That’s just wrong: Accusing granny of pirating zombie game

Releasing 60 million genetically modified mosquitoes a week sounds just wrong, but in theory the mutant mosquitoes will mate with normal mosquitos so the offspring will have a genetic flaw that causes them to die quickly. There is no mention of whether or not the millions of mutant mosquitoes to be released weekly will feed on the people of Brazil. If that’s not just wrong, then the three examples below surely are.Saddam Hussein…really Apple?Apple refused to issue a male customer a refund for an iPhone 7 unless he could prove he was not Saddam Hussein – you know, the Iraqi dictator executed by hanging in 2006 – basically a decade ago. Apparently, someone working for Apple was unaware of that fact.To read this article in full or to leave a comment, please click here

That’s just wrong: Accusing granny of pirating zombie game

Releasing 60 million genetically modified mosquitoes a week sounds just wrong, but in theory the mutant mosquitoes will mate with normal mosquitos so the offspring will have a genetic flaw that causes them to die quickly. There is no mention of whether or not the millions of mutant mosquitoes to be released weekly will feed on the people of Brazil. If that’s not just wrong, then the three examples below surely are.Saddam Hussein…really Apple?Apple refused to issue a male customer a refund for an iPhone 7 unless he could prove he was not Saddam Hussein – you know, the Iraqi dictator executed by hanging in 2006 – basically a decade ago. Apparently, someone working for Apple was unaware of that fact.To read this article in full or to leave a comment, please click here

Ansible 2.2 Network Updates

Ansible for Network Automation

The Slack channel question seemed so innocuous at the time, “I was reviewing through the Ansible 2.2 commits related to networking. Is there a summary of the networking items that are new in 2.2?”

In a rather quick response, my first answer seemed so obvious, “Not really, mostly simplifying code, merging template with config modules and some new platforms."

As the conversation continued though, reality came crashing down with the realization that the sprint from Ansible 2.1 to Ansible 2.2 for networking modules was substantially more than a few tweaks and added platforms.

Before getting into what’s new and what’s changed, let's review the overall state of network integration with Ansible. We started this journey just about a year ago announcing that Ansible would start supporting direct integration with network devices. At the time, this was a fairly big departure from the more traditional roots where Ansible has focused on in the systems and application development worlds. There always seemed to be a natural fit between Ansible’s agentless, SSH-based architecture’s ability to adapt to automating traditional network device configurations. It didn’t take long for the initial integration of network modules to start achieving greater adoption.

In just three releases (counting Continue reading

30% off Anker Phone Camera Lens Kit With Fisheye, 0.65x Wide Angle, 10x Macro – Deal Alert

This multi-functional camera lens kit works on most standard sized smartphones including the iPhone 7 (excluding Plus), and brings even more life to your photos with 180-degree fisheye, 0.65x wide angle and 10x macro lenses. It currently averages 4 out of 5 stars on Amazon, and its list price of $20 has been reduced 30% to just $14. See the lens kit now on Amazon.To read this article in full or to leave a comment, please click here

UK government to spend $2.3 billion to bolster cybersecurity

The U.K. government will spend £1.9 billion (US $2.3 billion) over the next five years to pump up its cybersecurity defenses and pay for new research, Chancellor of the Exchequer Philip Hammond said. The goal of the spending, part of a new national cybersecurity strategy, is to make the U.K. one of the "safest places in the world to do business," with a world-class cybersecurity industry and workforce, Hammond said Tuesday.To read this article in full or to leave a comment, please click here

UK government to spend $2.3 billion to bolster cybersecurity

The U.K. government will spend £1.9 billion (US $2.3 billion) over the next five years to pump up its cybersecurity defenses and pay for new research, Chancellor of the Exchequer Philip Hammond said. The goal of the spending, part of a new national cybersecurity strategy, is to make the U.K. one of the "safest places in the world to do business," with a world-class cybersecurity industry and workforce, Hammond said Tuesday.To read this article in full or to leave a comment, please click here

Up To 36% off Various Amazon Kindle Models, Discounted until 11/3 – Deal Alert

Amazon has quietly released another good set of deals on its popular Kindle series of e-readers. For a limited time, Kindle's price sinks from $80 to $60, Kindle Paperwhite from $120 down to $100, the Kindle Voyage drops from $200 to just $180, and the worry-free Kindle for Kids Bundle is reduced from $125 to just $80. The Kindle discounts are being offered for a limited time, so if you're in the market for one, you may want to consider the deal.To read this article in full or to leave a comment, please click here

Up To 36% off Various Amazon Kindle Models, Limited Time Discount – Deal Alert

Amazon has quietly released another good set of deals on its popular Kindle series of e-readers. For a limited time, Kindle's price sinks from $80 to $60, Kindle Paperwhite from $120 down to $100, the Kindle Voyage drops from $200 to just $180, and the worry-free Kindle for Kids Bundle is reduced from $125 to just $80. The Kindle discounts are being offered for a limited time, so if you're in the market for one, you may want to consider the deal.To read this article in full or to leave a comment, please click here

Google to untrust WoSign and StartCom certificates

Following similar decisions by Mozilla and Apple, Google plans to reject new  digital certificates issued by two certificate authorities because they violated industry rules and best practices.The ban will go into effect in Chrome version 56, which is currently in the dev release channel, and will apply to all certificates issued by certificate authorities WoSign and StartCom after October 21. Browsers rely on digital certificates to verify the identity of websites and to establish encrypted connections with them.Certificates issued before October 21 will continue to be trusted as long as they're published to the public Certificate Transparency logs or have been issued to a limited set of domains owned by known WoSign and StartCom customers.To read this article in full or to leave a comment, please click here

Google to untrust WoSign and StartCom certificates

Following similar decisions by Mozilla and Apple, Google plans to reject new  digital certificates issued by two certificate authorities because they violated industry rules and best practices.The ban will go into effect in Chrome version 56, which is currently in the dev release channel, and will apply to all certificates issued by certificate authorities WoSign and StartCom after October 21. Browsers rely on digital certificates to verify the identity of websites and to establish encrypted connections with them.Certificates issued before October 21 will continue to be trusted as long as they're published to the public Certificate Transparency logs or have been issued to a limited set of domains owned by known WoSign and StartCom customers.To read this article in full or to leave a comment, please click here

Microsoft seems ready to give up on Windows phones, if not Windows 10 Mobile

The future of Windows phones...might not be phones? Rumors and hopes for a category-defining Surface phone were not satisfied at Microsoft's press event last Wednesday. The company didn’t even mention Windows 10 Mobile. With the collective market share of Windows phones stagnant at about 1 percent, customers and partners have to wonder why anyone should bother investing in Microsoft’s mobile strategy.    In an interview with ZDnet’s Mary Jo Foley, Microsoft executive vice president of Windows and Devices Terry Myerson was asked just that. But instead of committing wholeheartedly to Windows phones—or declaring that product line dead—Myerson tried a different tack: obscurity.To read this article in full or to leave a comment, please click here

6 big ideas in digital transformation

If you're ready to kick-start your organization's efforts to embrace digital technologies, this editor-curated selection of Computerworld in-depth stories is the place to start. We identified some of our most targeted content on IT-led digital projects, chock-full of fresh ideas for making your organization more digitally competent. You'll read how savvy organizations in industries across the spectrum got serious about using digital technologies to gain a competitive edge, connect better with customers and improve efficiency.What's Inside: Stories from Top Organizations Transformation That's All About the Customer Part business process redesign, part agile development, the new re-engineering is endless — just like customer demands. Smart companies are learning to please customers one at a time, all of the time. Read how the CIO at Valdosta University, for example, turned IT's focus to the school's students, upgrading the campus wireless network, redesigning and repurposing some of its computer labs, and offering after-hours support service staffed by IT.To read this article in full or to leave a comment, please click here

10 ways to make sure your remote workers are being safe

SafeguardsImage by PexelsWith an ever-expanding mobile workforce, infosec teams are increasingly tasked with extending cybersecurity safeguards beyond the physical and virtual walls of their organizations. With endpoints not only increasing but on the move, the challenge is real. In addition to implementing the appropriate technical defenses, there is an important aspect to protecting corporate data and systems: Asking end users to get involved.To read this article in full or to leave a comment, please click here

10 ways to make sure your remote workers are being safe

SafeguardsImage by PexelsWith an ever-expanding mobile workforce, infosec teams are increasingly tasked with extending cybersecurity safeguards beyond the physical and virtual walls of their organizations. With endpoints not only increasing but on the move, the challenge is real. In addition to implementing the appropriate technical defenses, there is an important aspect to protecting corporate data and systems: Asking end users to get involved.To read this article in full or to leave a comment, please click here

IT Resume Makeover: Highlighting business and technology leadership

Not everyone has a typical career trajectory where titles, skills and promotions all line up into a neat, concise story. That was the case with Keith Evans. He held varying CIO roles with the same company and had skills that set him apart from other CIOs, which caused some confusion and resulted in a dense resume. Laura Smith-Proulx, career and resume expert, knew that the goal with re-writing Evan's resume was to organize the existing information to build a clear picture of his extensive skills and experience as a CIO.To read this article in full or to leave a comment, please click here(Insider Story)

Mainstreaming Machine Learning: Emerging Solutions

In the course of this three-part series on the challenges and opportunities for enterprise machine learning, we have worked to define the landscape and ecosystem for these workloads in large-scale business settings and have taken an in-depth look at some of the roadblocks on the path to more mainstream machine learning applications.

In this final part of the series, we will turn from pointing to the problems and look at the ways the barriers can be removed, both in terms of leveraging the technology ecosystem around machine learning and addressing more difficult problems, most notably, how to implement the human

Mainstreaming Machine Learning: Emerging Solutions was written by Nicole Hemsoth at The Next Platform.