DataRobot aims to help create data science executives

Data scientists are in short supply. But so too are managers that understand data science and machine learning enough to spot the opportunities for using these disciplines to optimize their businesses.McKinsey Global Institute has projected that by 2018, the U.S. alone will face a shortage of 1.5 million managers and analysts with the necessary analytics and data science expertise to fill demand.The business side of machine learning To combat this problem, Data science automation specialist DataRobot announced today that it has updated its DataRobot University curriculum with Data Science for Executives, a half-day offering that teaches executives interested in the benefits of advanced data science how to identify opportunities to optimize their business using machine learning.To read this article in full or to leave a comment, please click here

56% off Poweradd Pilot X7 20,000mAh Power Bank for Smartphones and Tablets – Deal Alert

This power bank from Poweradd delivers huge power. Its 20000mAh capacity means you can charge an iPhone 6 eight times, Samsung S6 over five times, or a a large capacity iPad Air 2 almost twice.  It will auto-detect the status of your device, to intelligently deliver power at the fastest possible speed with 2.1A max output. 900+ people rate this item 4.5 out of 5 stars on Amazon (read reviews), and its typical list price of $49.99 has been reduced a generous 56% to just $21.88.To read this article in full or to leave a comment, please click here

IDG Contributor Network: IoT is not about radios; it’s all about data

The initial challenge for the Internet of Things (IoT) was how to provide physical connectivity of small and often remote devices to the Internet. This issue has basically been solved with the plethora of wireless connectivity solutions. The real challenge for IoT is data organization, sharing and search on an unprecedented scale.Most discussions about IoT usually point out in passing that today’s machine data is concentrated in vertical, or isolated, data silos. However, they rarely explain why this is a problem. More important, they do not give a roadmap of how to solve this problem going forward. I will try to provide some insight on both points.To read this article in full or to leave a comment, please click here

Early iPhone 7 reviews: You’ll miss the headphone jack, but the camera and battery life are tops

The first batch of iPhone 7 and 7 Plus reviews are out after five days of hands-on time, and the early word is mostly positive. The camera in particular is a stand-out, and the two lenses on the 7 Plus produce results that easily stand up to the competition, the Samsung Galaxy S7.As expected, dealing with the lack of a headphone jack was perplexing to some and outright irritating for others. But the impressive cameras on both iPhones, plus the improved battery life and water resistance, make them easier to use on the go.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Smartphone tracking not completely evil, academics say

Surreptitious smartphone services quietly tracking us as we move around have gotten privacy fiends up in arms. However, academics reveal that location tracking is not all about finding ways to sell us stuff. Researchers and scientists are altruistically using the data, too.In one case, they're using mobile device-based mobility patterns to track exposure to pollution with more accuracy, another in metropolitan planning.+ Also on Network World: Wi-Fi-tracing delivers vast insights into behavioral patterns +To read this article in full or to leave a comment, please click here

Internet naming system not US property, says congressional watchdog

The U.S. Government Accountability Office has said that the internet domain name system is unlikely to be government property, ahead of the planned transfer by month end of the oversight of key technical functions supporting the internet, including the domain name system, to an independent multistakeholder body."It is unlikely that either the authoritative root zone file—the public 'address book' for the top level of the Internet domain name system—or the Internet domain name system as a whole" is U.S. government property, the GAO said in a legal opinion provided to legislators.The report by the Congressional watchdog comes ahead of a hearing on the issue Wednesday chaired by Republican Senator Ted Cruz from Texas. The Republicans are intent on blocking the transfer of the Internet Assigned Numbers Authority (IANA) functions, currently being operated by the Internet Corporation for Assigned Names and Numbers (ICANN) under a contract with the Department of Commerce, which expires on Sept. 30.To read this article in full or to leave a comment, please click here

Internet naming system not US property, says congressional watchdog

The U.S. Government Accountability Office has said that the internet domain name system is unlikely to be government property, ahead of the planned transfer by month end of the oversight of key technical functions supporting the internet, including the domain name system, to an independent multistakeholder body."It is unlikely that either the authoritative root zone file—the public 'address book' for the top level of the Internet domain name system—or the Internet domain name system as a whole" is U.S. government property, the GAO said in a legal opinion provided to legislators.The report by the Congressional watchdog comes ahead of a hearing on the issue Wednesday chaired by Republican Senator Ted Cruz from Texas. The Republicans are intent on blocking the transfer of the Internet Assigned Numbers Authority (IANA) functions, currently being operated by the Internet Corporation for Assigned Names and Numbers (ICANN) under a contract with the Department of Commerce, which expires on Sept. 30.To read this article in full or to leave a comment, please click here

The most secure home computer ever

We’ve all heard tales of foreign intelligence entities breaking into hotel rooms and cloning a person’s hard drive while he or she is in the bar downstairs.You might dismiss it as the stuff of urban legend or Jason Bourne movies, but this style of attack does highlight one of the most basic weaknesses of today’s PCs: Their data is extremely vulnerable once an attacker has physical access to a machine. Cold boot attacks, USB exploits,or DMA attacks over FireWire, among other breaches, are all possible if a bad actor can get his or her hands on the hardware.To read this article in full or to leave a comment, please click here

The most secure home computer ever

We’ve all heard tales of foreign intelligence entities breaking into hotel rooms and cloning a person’s hard drive while he or she is in the bar downstairs.You might dismiss it as the stuff of urban legend or Jason Bourne movies, but this style of attack does highlight one of the most basic weaknesses of today’s PCs: Their data is extremely vulnerable once an attacker has physical access to a machine. Cold boot attacks, USB exploits,or DMA attacks over FireWire, among other breaches, are all possible if a bad actor can get his or her hands on the hardware.To read this article in full or to leave a comment, please click here

Review: Ansible shows the beef

At a time when the configuration management market was dominated by Puppet and Chef, an open source project called Ansible emerged with a simpler approach to automating IT environments. An agentless system that was easy to learn, Ansible quickly earned a name for itself. Before long, the developers behind the project formed a company to offer commercial support. That company -- first known as AnsibleWorks, then Ansible -- was acquired by open source leader Red Hat in October 2015.Docker. Ansible offers modules for building and running Docker containers, orchestrating containers across a Swarm cluster, and managing Docker images. There are advantages to building Docker images from Ansible playbooks instead of Dockerfiles. When you build an image from a Dockerfile, the application or environment can only be deployed in a  Docker container. But when you build an image using Ansible playbooks, the environments can easily be replicated on any infrastructure -- bare metal, cloud instance, virtual machine, or Vagrant.To read this article in full or to leave a comment, please click here(Insider Story)

Review: Ansible shows the beef

At a time when the configuration management market was dominated by Puppet and Chef, an open source project called Ansible emerged with a simpler approach to automating IT environments. An agentless system that was easy to learn, Ansible quickly earned a name for itself. Before long, the developers behind the project formed a company to offer commercial support. That company -- first known as AnsibleWorks, then Ansible -- was acquired by open source leader Red Hat in October 2015.Docker. Ansible offers modules for building and running Docker containers, orchestrating containers across a Swarm cluster, and managing Docker images. There are advantages to building Docker images from Ansible playbooks instead of Dockerfiles. When you build an image from a Dockerfile, the application or environment can only be deployed in a  Docker container. But when you build an image using Ansible playbooks, the environments can easily be replicated on any infrastructure -- bare metal, cloud instance, virtual machine, or Vagrant.To read this article in full or to leave a comment, please click here(Insider Story)

Apple Pay coming to 200,000-plus websites, not just in-store or in-app

Apple Pay on websites launched on Tuesday with the release of iOS 10 for the iPhone and iPad -- and will hit Mac desktops when macOS Sierra launches next Tuesday.More than 200,000 websites -- including small and large retailers -- plan to support Apple Pay on their sites in coming weeks, Apple said Tuesday. Many of the sites include online retailers using e-commerce platforms run by Shopify, Demandware and IBM.The move means that online shoppers with iPhones, iPads and Macs updated with the latest operating systems can save time when finishing an online purchase through the Apple's Safari browser. Retailers that have signed up for the service are expected to see an uptick in the number of customers that finish a web purchase, instead of giving up because typing in credit information was considered too complicated, awkward or time-consuming.To read this article in full or to leave a comment, please click here

Apple Pay coming to 200,000-plus websites, not just in-store or in-app

Apple Pay on websites launched on Tuesday with the release of iOS 10 for the iPhone and iPad -- and will hit Mac desktops when macOS Sierra launches next Tuesday.More than 200,000 websites -- including small and large retailers -- plan to support Apple Pay on their sites in coming weeks, Apple said Tuesday. Many of the sites include online retailers using e-commerce platforms run by Shopify, Demandware and IBM.The move means that online shoppers with iPhones, iPads and Macs updated with the latest operating systems can save time when finishing an online purchase through the Apple's Safari browser. Retailers that have signed up for the service are expected to see an uptick in the number of customers that finish a web purchase, instead of giving up because typing in credit information was considered too complicated, awkward or time-consuming.To read this article in full or to leave a comment, please click here

10 free iMessage apps to supercharge your Messages in iOS 10

There's an iMessage app for that!With the launch of iOS 10, Apple has opened the floodgates by integrating third-party apps within its stock Messages app—and you can find them all within Apple’s dedicated iMessage App Store. Check out some of the best free ways to animate, coordinate, and add some flair your messages.To read this article in full or to leave a comment, please click here

Google offers $200K for top prize in new Android hack challenge

Google yesterday announced a six-month bug contest that will pay up to $200,000 for an Android "bug chain," one or more successful exploits of previously unknown vulnerabilities.Dubbed "Project Zero Prize," it differed from hacking contests that take place over one or two days: Researchers can submit entries from now until March 14, 2017. In that regard, Google's contest resembled the limited-time bug bounties that rival Microsoft has offered to focus on, among other areas and applications, in Windows 10's Edge browser.In the case of multi-exploit entries, Google also departed from the usual contest or bounty rules by encouraging researchers to submit each link in the bug chain as the flaws were uncovered, rather than wait until all were in place and exploitable.To read this article in full or to leave a comment, please click here

Google offers $200K for top prize in new Android hack challenge

Google yesterday announced a six-month bug contest that will pay up to $200,000 for an Android "bug chain," one or more successful exploits of previously unknown vulnerabilities.Dubbed "Project Zero Prize," it differed from hacking contests that take place over one or two days: Researchers can submit entries from now until March 14, 2017. In that regard, Google's contest resembled the limited-time bug bounties that rival Microsoft has offered to focus on, among other areas and applications, in Windows 10's Edge browser.In the case of multi-exploit entries, Google also departed from the usual contest or bounty rules by encouraging researchers to submit each link in the bug chain as the flaws were uncovered, rather than wait until all were in place and exploitable.To read this article in full or to leave a comment, please click here

Digital transformation boosts captive offshore center growth

Global in-house centers — wholly owned captive offshore operations that deliver offshore IT services to their parent companies — today provide a quarter of the offshore and nearshore digital services market, according to outsourcing research firm Everest Group. And that percentage is likely to grow as enterprise demand for digital transformation continues.[ Related: Digital transformation will shape 2016 ]“Global in-house centers (GICs) are typically more strongly integrated with the core business as they are perceived as an extended team of the parent or onshore organizations,” says Aditya Verma, co-director of Everest Group’s global sourcing practice. “They typically have specialized knowledge of the business as they cater to only one customer (the parent organization) as compared to a multi-tenant service provider.” Enterprises are typically more comfortable sharing core business knowledge or intellectual property with the company’s own employees than with a third-party service provider who works with other customers or even competitors.To read this article in full or to leave a comment, please click here

Microsoft Intune to support Android for Work

Microsoft announced late Tuesday that it has joined Google's Android for Work program and will support Google's container technology for mobile application management in a future release of Intune, Microsoft's own enterprise mobility management (EMM) server. The Microsoft blog post gave no timeline.Android for Work, initially released in winter 2015 as part of an Android 5.0 Lollipop update, brought to Android the same level of enterprise-grade protection for mobile apps that had previously been available only to Apple's iOS devices or Samsung's Android devices running Samsung's own Knox technology.To read this article in full or to leave a comment, please click here

Microsoft Intune to support Android for Work

Microsoft announced late Tuesday that it has joined Google's Android for Work program and will support Google's container technology for mobile application management in a future release of Intune, Microsoft's own enterprise mobility management (EMM) server. The Microsoft blog post gave no timeline.Android for Work, initially released in winter 2015 as part of an Android 5.0 Lollipop update, brought to Android the same level of enterprise-grade protection for mobile apps that had previously been available only to Apple's iOS devices or Samsung's Android devices running Samsung's own Knox technology.To read this article in full or to leave a comment, please click here