Beware the ‘Windows Self-Healing Tool’ app

The Windows 10 Anniversary Update has caused its fair share of problems for users, such as freeze-ups of their PCs and the most recent issue of it crashing computers with a webcam attached. So, it's understandably tempting for some people to jump at a repair utility. In the case of the "Windows Self-Healing Tool," please don't. This utility has been circulating on several technology news sites, with people repeating its claim to fix problems associated with Windows 10. It has the air of authorization because it has a Microsoft logo on it and was first posted on the Microsoft Answers forum for Surface users.To read this article in full or to leave a comment, please click here

IDG Contributor Network: With the Ava IoT bracelet, getting pregnant becomes easier

Getting pregnant is much harder than movies would have you believe.In fact, women have only a 25 percent chance of getting pregnant every month. So, it’s no surprise that couples are keen to improve their odds. IoT makes it a little easier.Why it’s hard to get pregnant? There is just a 12- to 24-hour window each month when a human egg can be fertilized by a sperm. This fertile window occurs during the six days after ovulation while the egg passes down the fallopian tube. Pinpointing the exact time period, though, is hard because it varies from woman to woman. Sex has to take place within this fertile window to maximize the chances of becoming pregnant.To read this article in full or to leave a comment, please click here

42% off Dell UltraSharp U3415W 34-Inch Curved LED-Lit Monitor – Deal Alert

The Dell UltraSharp 34 inch Curved Monitor engages you in a new wrap-around viewing experience with a 21:9 ultra-wide curved screen that offers more display area and enhanced viewing comfort.  Easily display content from 2 different PCs at the same time with the Picture-by-Picture or Picture-in-Picture features, via the USB 3.0 upstream ports. Plus enjoy the convenience of using just one keyboard and mouse to navigate content from both PCs.To read this article in full or to leave a comment, please click here

The need for network security operations automation

According to ESG research, 63 percent of networking and cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees) believe network security operations is more difficult today than it was two years ago. Why? Because enterprises have to deal with more connected devices, network traffic and applications than two years ago.What’s more 47 percent of respondents claim that it is difficult to monitor network behavior from end to end, while 41 percent say network security operations difficulties result from increasing use of cloud computing.+ Also on Network World: It’s time to pull the trigger on security automation +To read this article in full or to leave a comment, please click here

The Need for Network Security Operations Automation

According to ESG research, 63% of networking and cybersecurity professionals working at enterprise organizations (i.e. more than 1,000 employees) believe that network security operations is more difficult today than it was two years ago (note: I am an ESG employee).  Why?  Because enterprises have to deal with more connected devices, network traffic, and applications than two years ago.  What’s more 47% of respondents claim that it is difficult to monitor network behavior from end-to-end while 41% claim that network security operations difficulties result from increasing use of cloud computing.Yup, enterprise networks are a series of moving parts and these parts continue to move faster and faster all the time.  You just can’t keep up with the pace with limited cybersecurity and network operations personnel, and you certainly can’t keep up by managing network security operations on a box-by-box, CLI-by-CLI basis. To read this article in full or to leave a comment, please click here

IDG Contributor Network: Smartphones track you—without location services on

Smartphones can disclose locations through non-location sensors when combined with algorithms and iffy apps, researchers say. And the device doesn’t need to have traditional location services such as GPS and network positioning turned on, or even ask your permission.The scientists from Northeastern University documented a number of roads and then drove real and simulated routes on them. They found that the phones in use knew where they were, without using the GPS or the other radios traditionally used for location reporting.“Changing positions, including the angles of turns and the trajectory of curves” derived from sensors, which include the accelerometer, were enough to provide data that gave locations away sometimes, the scientists from Northeastern University claim.To read this article in full or to leave a comment, please click here

High technology: How IT is fueling the budding cannabis industry

The cannabis industry is growing up, and it would be tough to imagine more convincing proof than Microsoft's recent announcement that it's getting involved.Though the software giant will stay very much in the background -- its role will focus primarily on providing Azure cloud services for a compliance-focused software push -- the move is still widely viewed as a telling sign."Having them come out and say, 'we're willing to have our name in the same sentence as the word cannabis,' adds to the legitimacy of our industry," said Kyle Sherman, cofounder and CEO of software maker Flowhub.To read this article in full or to leave a comment, please click here

Windows 10 Anniversary Update broke millions of webcams

If your webcam is freezing after about a minute when using Skype or another app, then you can thank Microsoft.The Redmond giant meant to allow multiple apps to access the camera at the same time, but it didn’t want users to suffer poor performance as those apps concurrently accessed the webcam and the MJPEG or H264 encoding processes. So, Microsoft decided the best plan was to stop USB webcams from using MJPEG or H264 and instead to only support webcams that use YUY2 encoding.To read this article in full or to leave a comment, please click here

Windows 10 Anniversary Update broke millions of webcams

If your webcam is freezing after about a minute when using Skype, or another app, then you can thank Microsoft.The Redmond giant meant to allow multiple apps to access the camera at the same time, but didn’t want users to suffer poor performance as those apps concurrently accessed the webcam and the MJPEG or H264 encoding processes. So Microsoft decided the best plan was to stop USB webcams from using MJPEG or H264 and instead to only support webcams that use YUY2 encoding.To read this article in full or to leave a comment, please click here

Why liberal arts degrees are valuable in tech

In a technology-driven, increasingly digital world, you might think you need a computer science, engineering, technology, mathematics or other degree to succeed. Turns out that's far from the truth.Arijit Sengupta, CEO of advanced analytics firm BeyondCore, holds a bachelor of science in computer science and a bachelor of arts in economics and fell one class short of having a minor in dance. He brings elements of all three to his daily work with BeyondCore, and some of the most valuable lessons he's learned have come from his liberal arts education and his dance training, he says.To read this article in full or to leave a comment, please click here

How to get your network and security teams working together

It's not surprising that network and security teams aren't always on the same page. After all, networks need to be fast and efficient, while security is about slowing things down and implementing extra steps to help meet security measures. While both teams are a part of the IT department, and need to work together in the event of a breach, each group has its own objectives and expectations. But when a data breach or security threat strikes, businesses need both teams working together to help get it fixed as soon as possible, especially as networks become more intricate."It's more important to get these two teams on the same page than it has ever been in the past. Enterprise networks are becoming more complex, and at the same time security issues are more common," says David Vigna, Cisco practice director at Softchoice.To read this article in full or to leave a comment, please click here

How to get your network and security teams working together

It's not surprising that network and security teams aren't always on the same page. After all, networks need to be fast and efficient, while security is about slowing things down and implementing extra steps to help meet security measures. While both teams are a part of the IT department, and need to work together in the event of a breach, each group has its own objectives and expectations. But when a data breach or security threat strikes, businesses need both teams working together to help get it fixed as soon as possible, especially as networks become more intricate."It's more important to get these two teams on the same page than it has ever been in the past. Enterprise networks are becoming more complex, and at the same time security issues are more common," says David Vigna, Cisco practice director at Softchoice.To read this article in full or to leave a comment, please click here

Automate, integrate, collaborate: Devops lessons for security

Enterprise security pros are often seen as heavy-handed gatekeepers obsessed with reducing risk. They'd rather be viewed as enablers who help the organization complete tasks and gain access to needed data.To make that transformation, security teams must become faster, more efficient, and more adaptable to change. That sounds a lot like devops.[ Also on InfoWorld: 19 open source GitHub projects for security pros. | Discover how to secure your systems with InfoWorld's Security newsletter. ] Indeed, security can derive inspiration from devops, says Haiyan Song, VP of security markets at Splunk. Devops encourages automation and better integration among tools, two trends security professionals are increasingly exploring to make security more transparent throughout the enterprise.To read this article in full or to leave a comment, please click here

6 tools for producing a great mobile app experience

Mobile app performance management (APM) software provides visibility into mobile app performance and helps pinpoint and resolve issues that affect end-user experience. It typically provides crash reporting, network monitoring and user interaction monitoring to keep users active and satisfied with the app.To read this article in full or to leave a comment, please click here(Insider Story)

Why Google plans to stop supporting your Chromebook after five years

One of the best things about Chromebooks is that they’re built to last. Thanks to automatic security and feature updates from Google, along with a lightweight browser-based operating system, longtime users may find that their laptops run as well, if not better, than they did on day one.But despite Chromebooks’ theoretical longevity, it’s possible for Google to cut their lives short. Per the company’s End of Life policy, Chromebooks and other Chrome OS devices are only entitled to five years of feature and security updates. After that, Google doesn’t guarantee that these systems will run safely or properly.To read this article in full or to leave a comment, please click here

8 tips for keeping your data safe with Identity and Access Management

Safe and soundImage by ThinkstockNew web applications are making their way into the workplace at an unprecedented rate. By 2017, enterprises are projected to rely on an average of 52 cloud applications at work, leaving employees with a pool of credentials to keep track of. If you don’t take the necessary precautions to keep your credentials secure, your accounts and data are at risk of being compromised. With these tips for good password hygiene and deploying an identity and access management (IAM) solution, you can keep your data safe from the rapidly evolving threat landscape. Richard Walters, senior vice president of security products at Intermedia, offers these tips.To read this article in full or to leave a comment, please click here