IBM creates artificial neurons from phase change memory for cognitive computing

IBM scientists have created artificial neurons and synapses using phase change memory (PCM) that mimics the brain's cognitive learning capability. It is the first time the researchers were able to create what they described as "randomly spiking neurons" using phase-change materials to store and process data. The discovery is a milestone in developing energy-sipping and highly dense neuro networks that could be used for cognitive computing applications. In short, the technology can be used to improve today's processors in order to perform computations in applications such as data-correlation detection for the Internet of Things (IoT), stock market trades and social media posts at a staggeringly fast rate.To read this article in full or to leave a comment, please click here

IBM creates artificial neurons from phase change memory for cognitive computing

IBM scientists have created artificial neurons and synapses using phase change memory (PCM) that mimics the brain's cognitive learning capability. It is the first time the researchers were able to create what they described as "randomly spiking neurons" using phase-change materials to store and process data. The discovery is a milestone in developing energy-sipping and highly dense neuro networks that could be used for cognitive computing applications. In short, the technology can be used to improve today's processors in order to perform computations in applications such as data-correlation detection for the Internet of Things (IoT), stock market trades and social media posts at a staggeringly fast rate.To read this article in full or to leave a comment, please click here

15 low-code tools for building mobile apps fast

More no-code and low-code development toolsThe debates over mobile web, native code, and hybrid mobile apps may never end, but one thing everyone can agree on is that we can’t build mobile apps fast enough. Low-code development platforms take a visual, drag-and-drop approach to building apps, allowing developers to deliver applications faster at lower costs. So-called no-code tools even promise to put app building within reach of nondevelopers.To read this article in full or to leave a comment, please click here

Politics blamed for feds’ reliance on old IT

The U.S. government is spending more than $81 billion on information technology. But only about 24% is spent overall on new systems, with the rest being used to maintain old systems.The Social Security Administration, for instance, has more than 60 million lines of Cobol, the agency’s Office of Inspector General reported last month.And the U.S. Defense Department is running some nuclear weapons support systems on an IBM Series/1 Computer, circa 1970s, the U.S. Government Accountability Office recently reported.MORE ON NETWORK WORLD: 26 crazy and scary things the TSA has found on travelers “Legacy IT investments across the federal government are becoming increasingly obsolete,” wrote the GAO in its report released in May. “Specifically, many use outdated languages and old parts.”To read this article in full or to leave a comment, please click here

Politics blamed for feds’ reliance on old IT

The U.S. government is spending more than $81 billion on information technology. But only about 24% is spent overall on new systems, with the rest being used to maintain old systems.The Social Security Administration, for instance, has more than 60 million lines of Cobol, the agency’s Office of Inspector General reported last month.And the U.S. Defense Department is running some nuclear weapons support systems on an IBM Series/1 Computer, circa 1970s, the U.S. Government Accountability Office recently reported.MORE ON NETWORK WORLD: 26 crazy and scary things the TSA has found on travelers “Legacy IT investments across the federal government are becoming increasingly obsolete,” wrote the GAO in its report released in May. “Specifically, many use outdated languages and old parts.”To read this article in full or to leave a comment, please click here

Why the attack on the DNC won’t be the last one like it

The great DNC email caperImage by REUTERS/Mark KauzlarichThe tech news cycle dovetailed with the political news cycle last week when first emails and then voice mails from the Democratic National Committee were released via WikiLeaks. And with the possibility of Russian involvement, the incident went from a domestic squabble to a potentially international incident.To read this article in full or to leave a comment, please click here

Why the attack on the DNC won’t be the last one like it

The great DNC email caperImage by REUTERS/Mark KauzlarichThe tech news cycle dovetailed with the political news cycle last week when first emails and then voice mails from the Democratic National Committee were released via WikiLeaks. And with the possibility of Russian involvement, the incident went from a domestic squabble to a potentially international incident.To read this article in full or to leave a comment, please click here

4 laptop security trends you should know about

For most business users, there’s one common device we all use that is still a common attack vector for hackers. We carry them with us everywhere, and we store most of our important files on the local drive, even if it’s just temporary. A laptop has more storage, more connection options, and more legacy apps than any smartphone or tablet.For any business, it’s important to take laptop security seriously, even if you already have an endpoint security product in place and teach enterprise users about best practices. Hackers are industrious; they develop new techniques and know that one of the easiest ways to steal passwords, break into file archives, and intercept a confidential email is through a laptop.To read this article in full or to leave a comment, please click here

Insurers working to fill cyberinsurance data gaps

Insurance companies typically have decades of data, if not more, on which to base their risk estimates.That's not the case with cyber risk, however. There's very little historical data available, the data is not complete, and the threat landscape doesn't just change year by year, but day by day. There isn't even a standard set of definitions that everyone can agree on.That's starting to change, as insurers expand their services so that they can better educate their customers about cyber risk and even help them defend against attacks before they happen and deal with the fallout of when a breach does occur.I say potahto One of the first problems when it comes to buying cyberinsurance is that nobody knows exactly what it means. Corporate financial officers, security managers, and insurance brokers have different understanding of risk, for example.To read this article in full or to leave a comment, please click here

Report: Only 3 percent of U.S. companies pay attackers after ransomware infections

Almost half of all companies have been the victims of a ransomware attack during the past 12 months, according to a new report. And while globally, 40 percent of them have paid the ransom, 97 percent of U.S. companies did not.Specifically, 75 percent of enterprise victims paid up in Canada, 58 percent in the U.K., and 22 percent in Germany, according to an Osterman Research survey of hundreds of senior executives in the U.S., Canada, German and the U.K.ALSO ON CSO: How to respond to ransomware threats This is partly due to the fact that, in the United States, the attacks were much more likely to hit lower-level employees. In the U.S., enterprises reported that 71 percent of lower-level staff were affected, compared to 29 percent in the U.K., 23 percent in Canada, and 14 percent in Germany.To read this article in full or to leave a comment, please click here

Report: Only 3 percent of U.S. companies pay attackers after ransomware infections

Almost half of all companies have been the victims of a ransomware attack during the past 12 months, according to a new report. And while globally, 40 percent of them have paid the ransom, 97 percent of U.S. companies did not.Specifically, 75 percent of enterprise victims paid up in Canada, 58 percent in the U.K., and 22 percent in Germany, according to an Osterman Research survey of hundreds of senior executives in the U.S., Canada, German and the U.K.ALSO ON CSO: How to respond to ransomware threats This is partly due to the fact that, in the United States, the attacks were much more likely to hit lower-level employees. In the U.S., enterprises reported that 71 percent of lower-level staff were affected, compared to 29 percent in the U.K., 23 percent in Canada, and 14 percent in Germany.To read this article in full or to leave a comment, please click here

How to protect yourself from common hotel security threats

Hotels are digitally dangerous places these days. And that's not idle speculation. Security researchers have been sounding the alarm on sophisticated attacks directed at hotel users for years.Most of the earliest reports pointed to surgical strikes on high-profile executives or representatives of government agencies, but they could prove to be precursors for more wide-ranging attacks on the general public. Modern business travelers, with their treasure troves of files and personal information, will be prime targets, and they're also more likely to let their guard down after an exhausting journey.To read this article in full or to leave a comment, please click here

Almost half of US businesses hit by ransomware, says study

The threat of ransomware is becoming widespread among corporations, with almost half of U.S. businesses suffering an attack from the nasty form of malware recently, according to a new survey.Security firm Malwarebytes sponsored the study, which found in June that 41 percent of U.S. businesses had at least encountered between one to five ransomware attacks in the previous 12 months.Another 6 percent saw six or more attacks.The study surveyed corporations in the U.S., Canada, U.K. and Germany to gauge how ransomware affected their operations. The malware, which can infect a computer and take the data hostage, can be bad for business. 34 percent of the victim corporations in the countries surveyed reported losing revenue because the ransomware had prevented access to important files.To read this article in full or to leave a comment, please click here

Almost half of US businesses hit by ransomware, says study

The threat of ransomware is becoming widespread among corporations, with almost half of U.S. businesses suffering an attack from the nasty form of malware recently, according to a new survey.Security firm Malwarebytes sponsored the study, which found in June that 41 percent of U.S. businesses had at least encountered between one to five ransomware attacks in the previous 12 months.Another 6 percent saw six or more attacks.The study surveyed corporations in the U.S., Canada, U.K. and Germany to gauge how ransomware affected their operations. The malware, which can infect a computer and take the data hostage, can be bad for business. 34 percent of the victim corporations in the countries surveyed reported losing revenue because the ransomware had prevented access to important files.To read this article in full or to leave a comment, please click here

Wi-Fi, LTE-U enter new phase of coexistence debate

The long-running contretemps between the supporters of LTE-U and regular Wi-Fi, over the idea of the two wireless standards co-existing on the same frequencies, has moved into a new phase, as test plan parameters are expected to be rolled out at Wednesday’s coexistence workshop in San Jose.The workshop is a meeting of interested stakeholders from both parties. The LTE-U camp, primarily made up of Qualcomm, Ericsson and the major U.S. wireless telecoms, has long insisted that LTE-U technology will not interfere with existing Wi-Fi networks, despite using the same frequencies. Skeptics, which include the cable industry and many of the country’s biggest tech companies, including Google and Microsoft, are worried that the rosy coexistence picture presented by LTE-U’s backers is unrealistic.To read this article in full or to leave a comment, please click here

CloudFlare’s JSON-powered Documentation Generator

Everything that it's possible to do in the CloudFlare Dashboard is also possible through our RESTful API. We use the same API to power the dashboard itself.

In order to keep track of all our endpoints, we use a rich notation called JSON Hyper-Schema. These schemas are used to generate the complete HTML documentation that you can see at https://api.cloudflare.com. Today, we want to share a set of tools that we use in this process.

CC BY 2.0 image by Richard Martin

JSON Schema

JSON Schema is a powerful way to describe your JSON data format. It provides complete structural validation and can be used for things like validation of incoming requests. JSON Hyper-Schema further extends this format with links and gives you a way describe your API.

JSON Schema Example

{
  "type": "object",
  "properties": {
    "name": { "type": "string" },
    "age": { "type": "number" },
    "address": {
      "type": "object",
      "properties": {
        "street_address": { "type": "string" },
        "city": { "type": "string" },
        "state": { "type": "string" },
        "country": { "type" : "string" }
      }
    }
  }
}

Matching JSON

{
  "name": "John Doe",
  "age": 45,
  "address": {
    "street_address": "12433 State St NW",
    "city": "Atlanta",
    "state": "Georgia",
    "country":  Continue reading

Slideshow: LibreOffice ups its enterprise game in this major new release

A business-ready Office alternativeImage by LibreOfficeLibreOffice is a free and open source alternative to Microsoft's Office productivity software that boasts some 120 million users around the globe. Version 5.2 made its debut on Wednesday, and it's packed with new business features. Here's a look at what you'll find.To read this article in full or to leave a comment, please click here