Business users get live chat in Office Online

Microsoft's attempts to catch up with Google in the online collaboration space took a step forward Wednesday, when the company announced that it's giving business users live chat in Office Online. The new feature will allow users to discuss documents stored in SharePoint and OneDrive for Business using chat sessions powered by Skype for Business.When more than one person is working on a shared document inside Word, Excel, OneNote or PowerPoint Online, they'll see a chat button show up in the Web app's toolbar. When clicked, it'll open a chat sidebar so everyone with the document open can discuss it. To read this article in full or to leave a comment, please click here

FCC formalizes massive fines for selling, using cell-phone jammers

Two years ago the FCC announced its intention to fine a Chinese electronics maker $34.9 million and a Florida man $48,000 for respectively selling and using illegal cell-phone jammers.Today the agency has issued press releases telling us that those fines have finally been made official, without either of the offending parties having bothered to mount a formal defense of their actions.[MORE: For sale: The nuclear bunker of your dreams]The wheels of justice, etc. And good luck collecting the $34.9 million.To read this article in full or to leave a comment, please click here

Cisco ACI and VMware NSX kumbaya?

Comments by Cisco CEO Chuck Robbins last week that the networking giant is open to collaborations with VMware in virtual networking raise the question: Just how would Cisco's ACI and VMware's NSX platforms could work together?In an interview with CRN last week, Robbins spoke vaguely about potentially exploring collaborations between Cisco’s ACI and VMware’s NSX, but did not commit to any specific integrations of the two products, which have typically been seen as competitors in the market.+MORE AT NETWORK WORLD: VMware narrowing SDN gap with Cisco | The future of auto safety is seatbelts, airbags and network technology +To read this article in full or to leave a comment, please click here

Cisco ACI and VMware NSX kumbaya?

Comments by Cisco CEO Chuck Robbins last week that the networking giant is open to collaborations with VMware in virtual networking raise the question: Just how would Cisco's ACI and VMware's NSX platforms could work together?In an interview with CRN last week, Robbins spoke vaguely about potentially exploring collaborations between Cisco’s ACI and VMware’s NSX, but did not commit to any specific integrations of the two products, which have typically been seen as competitors in the market.+MORE AT NETWORK WORLD: VMware narrowing SDN gap with Cisco | The future of auto safety is seatbelts, airbags and network technology +To read this article in full or to leave a comment, please click here

Google’s Trust API: Bye-bye passwords, hello biometrics?

Bye-bye passwords. We’ve heard that a lot over the years, but Google has a plan to kill off passwords by the end of this year by replacing passwords with biometrics.“We have a phone, and these phones have all these sensors in them,” Daniel Kaufman, said at Google I/O 2016 last week. “Why couldn’t it just know who I was, so I don’t need a password? It should just be able to work.” Kaufman heads up Google’s Advanced Technology and Projects (ATAP) research unit.You may recall Project Abacus (video) being mentioned at Google I/O last year. It was tested across 28 states in 33 universities, so now Google intends to “get rid of the awkwardness” of two-factor authentication, as well as passwords. Instead, you will be authenticated by how you use your Android.To read this article in full or to leave a comment, please click here

Google’s Trust API: Bye-bye passwords, hello biometrics?

Bye-bye passwords; we’ve heard that a lot over the years, but Google has a plan to kill off passwords by the end of this year by replacing passwords with biometrics.“We have a phone, and these phones have all these sensors in them,” Daniel Kaufman, said at Google I/O on Friday. “Why couldn’t it just know who I was, so I don’t need a password? It should just be able to work.” Kaufman heads up Google’s Advanced Technology and Projects (ATAP) research unit.You may recall Project Abacus (video) being mentioned at Google I/O last year; it was tested across 28 states in 33 universities, so now Google intends to “get rid of the awkwardness” of two-factor authentication as well as passwords. Instead, you will be authenticated by how you use your Android.To read this article in full or to leave a comment, please click here

Report: Apple to chase Echo, Google Home in voice assistant market

Tech giant Apple could be readying itself for an uncharacteristic act of openness, as the company prepares to take the wraps off of the Siri SDK in a bid for a bigger piece of the growing digital voice assistant market.A report from The Information’s Amir Efrati said yesterday that Apple is getting ready to make development tools for Siri widely available for the first time, which will allow app developers to create products that integrate with the company’s popular voice assistant.ALSO ON NETWORK WORLD: Not dead yet: 7 of the oldest federal IT systems still wheezing away + Software-Defined WANs: Viptela gets $75M in fundingTo read this article in full or to leave a comment, please click here

Google AI expert explains the challenge of debugging machine-learning systems

Google Director of Research and renowned artificial intelligence (AI) expert Peter Norvig, presented an entirely different side of AI and machine learning at the EmTech Digital conference. He compared traditional software programming to machine learning to highlight the new challenges of debugging and verifying systems programmed with machine learning do what they are designed to do.Traditional software programming uses Boolean-based logic that can be tested to confirm that the software does what it was designed to do, using tools and methodologies established over the last few decades.To read this article in full or to leave a comment, please click here

Large-Scale Weather Prediction at the Edge of Moore’s Law

Having access to fairly reliable 10-day forecasts is a luxury, but it comes with high computational costs for centers in the business of providing predictability. This ability to accurately predict weather patterns, dangerous and seasonal alike, has tremendous economic value and accordingly, significant investment goes into powering ever-more extended and on-target forecast.

What is interesting on the computational front is that the future of weather prediction accuracy, timeliness, efficiency, and scalability seems to be riding a curve not so dissimilar to that of Moore’s Law. Big leaps, followed by steady progress up the trend line, and a moderately predictable sense

Large-Scale Weather Prediction at the Edge of Moore’s Law was written by Nicole Hemsoth at The Next Platform.

Tips for adding IPv6 to IPv4 networks

The original title for this story was "Transitioning from IPv4 to IPv6," but when we started researching, we quickly realized that most organizations are adopting an outside-in strategy, rather than moving over from all-IPv4 to all-IPv6 deployments. This means that they're often taking steps to accommodate incoming and outgoing IPv6 traffic at the organizational boundary and translating between the two stacks, or tunneling one protocol over another, for internal access and use. The majority of internal clients and other nodes are using IPv4, with increasing use of IPv6 in dual-stack environments (environments that run IPv4 and IPv6 protocol stacks side-by-side).To read this article in full or to leave a comment, please click here(Insider Story)

Tips for adding IPv6 to IPv4 networks

The original title for this story was "Transitioning from IPv4 to IPv6," but when we started researching, we quickly realized that most organizations are adopting an outside-in strategy, rather than moving over from all-IPv4 to all-IPv6 deployments. This means that they're often taking steps to accommodate incoming and outgoing IPv6 traffic at the organizational boundary and translating between the two stacks, or tunneling one protocol over another, for internal access and use. The majority of internal clients and other nodes are using IPv4, with increasing use of IPv6 in dual-stack environments (environments that run IPv4 and IPv6 protocol stacks side-by-side).To read this article in full or to leave a comment, please click here(Insider Story)

Tips for adding IPv6 to IPv4 networks

The original title for this story was "Transitioning from IPv4 to IPv6," but when we started researching, we quickly realized that most organizations are adopting an outside-in strategy, rather than moving over from all-IPv4 to all-IPv6 deployments. This means that they're often taking steps to accommodate incoming and outgoing IPv6 traffic at the organizational boundary and translating between the two stacks, or tunneling one protocol over another, for internal access and use. The majority of internal clients and other nodes are using IPv4, with increasing use of IPv6 in dual-stack environments (environments that run IPv4 and IPv6 protocol stacks side-by-side).To read this article in full or to leave a comment, please click here(Insider Story)

5 active mobile threats spoofing enterprise apps

Impersonating appsEnterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments.  David Richardson, director of product at Lookout, and his team recently researched five families of malware doing just that: spoofing real enterprise apps to lure people to download their malware. The dataset of mobile code shows that these five, active mobile malware families often impersonate enterprise apps by ripping off the legitimate app’s name and package name. These apps include Cisco’s Business Class Email app, ADP, Dropbox, FedEx Mobile, Zendesk, VMware’s Horizon Client, Blackboard’s Mobile Learn app, and others.To read this article in full or to leave a comment, please click here

5 active mobile threats spoofing enterprise apps

Impersonating appsEnterprise employees use mobile apps every day to get their jobs done, but when malicious actors start impersonating those apps, it spells trouble for IT departments.  David Richardson, director of product at Lookout, and his team recently researched five families of malware doing just that: spoofing real enterprise apps to lure people to download their malware. The dataset of mobile code shows that these five, active mobile malware families often impersonate enterprise apps by ripping off the legitimate app’s name and package name. These apps include Cisco’s Business Class Email app, ADP, Dropbox, FedEx Mobile, Zendesk, VMware’s Horizon Client, Blackboard’s Mobile Learn app, and others.To read this article in full or to leave a comment, please click here

Regulators: cybersecurity poses biggest risk to global financial system

Last week, the chair of the Securities and Exchange Commission called cybersecurity the biggest risk facing the global financial industry."Cyber risks can produce far-reaching impacts," said SEC chair Mary Jo White.For example, cybercriminals recently stole $81 million from a bank in Bangladesh by using Swift, the global money transfer network.The SEC promises to step up regulation and Swift itself is expected to launch a new cyber security initiative this week that includes independent security audits of its customers. Meanwhile, top finance officials from G-7 nations met in Japan to discuss plans to improve global cybersecurity coordination.To read this article in full or to leave a comment, please click here

Regulators: cybersecurity poses biggest risk to global financial system

Last week, the chair of the Securities and Exchange Commission called cybersecurity the biggest risk facing the global financial industry."Cyber risks can produce far-reaching impacts," said SEC chair Mary Jo White.For example, cybercriminals recently stole $81 million from a bank in Bangladesh by using Swift, the global money transfer network.The SEC promises to step up regulation and Swift itself is expected to launch a new cyber security initiative this week that includes independent security audits of its customers. Meanwhile, top finance officials from G-7 nations met in Japan to discuss plans to improve global cybersecurity coordination.To read this article in full or to leave a comment, please click here

New court request raises further doubts about transatlantic data transfers

Thousands of companies were turned into lawbreakers at a stroke the last time the High Court of Ireland referred a question about data protection to the Court of Justice of the European Union. And it may be about to do it again.That means yet more uncertainty for companies processing European citizens' personal information in the U.S., as they struggle to keep up with the changes in privacy regulations triggered by the CJEU's response to the Irish court's last question.Under EU law, citizens' personal information can only be exported to jurisdictions guaranteeing a similar level of privacy protection to that required by the 1995 Data Protection Directive.To read this article in full or to leave a comment, please click here