7 ways to prevent mobile break-in

Looking over your shoulderImage by Louis OliveiraAs mobile devices continue to penetrate our society, mobile security is becoming increasingly difficult to manage. Every mobile device, whether it’s a phone or a tablet, provides hackers with a new avenue to seize private information. We’ve seen many banks, hospitals, and other large organizations have enormous data breaches that caused a lot of damage and recovery time, and they don’t appear to be slowing down anytime soon. For this reason, it is important to take these steps to keep mobile devices protected. Sinan Eren, vice president of Avast Software and general manager of Avast Mobile Enterprise, provides advice on how to do so.To read this article in full or to leave a comment, please click here

Can UC keep remote workers engaged?

So you have a dispersed workforce. Maybe you're part of a big company with several offices. Or maybe your employer has a liberal work-from-home policy. Or perhaps you work with key contractors who may not always be in your office. Whatever the reason, you need unified communication (UC) technology. And so do a lot of other companies. But a recent study by IT consultancy Softchoice suggests that not many companies are getting the tools they need. Softchoice surveyed 250 IT managers and 750 line-of-business professionals in North America, and 44 percent of the IT managers polled said that they found it difficult to deploy UC technology. To read this article in full or to leave a comment, please click here

Apple’s most revolutionary iPhone innovations

The 7 best iPhone innovationsEver since the original iPhone hit stores shelves back in 2007, Apple has skillfully managed to introduce new technologies to successive iPhone models to keep the refresh cycle strong and consumers excited about the latest and greatest model. Not only that, but most new iPhone releases are accompanied by new and innovative technologies that raise the technological bar for all organizations industry-wide. To this end, Apple’s influence within the smartphone industry is immense.To read this article in full or to leave a comment, please click here

New products of the week 5.9.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Absolute Endpoint Data Discovery (EDD)Key features: Endpoint Data Discovery (EDD) allows organizations to identify and protect sensitive data stored on an endpoint. More info.To read this article in full or to leave a comment, please click here

New products of the week 5.9.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow. Absolute Endpoint Data Discovery (EDD)Key features: Endpoint Data Discovery (EDD) allows organizations to identify and protect sensitive data stored on an endpoint. More info.To read this article in full or to leave a comment, please click here

5 free/low-cost Wi-Fi analyzers for Windows 10

Inexpensive appsWe’ve reviewed Wi-Fi analyzers that run on Android, Windows, and Mac OS X devices. These apps allow you to analyze the wireless access points and channels on the 2.4 and 5GHz bands. Now we’re reviewing apps, published as Universal Windows Platform apps on the Microsoft Store, that run on Windows 10 PCs, tablets and phones. The Wi-Fi features that developers can utilize in the Universal Windows Platform are still pretty limited. But these apps are inexpensive and/or free. Here are the individual reviews:To read this article in full or to leave a comment, please click here

Windows 10-based Wi-Fi analyzers: No frills, low cost

We’ve reviewed Wi-Fi stumbler and surveying apps that run on Android, Windows, and Mac OS X devices. These apps allow you to analyze the wireless access points and channels on the 2.4 and 5GHz bands in your network. Now we’re reviewing apps, published as Universal Windows Platform apps on the Microsoft Store, which can run on Windows 10 PCs, tablets and phones.To read this article in full or to leave a comment, please click here(Insider Story)

First Bay Area OpenResty Meetup

On March 9, 章亦春, known to most of us as agentzh, organized the first Bay Area OpenResty Meetup at CloudFlare's San Francisco office.

CloudFlare is a big user of Lua, LuaJIT, NGINX and OpenResty and happy to be able to sponsor Yichun's work on this fast, flexible platform.

The slides and videos from the meetup are now available for viewing by people who were unable to be there in person.

abode.io by Dragos Dascalita of Adobe

   

The slides are here.

KONG by Marco Palladino from Mashape

       

The slides can be found here

What's new in OpenResty for 2016 by Yichun Zhang of CloudFlare

       

Yichun's slides are here

If you are interested in being present at the next OpenResty Meetup by sure to follow the meetup itself.

Twitter blocks access to analytics around its data for US intelligence agencies

Twitter has blocked Dataminr from offering analytics around real-time tweets from the social networking site to U.S. intelligence agencies, according to a newspaper report.The social networking company, which provides Dataminr with real-time access to public tweets, seems to be trying to distance itself from appearing to aid government surveillance, a controversial issue after former National Security Agency contractor Edward Snowden revealed that the government was collecting information on users through Internet and telecommunications companies.Executives of Dataminr told intelligence agencies recently that Twitter, which holds around 5 percent of the equity in the startup and provides the data feed, did not the want the company to continue providing the service to the agencies, reported The Wall Street Journal on Sunday, quoting a person familiar with the matter.To read this article in full or to leave a comment, please click here

Twitter blocks access to analytics around its data for US intelligence agencies

Twitter has blocked Dataminr from offering analytics around real-time tweets from the social networking site to U.S. intelligence agencies, according to a newspaper report. The social networking company, which provides Dataminr with real-time access to public tweets, seems to be trying to distance itself from appearing to aid government surveillance, a controversial issue after former National Security Agency contractor Edward Snowden revealed that the government was collecting information on users through Internet and telecommunications companies. Executives of Dataminr told intelligence agencies recently that Twitter, which holds around 5 percent of the equity in the startup and provides the data feed, did not want the company to continue providing the service to the agencies, reported The Wall Street Journal on Sunday, quoting a person familiar with the matter.To read this article in full or to leave a comment, please click here

Travel Badge of Shame

All frequent flyers strive to the top tier of their program. Qantas Platinum, BA Gold, KrisFlyer Elite Gold, United Premier 1K. They all want that extra level of benefits, those extra upgrades.

But a former manager said:

“You don’t really want to be on the top tier. You want to be on the tier just below, where you get most of the useful benefits like priority check-in, priority luggage, and lounge access. The top tier is actually a badge of shame, because it says you travel too much.”

Well…

IMG_0917.jpg

Yeah. After spending the last few years at AirNZ Gold, I’ve now moved up a level to Elite. Too much travel in the last year, almost all of it in Economy. Four trips to the US, 2 trips to Europe, 2 trips to Australia, plus a few domestic trips. Too damn much.

I don’t think I’ll be able retain it beyond this year. Will have to make the most of it for my upcoming Asia + US trips. Elite Airpoints Dollar Upgrades look like the most useful thing, since the couple of free upgrades get used up pretty quickly. If only I could also use those upgrades on trips to Europe via Asia…

iPhone Rumor Rollup: Things You Can’t Live Without; New life for headphone jack; battery booster

While iPhone users might want it all – thinner, faster, indestructible –iPhone 7 might not quite have all those things, with Apple making the usual trade-offs between power and elegance.BIGGER BATTERY The latest rumors, started via leaked photos on the Chinese Twitter (Weibo), suggest Apple has higher capacity batteries in the works for its next flagship smartphones: we’re talking 1735 mAH and 2810 mAH for the iPhone 7 and 7 Plus vs. 1715 mAH and 2750 mAH for the iPhone 6 and 6 Plus (the 6 and 6 Plus actually had smaller batteries than their predecessors).To read this article in full or to leave a comment, please click here

Are the Panama Papers a problem for you?

On May 9th, The International Consortium of Investigative Journalists will release a searchable database that will detail over 200,000 entities that are part of the Panama Papers investigation.  While this will be intriguing for most of us, if you’re in a financial organization of any kind and there’s the remotest chance that you might have dealings with any of these entities, or with parties who might be fronting for or involved with them, May 9th will be (or depending on when you read this, is or has been), shall we say, “a bad day” for you.To read this article in full or to leave a comment, please click here

Contiv Networking policy Hands-on

Contiv is an Open source project driven primarily by Cisco for policy based networking, storage and cluster management for containerized applications. In this blog, I will cover some of the hands-on stuff that I tried with Contiv Networking. I used the sample examples provided in Contiv documentation as starting point. For Contiv networking basics, you can refer … Continue reading Contiv Networking policy Hands-on

Contiv – Policy based networking for Containers

Contiv is an Open source project driven primarily by Cisco for policy based networking, storage and cluster management for containerized applications. In this blog, I will focus on how Contiv does policy based Container networking. In the next blog, I will cover some hands-on stuff that I tried with Contiv. Container Policy Policies have become critical … Continue reading Contiv – Policy based networking for Containers

Openstack Deployment using Containers

I recently saw the Openstack self-healing demo from CoreOS team using Tectonic(Stackanetes project) and I kind of felt that the boundary between Containers and VMs are blurring. In this blog, I discuss the usecase of deploying Openstack using Containers. We typically think of Openstack as a VM Orchestration tool. Openstack is composed of numerous services … Continue reading Openstack Deployment using Containers