlying message of the Hippocratic Oath historically taken by physicians to show they will abide by an ethical code of conduct. Plumbers, construction workers, law enforcement -- almost any professional whose work impacts the public must abide by some sort of ethical code of conduct.There's one fairly notable exception: technology. While there are organization-- and company-specific codes of conduct -- like these guidelines from the Association for Computing Machinery (ACM) and the Institute of Electrical and Electronics Engineers - Computer Science (IEEE-CS) joint task force on software engineering ethics professional practices, there's no one all-encompassing set of standards that includes the entire industry.To read this article in full or to leave a comment, please click here

Review: DigitalOcean keeps the cloud simple

The cloud is a big place, and it’s getting bigger as everyone moves more and more computation out of their server rooms into the large datacenters. Amazon is the dominant force in the cloud, but it is far from the only choice. When the market grows this big, niches can develop. DigitalOcean is a company that has found a fertile niche by branding itself as the developer’s choice.To read this article in full or to leave a comment, please click here(Insider Story)

Fix Windows 10 problems with these free Microsoft tools

To Microsoft’s credit, Windows 10 is more stable than previous versions of Windows. As with any operating system, however, things can still go wrong. Fortunately, Microsoft offers several tools that can be used to correct the most common problems: Some are built right into Windows 10, and others you download from the Microsoft site. Here’s a walk-thru explaining when you might need each tool, and how to use it.To read this article in full or to leave a comment, please click here(Insider Story)

Microsoft makes minor concessions on Windows 10 data collection

Microsoft on Tuesday promised that it will dial back diagnostic data collection from Windows 10 devices when users select the "Basic" setting for the controversial harvesting."We've further reduced the data collected at the Basic level," said Terry Myerson, Microsoft's top Windows executive, in a post to a company blog. Myerson did not elaborate on what was to be struck from Basic, the lowest level of diagnostic data collection offered to those running Windows 10 Home or Windows 10 Pro.[To comment on this story, please visit Computerworld's Facebook page.]To read this article in full or to leave a comment, please click here

13% off Keurig K475 Single Serve K- Cup Pod Coffee Maker – Deal Alert

Keurig K475 brews a rich, smooth, and delicious cup every time with the quality you expect from Keurig. With a strength control setting for a bolder brew, five temperature settings, and multiple K-Cup, K-Mug, and K-Carafe pod brew sizes, you can customize your settings to get your perfect cup. The Keurig K475 is currently listed at just $93.49, it best price to date, and you'll only get this price when you add it to your cart. See it now on Amazon.To read this article in full or to leave a comment, please click here

How White Hat hackers do bad things for good reasons

Imagine you are the receptionist at the front desk of a bank around Valentine’s Day. There are countless bouquets of flowers and boxes of chocolate being dropped off for delivery to employees. You just set them aside and alert the employee upon arrival.But what about that one box with no name on it that just says “To my love.” Taped to the box is a DVD. The delivery person says he doesn’t know who it is for, he tells the receptionist that he just delivers the packages. The receptionist wants the romantic package to make it to the intended target, so she puts the DVD into her computer in hopes it can give her a clue.A video animation pops up on her screen of a bunny saying “I love you.” However behind the scenes an executable is placed on the computer. And now the criminal is inside the company’s network.To read this article in full or to leave a comment, please click here(Insider Story)

How White Hat hackers do bad things for good reasons

Imagine you are the receptionist at the front desk of a bank around Valentine’s Day. There are countless bouquets of flowers and boxes of chocolate being dropped off for delivery to employees. You just set them aside and alert the employee upon arrival.He said organizations that have been targeted by well-funded Nation States never stand much of a chance. “Knowing your most likely adversaries is very important and designing a penetration test to simulate the majority of your adversaries would be key to a successful comparison.”To read this article in full or to leave a comment, please click here(Insider Story)

8 tech dangers every novice can avoid with these tips

Tech novices need our help. They tend to run into the same pitfalls, and some of them make the same mistakes over and over. A novice friend may have cost you hours of informal tech support. Here's something you can show them before that next desperate phone call. To the novices out there: Get smarter by reading this.To read this article in full or to leave a comment, please click here(Insider Story)

IBM Watson, FDA to explore blockchain for secure patient data exchange

IBM's Watson Health artificial intelligence unit has signed a two-year joint-development agreement with the U.S. Food and Drug Administration (FDA) to explore using blockchain technology to securely share patient data for medical research and other purposes.IBM Watson Health and the FDA will explore the exchange of patient-level data from several sources, including electronic medical records (EMRs), clinical trials, genomic data, and health data from mobile devices, wearables and the "Internet of Things." The initial focus will be on oncology-related information."The healthcare industry is undergoing significant changes due to the vast amounts of disparate data being generated. Blockchain technology provides a highly secure, decentralized framework for data sharing that will accelerate innovation throughout the industry," IBM Watson Health Chief Science Officer Shahram Ebadollahi said in a statement.To read this article in full or to leave a comment, please click here

IBM Watson, FDA to explore blockchain for secure patient data exchange

IBM's Watson Health artificial intelligence unit has signed a two-year joint-development agreement with the U.S. Food and Drug Administration (FDA) to explore using blockchain technology to securely share patient data for medical research and other purposes.IBM Watson Health and the FDA will explore the exchange of patient-level data from several sources, including electronic medical records (EMRs), clinical trials, genomic data, and health data from mobile devices, wearables and the "Internet of Things." The initial focus will be on oncology-related information."The healthcare industry is undergoing significant changes due to the vast amounts of disparate data being generated. Blockchain technology provides a highly secure, decentralized framework for data sharing that will accelerate innovation throughout the industry," IBM Watson Health Chief Science Officer Shahram Ebadollahi said in a statement.To read this article in full or to leave a comment, please click here

The best (and worst) features of 5 leading ALM suites

Application lifecycle management (ALM) suites allow corporate IT managers to supervise in-house software projects from cradle to grave — closely tracking every development in between. Five of the top ALM suites are CA Agile Central (formerly Rally ALM), JIRA, HP Enterprise ALM, HPE Agile Manager and Team Foundation Server (TFS), according to online reviews by enterprise users in the IT Central Station community.To read this article in full or to leave a comment, please click here(Insider Story)

As authentication options blossom, startup tries to simplify deployment, maintain flexibility

A startup with a strong pedigree is trying to address the problem that businesses have keeping up with the ever-increasing options for authentication.Transmit Security is shipping a server platform that off-loads the authentication chores that would otherwise reside within applications, making it simpler to roll out authentication in the first place and to upgrade it later without ever touching the applications themselves. Rakesh Loonkar Rakesh LoonkarTo read this article in full or to leave a comment, please click here

As authentication options blossom, startup tries to simplify deployment, maintain flexibility

A startup with a strong pedigree is trying to address the problem that businesses have keeping up with the ever-increasing options for authentication.Transmit Security is shipping a server platform that off-loads the authentication chores that would otherwise reside within applications, making it simpler to roll out authentication in the first place and to upgrade it later without ever touching the applications themselves. Rakesh Loonkar Rakesh LoonkarTo read this article in full or to leave a comment, please click here

Raspberry Pi roundup: Read all about it, in today’s Daily Prophet online

The Raspberry Pi roundup is back from its winter holidays, and boy, has it ever been nerding out. There’s nothing like being back at the old homestead to make you read well-loved old classics like the Harry Potter books.Appropriately, then, for the first Raspberry Pi roundup after the festive season, we’ve got a copy of the Daily Prophet that does what a wizarding newspaper is supposed to do, thanks to the technical wizardry of Piet Rullens. (And the always excellent Raspberry Pi Foundation blog for bringing it to our attention.) Rullens turned a trip to the Harry Potter theme park in Orlando into an attractively designed and authentic-looking Daily Prophet poster, thanks to a cunningly placed Raspberry Pi 3 and some skillful cutting. An IR distance sensor, when tripped, fires up the screen, which plays a clip of Rullens at the amusement park.To read this article in full or to leave a comment, please click here

No honor among thieves: Crooks seeking ransom for MongoDB data someone else stole

It took less than a week for criminals to drain virtually all publicly exposed MongoDB servers of their data, and now a second tier of opportunistic thieves is trying to walk off with the ransom.When attackers initially deleted the data, sometimes terabytes at a time, they left ransom notes demanding payments in bitcoin.+ ALSO ON NETWORK WORLD Be careful not to fall for these ransomware situations +To read this article in full or to leave a comment, please click here

No honor among thieves: Crooks seeking ransom for MongoDB data someone else stole

It took less than a week for criminals to drain virtually all publicly exposed MongoDB servers of their data, and now a second tier of opportunistic thieves is trying to walk off with the ransom.When attackers initially deleted the data, sometimes terabytes at a time, they left ransom notes demanding payments in bitcoin.+ ALSO ON NETWORK WORLD Be careful not to fall for these ransomware situations +To read this article in full or to leave a comment, please click here

The clumsy & shocking truth about computer-related injuries!

Some of the biggest names in tech have issued warnings over the past year about how their devices can overheat and catch on fire, but an analysis of emergency room data shows that most computer-related injuries stem from far less dramatic circumstances. We’re talking about computers falling on people’s heads or being dropped on their toes. More than two dozen injuries resulted from tripping, such as down the stairs while carrying a computer or by getting tangled on a laptop cord. Not so shocking: A handful of injuries related to pulling out plugs too hastily.To read this article in full or to leave a comment, please click here

9 painful ways people hurt themselves with computers/video games

Computers and videogames are a painImage by Networkworld/Stephen Sauer.More than 600 computer- and video game-related injuries suffered in 2015 were reported to the U.S. Consumer Product Safety Commission by about 100 hospital emergency rooms through the National Electronic Injury Surveillance System. NEISS is used to help spot possible issues with categories of products that are causing harm, though as you’ll see here, computer and video game users aren’t blameless. (With apologies to those who truly were injured…)To read this article in full or to leave a comment, please click here