Google this week is expected to release Allo, an AI-powered app previewed in May at the Google I/O confab that's aimed at adding more pizzazz to text messaging.
Google said back then that it planned to release the app by the end of summer, and that would be this Wednesday, Sept. 21. Reliable mobile news blogger Evan Blass has tweeted "Hello, Allo (launches this week)," and Google watchers have been quick to rehash this.To read this article in full or to leave a comment, please click here
Cisco Systems has patched a vulnerability similar to one exploited by a cyberespionage group believed to be linked to the U.S. National Security Agency.The vulnerability affects networking devices running Cisco's IOS, IOS XE and IOS XR operating systems that process IKEv1 (Internet Key Exchange version 1) packets. When exploited, it allows remote unauthenticated attackers to extract contents from a device's memory, potentially leading to the exposure of sensitive and confidential information.IKE is a key exchange protocol used by several popular features including LAN-to-LAN VPN (Virtual Private Network), remote access VPN, Dynamic Multipoint VPN (DMVPN) and Group Domain of Interpretation (GDOI). It is likely to be enabled on many Cisco devices in enterprise environments.To read this article in full or to leave a comment, please click here
Cisco Systems has patched a vulnerability similar to one exploited by a cyberespionage group believed to be linked to the U.S. National Security Agency.The vulnerability affects networking devices running Cisco's IOS, IOS XE and IOS XR operating systems that process IKEv1 (Internet Key Exchange version 1) packets. When exploited, it allows remote unauthenticated attackers to extract contents from a device's memory, potentially leading to the exposure of sensitive and confidential information.IKE is a key exchange protocol used by several popular features including LAN-to-LAN VPN (Virtual Private Network), remote access VPN, Dynamic Multipoint VPN (DMVPN) and Group Domain of Interpretation (GDOI). It is likely to be enabled on many Cisco devices in enterprise environments.To read this article in full or to leave a comment, please click here
Cisco Systems has patched a vulnerability similar to one exploited by a cyberespionage group believed to be linked to the U.S. National Security Agency.The vulnerability affects networking devices running Cisco's IOS, IOS XE and IOS XR operating systems that process IKEv1 (Internet Key Exchange version 1) packets. When exploited, it allows remote unauthenticated attackers to extract contents from a device's memory, potentially leading to the exposure of sensitive and confidential information.IKE is a key exchange protocol used by several popular features including LAN-to-LAN VPN (Virtual Private Network), remote access VPN, Dynamic Multipoint VPN (DMVPN) and Group Domain of Interpretation (GDOI). It is likely to be enabled on many Cisco devices in enterprise environments.To read this article in full or to leave a comment, please click here
Echo Dot is a hands-free, voice-controlled device that uses Alexa to play & control music (either on its own, or through a connected speaker/receiver), control smart home devices, provide information, read the news, set alarms, and more. If you’re looking to buy them as gifts, or for different homes or rooms, Amazon will throw in a free one ($50 value) when you buy 5, or two free ones when you buy 10 (a $100 value). To take advantage of this limited time offer, select 6 or 12 in the quantity dropdown and add to your Shopping Cart. Enter promo code DOT6PACK or DOT12PACK at checkout where you will see the discount applied. The new Amazon Echo Dot comes in black, and now also white. See the new Amazon Echo Dot now on Amazon.To read this article in full or to leave a comment, please click here
Previous migration efforts are often so bad that the majority of IT pros drag their feet on doing another migration project, even if they need it. That's one of the results of a new study by a cloud migration specialist Vision Solutions.The migration survey -- see chart below -- was part of a larger study, the Vision Solutions' 8th Annual State of Resilience report.The problem, however, lies with many IT shops, according to Vision. They either lack expertise to do the job properly, don't plan well in advance, or both. Of the 935 professionals surveyed, 35 percent say that they lack the experience or the expertise to confidently perform a system migration.To read this article in full or to leave a comment, please click here
Project management involves the use of people, processes and methodologies to plan, initiate, execute, monitor and close activities. It is designed to meet an organization's project goals, and hopefully overall strategic objectives.
Change management, similar to project management, involves people, processes, and tools to effectively help organizations manage all the changes that occur, whether as a result of project initiatives, or other factors that might impact the business.
While project management and change management are two areas often work side-by-side -- and they should -- there are some similarities. However, these are different disciplines. Think about project management in the example of software development and implementation. A project manager works with a project team to plan, communicate and execute the actual development and implementation itself. A change manager will work with the same project management team to identify, communicate, and effectively manage all aspects relating to how any changes will ultimately impact all stakeholders.To read this article in full or to leave a comment, please click here
Trust, but verify, the old adage goes. But in a tight IT talent market, it seems hiring companies are doing a heck of a lot of the former and not enough of the latter. New research shows that organizations are trusting employees when they say they've attained certifications, but aren't investing the time or energy to verify whether or not those credentials have actually been earned."We'd heard this anecdotally, but to see it in the hard data was very concerning, and it made us cringe. The value in the certifications themselves isn't in question, but the lack of action by hiring managers and the fact that some candidates are fudging the truth makes everyone look bad. This has the potential to seriously impede the credibility of certifications to qualify and benchmark candidates," says Jason Hayman, market research manager at TEKSystems, which conducted the research.To read this article in full or to leave a comment, please click here
The days of Microsoft's System Center may be numbered. With the introduction of Windows 10, Microsoft has begun championing a different approach to systems management -- the same approach that Apple created for the iPad and iPhone, and Google later adopted for Android. Organizations adopting Windows 10 can take advantage of this new approach, allowing IT to manage all client devices -- Windows 10 PCs (as older Windows versions are retired), Macs, iOS devices, and Android devices -- from the same consoles, using the same policy-driven technology in what is called an omnidevice strategy.To read this article in full or to leave a comment, please click here(Insider Story)
It's what's inside that countsImage by Mike HomnickIt’s the day everybody dreads: You power up your PC and it sits dormant, failing to boot because your hard drive or SSD is dead. But after you stop cursing and reaching for your backups—you do create backups regularly, right?—you might as well make the best of things.To read this article in full or to leave a comment, please click here
For as long as there have been technology certifications, IT pros have debated their value. Some believe they're the key to a fatter paycheck, while others contend that they're often not worth the paper they're printed on. Others take the middle road and say they can be valuable in the right circumstances, but experience is king.To read this article in full or to leave a comment, please click here(Insider Story)
1. Let two become one—safelyImage by PexelsStephen Boyer, CTO and co-founder of BitSight, knows one of the biggest threats to your company's tech security: the possibility that it might buy another company. He points to a survey from West Monroe Partners that found that 40% of acquiring companies discovered a cybersecurity problem in an acquired company—after a deal went through. It probably shouldn't be surprising that, in a 2014 survey from Freshfields Bruckhaus Deringer, a staggering 78% of respondents said cybersecurity is not analyzed in-depth as part of due diligence in an acquisition.To read this article in full or to leave a comment, please click here
1. Let two become one—safelyImage by PexelsStephen Boyer, CTO and co-founder of BitSight, knows one of the biggest threats to your company's tech security: the possibility that it might buy another company. He points to a survey from West Monroe Partners that found that 40% of acquiring companies discovered a cybersecurity problem in an acquired company—after a deal went through. It probably shouldn't be surprising that, in a 2014 survey from Freshfields Bruckhaus Deringer, a staggering 78% of respondents said cybersecurity is not analyzed in-depth as part of due diligence in an acquisition.To read this article in full or to leave a comment, please click here
iOS’s Settings app is the quiet MVP of Apple’s mobile operating system: It’s the place you go to when you need to get something done, and get it done your way. So whenever you update iOS on your iPhone or iPad, it pays to peruse the settings to find, enable, and configure any new features just to your liking. The biggies for iOS 10? Maps, with its plethora of new features, and Siri, since she now supports third-party app integration.Here’s a rundown of the major changes in Settings in iOS 10, as well as some key settings that didn’t change, but you still might want to revisit. If you’ve got any questions, hit us up in the comments. To read this article in full or to leave a comment, please click here
Well, it's 2016, and a few years ago Gartner reported that "By 2016, poor return on equity will drive more than 60 percent of banks worldwide to process the majority of their transactions in the cloud."Enterprises across all sectors are either in the cloud, transitioning to the cloud, or thinking about making the idea of cloud a reality. For those who are preparing to make the move, there are a variety of concerns to consider and plan for in order to make for a smooth transition. In addition to deciding on the right cloud provider and whether to go with a private or a public cloud, CISOs also need to think about implementing solutions for controls on access, encryption, legal and compliance issues.To read this article in full or to leave a comment, please click here
Well, it's 2016, and a few years ago Gartner reported that "By 2016, poor return on equity will drive more than 60 percent of banks worldwide to process the majority of their transactions in the cloud."Enterprises across all sectors are either in the cloud, transitioning to the cloud, or thinking about making the idea of cloud a reality. For those who are preparing to make the move, there are a variety of concerns to consider and plan for in order to make for a smooth transition. In addition to deciding on the right cloud provider and whether to go with a private or a public cloud, CISOs also need to think about implementing solutions for controls on access, encryption, legal and compliance issues.To read this article in full or to leave a comment, please click here
Between the new AirPods and stereo speakers, audio was one of the biggest stories with the new Apple iPhone 7 and 7 Plus. But it was hissing sounds reportedly coming from the new phones when their A10 Fusion CPU is under heavy load that were grabbing headlines over the weekend.Apple hasn't formally addressed the reported hissing sounds yet, though has responded to customer complaints, which have started popping up online since the smartphone became available on Friday. Twitter
Supposedly you do have to put the phones right up to your ear to really hear the hissing sound, but nevertheless, the noise is worrisome for those who just plunked down hundreds for the device.To read this article in full or to leave a comment, please click here
SAP has made no secret of the fact that its bets for the future rest largely on its Hana in-memory computing platform. But broad adoption is a critical part of making those bets pay off.Aiming to make Hana more accessible to companies of all shapes and sizes, the enterprise software giant on Monday unveiled a downloadable "express" edition that developers can use for free.The new express edition of SAP Hana can be used free of charge on a laptop or PC to develop, test and deploy production applications that use up to 32 GB of memory; users who need more memory can upgrade for a fee. Either way, the software delivers database, application and advanced analytics services, allowing developers to build applications that use Hana's transactional and analytical processing against a single copy of data, whether structured or unstructured.To read this article in full or to leave a comment, please click here
New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.ContempoKey features: Contempo is a real-time political news app: swipe left for “the left” and right for “the right.” Integration with Rock the Vote provides an opportunity to register to vote, check registration status. More info.To read this article in full or to leave a comment, please click here
New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.ContempoKey features: Contempo is a real-time political news app: swipe left for “the left” and right for “the right.” Integration with Rock the Vote provides an opportunity to register to vote, check registration status. More info.To read this article in full or to leave a comment, please click here