Microsoft will add QR codes to Windows 10 crashes

Windows 10 is an ultra-modern piece of software, an operating system written for the cloud generation, right? Well, not so fast. A new form of error reporting uses a mobile technology that’s been declared dead.Windows has never been particularly helpful in saying why your computer crashed. Even the Blue Screen of Death (BSOD) in Windows 10 doesn’t tell you much. And the large sad face emoticon doesn’t exactly help, does it?It’s almost comical that they tell you the error code, like “KERNEL_DATA_INPAGE_ERROR” or “HAL_INITIALIZATION_FAILED” and then tell you to look it up after you reboot. And good luck finding any useful information.INSIDER Review: Enterprise guide to Windows 10 So, what is Microsoft’s solution? A QR code. Yes, a QR code, that dead technology from mobile phones. It was supposed to be a way to rapidly look up info on items in retail outlets or get info from other sources, but it never got any traction. For some time now, QR codes have long been considered dead in the water.To read this article in full or to leave a comment, please click here

What happened next: the deprecation of ANY

Almost a year ago, we announced that we were going to stop answering DNS ANY queries. We were prompted by a number of factors:

  1. The lack of legitimate ANY use.

  2. The abundance of malicious ANY use.

  3. The constant use of ANY queries in large DNS amplification DDoS attacks.

Additionally, we were about to launch Universal DNSSEC, and we could foresee the high cost of assembling ANY answers and providing DNSSEC-on-the-fly for those answers, especially when most of the time, those ANY answers were for malicious, illegitimate, clients.

Although we usually make a tremendous effort to maintain backwards compatibility across Internet protocols (recently, for example, continuing to support SHA-1-based SSL certificates), it was clear to us that the DNS ANY query was something that was better removed from the Internet than maintained for general use.

Our proposal at the time was to return an ERROR code to the querier telling them that ANY was not supported, and this sparked a robust discussion in the DNS protocol community. In this blog post, we’ll cover what has happened and what our final plan is.

Just before we published our blog a popular software started using ANY queries, to get all address Continue reading

The Four Element Sword Engagement

Ongoing APT activity against Tibetans, Hong Kong and Taiwanese interests In “The Four Element Sword Engagement (Full Report)”, Arbor ASERT reveals recent ongoing APT activity likely associated with long-running threat campaigns against Tibetans, Hong Kong, Taiwanese interests and human rights workers. We presume the existence of associated malcode, dubbed the Four Element Sword Builder, which […]

Concept Data Tower Scrapes The Sky For Efficiency

We talk about architecture all the time when discussing systems, but when it comes to the datacenters that house these machines, the shells are about as exciting as a monstrous warehouse for a massive distribution operation. Considering that data and processing are the most profitable products on the planet these days, maybe this is suitable and fitting, but another way to look at it is that datacenters should not only be marvels of engineering but also inspiring structures like other kinds of buildings.

Every year, the architecture magazine Evolo hosts a skyscraper design competition so that architects can let their

Concept Data Tower Scrapes The Sky For Efficiency was written by Timothy Prickett Morgan at The Next Platform.

Verizon to replace copper with fiber optic Internet in Boston

Verizon and the city of Boston today announced a $300 million fiber optic cable replacement of copper cable throughout the city over the next six years.The project will increase Internet speeds and help Boston, which has 650,000 residents, expand broadband as part of its priority to ensure every resident has Internet access, Mayor Marty Walsh said in a statement on Tuesday. Business, schools, hospitals and libraries will also be connected.Smart city elements will be added as well, including a trial project to reduce traffic congestion along Massachusetts Avenue. The city and Verizon will partner to experiment with sensors and advanced traffic signal technology to increase safety, measure bike traffic and improve public transit vehicle flow.To read this article in full or to leave a comment, please click here

Verizon to replace copper with fiber optic Internet in Boston

Verizon and the city of Boston today announced a $300 million fiber optic cable replacement of copper cable throughout the city over the next six years.The project will increase Internet speeds and help Boston, which has 650,000 residents, expand broadband as part of its priority to ensure every resident has Internet access, Mayor Marty Walsh said in a statement on Tuesday. Business, schools, hospitals and libraries will also be connected.Smart city elements will be added as well, including a trial project to reduce traffic congestion along Massachusetts Avenue. The city and Verizon will partner to experiment with sensors and advanced traffic signal technology to increase safety, measure bike traffic and improve public transit vehicle flow.To read this article in full or to leave a comment, please click here

U.S. gets 236,000 H-1B petitions, a new record

The U.S. received 236,000 H-1B petitions for 85,000 visas available under the program's visa caps, the U.S. Citizenship and Immigration Services (USCIS) said Tuesday.The visas are being distributed via a lottery, which means only about one in every three petitions will be approved.The U.S. received 233,000 H-1B visa petitions last year, the previous record. The U.S. accepts visas on April 1 for the fiscal year that begins Oct. 1.If history is any guide, a majority of the demand for the visa is coming from IT services, offshore outsourcing firms.INSIDER: Network jobs are hot: Salaries expected to rise in 2016 Critics believe the high number of visas represents a form of "ballot box" stuffing by IT services firms in response to the lottery system. Applicants can apply for a visa for someone who is not an employee.To read this article in full or to leave a comment, please click here

10 simple tools for building mobile apps fast

No-code and low-code mobile dev toolsWhile the great debate rages on between the various mobile development camps -- the pure HTML5/JavaScript/CSS3 mobile Web faction, the native code purists, and the hybrid mobile app fans -- businesses still have to create and maintain mobile applications for their employees, business partners, and customers. The one conclusion that everyone seems to reach, eventually, is that there is no single panacea in this space. Each approach and toolset has its advantages and drawbacks.To read this article in full or to leave a comment, please click here

Chief Risk Officers needed to battle rising corporate espionage

A growing number of organizations are adding a new member to the C-suite—the chief risk officer (CRO)—and the rise of these executives is having a direct impact on the security programs at enterprises.“Corporate espionage, terrorism and cyber attacks are ratcheting up the need for senior executives who understand all aspects of risk management and security,” says Jeremy King, president of Benchmark Executive Search, a provider of technology executive search services.INSIDER 12 habits of successful tech CEO “Many companies are finally awakening to how destructive security breaches of all types can be—from physical damage and real costs to reputation loss and customer recovery,” King says. “Previously siloed risk-management functions must be reinvented, strengthened, and funded more aggressively. Industry must re-evaluate its approach to risk management, and success will require unprecedented cooperation from board directors and those in the C-suite.”To read this article in full or to leave a comment, please click here

Will companies trust their communications to A.I. chatbots?

SAN FRANCISCO -- Facebook says chatbots will change the way businesses communicate with their customers, but will businesses want to put their user communications in the hands of artificial intelligence?"They're a powerful tool but they're also a big risk," said Brian Blau, an analyst with Gartner. "A.I. can be a very powerful technology. Businesses are going to have to understand how to harness that power. There are reasons to be worried about it. Because we're giving chatbots the power to act on our behalf, they're taking on greater importance."Blau said he expects businesses will trust chatbots eventually, but that it will be a "measured adoption" since brands are always concerned about their perception in the marketplace.To read this article in full or to leave a comment, please click here

Review: 4 mid-priced laptops that mean business

Every day an army of business people heads out to offices, meetings and coffee shops, equipped with little more than a smartphone and a laptop. To get the job done, that laptop has to be secure enough to protect sensitive data, rugged enough to bounce around in a backpack, and with enough battery power and performance strength to get through a day of presentations, emails and online chats. All without busting the company budget. Welcome to the world of mid-priced Windows laptops. According to Linn Huang, research director for devices & displays at IDC, today's typical business systems are far from the high-end, high-cost ultraportables and 2-in-1s that usually get media attention.To read this article in full or to leave a comment, please click here

Power Shell is a powerful malware tool

PowerShell used as a tool in compound malware attacks is becoming more common, with 38% of all attacks seen by IT security vendor CarbonBlack and its partners involving the native Windows scripting language. Ben Johnson Its use is so common in enterprises for legitimate purposes that most security devices and personnel don’t regard it as a threat, says Ben Johnson, the chief security strategist at CarbonBlack.That makes it all the more effective as a component of attacks. Its scripts can run in memory only so it never creates a file on disk, Johnson says. “It creates less noise on the system,” so it’s less likely to draw attention to itself, he adds.To read this article in full or to leave a comment, please click here

Power Shell is a powerful malware tool

PowerShell used as a tool in compound malware attacks is becoming more common, with 38% of all attacks seen by IT security vendor CarbonBlack and its partners involving the native Windows scripting language. Ben Johnson Its use is so common in enterprises for legitimate purposes that most security devices and personnel don’t regard it as a threat, says Ben Johnson, the chief security strategist at CarbonBlack.That makes it all the more effective as a component of attacks. Its scripts can run in memory only so it never creates a file on disk, Johnson says. “It creates less noise on the system,” so it’s less likely to draw attention to itself, he adds.To read this article in full or to leave a comment, please click here

Techstars IoT Accelator in NYC open for applications

Startup supporter Techstars has announced that entrepreneurs can now apply to be part of its 15-week IoT Accelerator at the Barclays Rise facility in New York City that starts in September. Applications are due by July 10.The mentorship-driven program will match 10 startups with Internet of Things experts from PwC, GE, Bosch, SAP and Verizon, according to Techstars. Of particular focus will be the Industrial Internet. The partner companies will offer engineering expertise, access to tech platforms and more.MORE: 10 Internet of Things companies to watch | Most Powerful Internet of Things CompaniesTo read this article in full or to leave a comment, please click here

IDG Contributor Network: Teens will sell their personal information for cash, research finds

The equivalent of about $20, or the cost of a large pizza, is the amount of cash British kids would accept in exchange for handing over their personal information, a study has found.IT solutions and managed service firm Logicalis found kids (aged 13-17) were “instinctively digital” and that they fully comprehended the value of their personal information. Not only were the young scoundrels completely au fait with how much their personally identifiable information (PII) was worth, they were quite happy to sell it—if it meant they didn’t have to work.To read this article in full or to leave a comment, please click here