Save 30% on Bowers & Wilkins P5 Mobile Headphones By Going Recertified – Deal Alert

In leading recording studios around the world, music that will soon be heard everywhere is first heard through Bowers & Wilkins loudspeakers. With these P5 mobile hi-fi headphones, the sound you hear is completely natural – as close to the sound of the original recording as they can possibly take you. There are no gimmicky effects like exaggerated bass or artificially enhanced treble, which become tiring with extended listening. A closed-back design with rigid metal faceplates and sealed earpads ensures that all the detail and dynamic range of your music is kept intact, while preserving just enough ambient sound to give you a sense of place. Perfect for listening to music on the go, P5's high-quality sound and luxury materials are supported by smart design and user-friendly features. The P5s average 4 out of 5 stars from over 280 people on Amazon (read reviews). Their typical list price is $241.53, but if you buy them recertified you save 30% and get them for just $167.99. B&W recertified products have been tested and updated to ensure they meet Bowers & Wilkins high quality standards, and all recertified products come with a two-year warranty. See the recertified P5s now on Continue reading

Down the rabbit hole, part 2: To ensure security and privacy, open source is required

I am currently embarking on a quest to make my entire life as private and secure as possible—while still having a good time and enjoying the fruits of the modern world. In this article, I won’t go into why I am doing this. For that, see my article introducing this endeavor.What I’d like to talk about right now are some pretty high-level things—laying out the ground rules, if you will, for what I’m trying to accomplish.First, let me start by saying none of this is about open source or free software. Licensing of software, while extremely important, is not the focus here. This is about privacy and security and absolutely nothing else.To read this article in full or to leave a comment, please click here

Down the rabbit hole, part 2: To ensure security and privacy, open source is required

I am currently embarking on a quest to make my entire life as private and secure as possible—while still having a good time and enjoying the fruits of the modern world. In this article, I won’t go into why I am doing this. For that, see my article introducing this endeavor.What I’d like to talk about right now are some pretty high-level things—laying out the ground rules, if you will, for what I’m trying to accomplish.First, let me start by saying none of this is about open source or free software. Licensing of software, while extremely important, is not the focus here. This is about privacy and security and absolutely nothing else.To read this article in full or to leave a comment, please click here

Creepy clowns cause sheriff to consult with FBI and Homeland Security

If you are going to be dressing up in a costume for Halloween, you might want to avoid dressing like a creepy clown, considering the sinister clown hysteria sweeping the nation. You don’t want to wear a clown costume in Kentucky where a sheriff contacted the FBI and Homeland Security over the “creepy clown” threat. In fact, in Gallatin County, Kentucky, the sheriff warned that people behind “clown threats” might face charges of “inducing panic and terroristic threatening.”Pennywise from Stephen King’s It really ruined clowns for a lot of people, changing their opinion of clowns from funny or cute to scary and creepy as can be. When the evil clown craze first started cranking up, some people suggested the clown sightings were pranks tied to some sort of promotion for the upcoming film It. Others suggested the clown sightings were inspired by Rob Zombie’s film 31, which includes kidnapped hostages trying to survive a violent game against a gang of sadistic clowns.To read this article in full or to leave a comment, please click here

Creepy clowns cause sheriff to consult with FBI and Homeland Security

If you are going to be dressing up in a costume for Halloween, then you might want to avoid dressing like a creepy clown, considering the sinister clown hysteria sweeping the nation. You don’t want to wear a clown costume in Kentucky where a sheriff contacted the FBI and Homeland Security over the “creepy clown” threat. In fact, in Gallatin County, Kentucky, the sheriff warned that people behind “clown threats” might face charges of “inducing panic and terroristic threatening.”Pennywise from Stephen King’s It really ruined clowns for a lot of people, changing their opinion of clowns from funny or cute to scary and creepy as can be. When the evil clown craze first started cranking up, some people suggested the clown sightings were pranks tied to some sort of promotion for the upcoming film It. Others suggested the clown sightings were inspired by Rob Zombie’s film 31, which includes kidnapped hostages trying to survive a violent game against a gang of sadistic clowns.To read this article in full or to leave a comment, please click here

BlackBerry stops making hardware, but BlackBerry phones live on

BlackBerry is getting out of the hardware business, but this isn’t the end of BlackBerry phones—or at least not yet.As part of its quarterly earnings report on Tuesday, the company announced that it would soon end all hardware development. Instead, BlackBerry phone production and design will be outsourced to third parties.“We are focusing on software development, including security and applications. The company plans to end all internal hardware development and will outsource that function to partners,” BlackBerry CEO John Chen said in a written statement.To read this article in full or to leave a comment, please click here

How UPS delivers predictive analytics

UPS operates in more than 220 countries and territories with more than 1,800 facilities, with a delivery fleet of over 100,000 ground vehicles and over 500 aircraft (both owned and charter). So when the company’s vice president of IT Kim Felix talks about the challenge of building a business intelligence system to manage UPS’s transportation network, you can imagine the size and scale of data she’s dealing with — 8,700 events per second, every second of the day, Felix says.To read this article in full or to leave a comment, please click here(Insider Story)

Customers have a love/hate relationship with IT outsourcing providers

HPE Outsourcing once again garnered the highest Net Promoter (NPS) score among IT service providers according to a 2016 analysis of NPS scores among corporate technology vendors recently published by the Temkin Group. However, its merger with CSC could shakes its customer experience standing.A company’s NPS is considered a measure of customer loyalty and has been proven by some to be a leading indicator of corporate growth. Customers are asked to rank the likelihood they would recommend a brand to a friend or colleague on a scale of 1-10. Those who answer 9 or 10 are considered promoters: loyal enthusiasts who will keep buying and refer others the company, thereby fueling growth. Respondents who answer 7 or 8 are considered passive customers: satisfied, but unenthusiastic and vulnerable to competitive offerings. Those who answer between 0 and 6 are detractors: unhappy customers who can damage a brand and impede growth with their negative word of mouth.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Matching IT priorities with IT realities

Fall is back-to-school time, though for those of us who aren’t going back to school, it’s a really good time to reassess 2016 priorities and budgets to see what projects can get done by the end of the year. It’s good to take stock to see what’s been accomplished this year, and see what priorities should take precedence before the new year (and a new budget) approaches.At the beginning of 2016, some CIO priorities for the year included standardization, integration, faster service delivery, more innovation and better IT and business alignment. No problem, right? Right—unless you’re actually working, day to day, to keep networks and apps up and running for users. That makes it a lot harder to achieve those lofty goals.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Matching IT priorities with IT realities

Fall is back-to-school time, though for those of us who aren’t going back to school, it’s a really good time to reassess 2016 priorities and budgets to see what projects can get done by the end of the year. It’s good to take stock to see what’s been accomplished this year, and see what priorities should take precedence before the new year (and a new budget) approaches.At the beginning of 2016, some CIO priorities for the year included standardization, integration, faster service delivery, more innovation and better IT and business alignment. No problem, right? Right—unless you’re actually working, day to day, to keep networks and apps up and running for users. That makes it a lot harder to achieve those lofty goals.To read this article in full or to leave a comment, please click here

Temporary Time Out

Hi folks, the Captain is taking a few weeks off as he has a brand new instance being spun up this week, if you catch my drift… ? You know, the kind of instance that takes 9 months to boot… I expect to be back at the keyboard by the end of October, but don’t be alarmed if you don’t see much in the way of posts, demos, or tweets. It’s all good.

The post Temporary Time Out appeared first on Captain KVM.

Beware: Attribution & Politics

tl;dr - Digital location data can be inherently wrong and it can be spoofed. Blindly assuming that it is accurate can make an ass out of you on twitter and when regulating drones.    

Guest contributor and friend of Errata Security Elizabeth Wharton (@LawyerLiz) is an attorney and host of the technology-focused weekly radio show "Buzz Off with Lawyer Liz" on America's Web Radio (listen live  each Wednesday, 2-3:00pm eastern; find  prior podcasts here or via iTunes - Lawyer Liz) This post is merely her musings and not legal advice.

Filtering through various campaign and debate analysis on social media, a tweet caught my eye. The message itself was not the concern and the underlying image has since been determined to be fake.  Rather, I was stopped by the140 character tweet's absolute certainty that internet user location data is infallible.  The author presented a data map as proof without question, caveat, or other investigation.  Boom, mic drop - attribution!

According to the tweeting pundit, "Russian trollbots" are behind the #TrumpWon hashtag trending on Twitter.
The proof? The twitter post claims that the Trendsmap showed the initial hashtag tweets as originating from accounts located in Russia. Continue reading

Financial sector expands use of blockchain databases

Banks and financial markets are adopting blockchain distributed database software for their payments and lending services at a pace faster than once expected, according to a survey of 400 such businesses globally.Blockchain software is the basis of bitcoin, first developed in 2009, and acts as an automatic public ledger for transactions, primarily financial transactions.The survey, conducted by a research division of IBM, found that 15% of the banks and 14% of financial market institutions intend to implement full-scale, commercial blockchain-based services in 2017.To read this article in full or to leave a comment, please click here

5 ways to get more out of meetings

The modern workforce is growing resentful of meetings. In fact, a recent survey from Atlassian found that, on average, employees attend 62 meetings per month and at least half of those meetings are considered "time wasted." Of the respondents, 91 percent admitted they daydreamed during meetings, 39 percent owned up to falling asleep during a meeting and 45 percent said they felt overwhelmed by the sheer number of meetings they needed to attend.In fact, a whopping 96 percent said they often miss meetings all together, whether due to workload or overlapping meetings. And when employees do make it to meetings, 73 percent said they often did unrelated work during it.To read this article in full or to leave a comment, please click here

Elon Musk’s next great adventure: Colonizing Mars

You cannot say that Elon Musk doesn’t dream big. Today he outlined what would be his biggest aspiration ever – colonizing Mars.If you watched Musk, who is SpaceX Founder, CEO, and Lead Designer deliver the details today on his Mars colonizing mission to the International Astronautical Congress in Guadalajara, Mexico you may have been struck by the matter-of-fact way he delivered the details of what even he calls a very complex and dangerous mission.“I think the first trips to Mars are going to be really, very dangerous. The risk of fatality will be high. There is just no way around it," he said. "It would basically be, 'Are you prepared to die?' Then if that's ok, then you are a candidate for going."To read this article in full or to leave a comment, please click here