British Airways plane possibly hit by drone near Heathrow

A British Airways aircraft was possibly hit by a drone Sunday near Heathrow airport as it was coming to land, which is likely to increase demands for greater checks on the flights of the devices. The Airbus A320 flight from Geneva, carrying 132 passengers and five crew members, appears to have not been significantly impacted and was cleared for its next flight, according to news reports. The U.K. Civil Aviation Authority said it was aware of “a possible incident” with a drone at Heathrow on Sunday, which is subject to investigation by the Metropolitan Police. It reminded drone users of the country’s "dronecode," which prohibits drones from flying above 400 feet (about 122 meters) and requires them to stay away from aircraft, helicopters, airports and airfields.To read this article in full or to leave a comment, please click here

IT career roadmap: How to become a data scientist

A data scientist is one of the most in-demand, high-profile careers in IT today, but Tom Walsh and Alex Krowitz have been working behind the scenes in the field for years. Walsh, a research engineer and Krowitz, a senior research engineer at cloud workforce management solutions company Kronos, sift through the influx of proprietary and customer data to identify patterns and gain insights based on that data."We both work in the workforce management and timekeeping division here at Kronos. There are generally two kinds of projects we regularly handle; mining patterns within data to improve our own products is one and the other is taking on specific sets of customer data to gather and deliver insights from that," says Walsh.To read this article in full or to leave a comment, please click here

Deep-dive review: For the iPad Pro, smaller is big

Over the last few years, Apple's mobile product cycle has revolved around "bigger and thinner." Now that mantra has been flipped on its head by Apple's latest releases -- the 9.7-in. iPad Pro and the 4-in. iPhone SE -- that emphasize the notion that smaller might just be better.To read this article in full or to leave a comment, please click here

5 more timeless lessons of programming ‘graybeards’

The HR departments and hiring managers in Silicon Valley have a challenge. They can’t ask an applicant’s age because their companies have lost brutal discrimination lawsuits over the years. Instead, they develop little tricks like tossing in an oblique reference to “The Brady Bunch” (“Marcia, Marcia, Marcia!”) and seeing if the candidate gets the joke. Candidates who chuckle are deemed a poor cultural fit and are tossed aside.Alas, the computer industry has a strange, cultish fascination with new technologies, new paradigms, and of course, new programmers. It’s more fascination than reality because old tech never truly dies. Old inventions like the mainframe may stop getting headlines, but they run and run. As I write this, Dice shows more than five times as many jobs postings for the keyword "Cobol" (522) than "OCaml," "Erlang," and "Haskell" combined (11, 52, and 27, respectively).To read this article in full or to leave a comment, please click here

4 IT leaders share the mobile apps they use every day

Smartphones have become more than anyone could have imagined. We use them as a communication device, to pull analytics reports, to connect with colleagues on social media, and even to help monitor core IT services. Yet, it can be hard to know which apps are the most valuable to keep around or rely on during a hectic schedule.To give you some ideas, CIO.com asked several CIOs which apps they use each day, the ones they rely on the most as part of their routine. Some of the apps they use are surprising (e.g., games to pass the time in a meeting) and some are more for personal use.Brad Schick, CTO and vice president of engineering at cloud service provider Skytap 1. SlackTo read this article in full or to leave a comment, please click here

The pain of training your replacement

At New York Life, IT employees are training overseas workers to do their jobs. It's a difficult task that takes an emotional toll, and there are odd rules and processes to follow.The training starts with sessions over the Web with the offshore contractors. Eventually, the IT employees expect to train the contractors in-person.One IT employee, who is training replacement contractors, said she has been told by management not to ask the contract workers any questions. Even simple queries, like, "Did you have a chance to read this document?" or, "Are you familiar with this technology?" to the contract workers, from India-based Tata Consultancy Services, are not allowed.To read this article in full or to leave a comment, please click here

Why curious people make better employees

Curiosity isn't reserved for childhood. It's a powerful characteristic that keeps you engaged and sharp at work. And, at the right company, being a curious person might land you a job over someone who may look more qualified on paper. At least, that's the case for Tony Vartanian, co-founder of Lucktastic, a division of the mobile game design company Jump Ramp. Vartanian has grown his company by hiring qualified, curious candidates over people who simply have an impressive background, but don't demonstrate the same thirst for knowledge.According to a study from Gallup International, some of the best entrepreneurs are curious and creative thinkers, which the study says indicates they can "creatively look beyond the present and imagine possible futures for their company." They aren't the type of people who sit around and wait to be told what to do -- instead they drive the change within their own organization through out-of-the-box thinking. And, according to Vartanian, that's a quality you want in every employee you decide to hire at your startup.To read this article in full or to leave a comment, please click here

15 tips and tricks to get the most from your LG G5

LG took a lot of risks with the new LG G5—it's got a metal chassis, unusual modular "friends," and no app drawer. There are some great features built in, but there are also a few shortcomings that you'll need to address in order to have the best experience possible. No phone is perfect, after all. So, we've got 15 tips and tricks to make your G5 the best phone it can be.Knock code Use a few taps to wake and unlock your G5. LG started offering the Knock Code security feature a few years ago, and it continues to be great on the LG G5. Knock Code lets you create a series of taps on the screen that can wake and unlock the phone in a single step. You can set up a Knock Code from the Lock screen menu under Select screen lock.To read this article in full or to leave a comment, please click here

Apple rebuts DOJ’s appeal in N.Y. meth dealer’s iPhone case

Apple last week opposed the Department of Justice's renewed demand that it assist investigators in accessing a drug dealer's iPhone, arguing that the government has not proved the company's help is required."The government has utterly failed to satisfy its burden to demonstrate that Apple’s assistance in this case is necessary," lawyers for the Cupertino, Calif., company said in a brief filed with a federal court in New York on Friday. "The government has made no showing that it has exhausted alternative means for extracting data from the iPhone at issue here, either by making a serious attempt to obtain the passcode from the individual defendant who set it in the first place ... or by consulting other government agencies and third parties known to the government."To read this article in full or to leave a comment, please click here

EU investigating Google’s contracts with phone makers, operators

The European Commission is still investigating whether Google’s Android operating system and Amazon’s contracts with e-book publishers have broken antitrust rules, its Competition Commissioner said Monday in Amsterdam.Margrethe Vestager’s remarks come amid reports that the European Commission could formally press charges in the form of a "statement of objections "against Google as early as this week. Her speech suggests that formal charges into both Google’s Android operating system and Amazon could still take some time.To read this article in full or to leave a comment, please click here

Send in the Microsoft Surface clones

Copy catsSeveral new Windows 10 tablet computers have either been released, or announced to be released soon, that copy the industrial design of Microsoft’s Surface Pro 3 and Pro 4. Like the Surface tablets, most of these clones have a kickstand that you flip out to prop them up on a flat surface; and they use a keyboard which can fold over onto the tablet’s display to protect it. While the Surface Pro 4 starts at $899 and can cost as much as $2,699, these clones are generally less expensive.To read this article in full or to leave a comment, please click here

10 whaling emails that could get by an unsuspecting CEO

WhalingWhaling threats or CEO fraud continues to grow with 70 percent of firms seeing an increase in these email-based attacks designed to extort money. There has been an uptick of activity lately as fraudsters spend the first few months of the year taking advantage of tax season, targeting finance departments with emails that look like they are coming from a company’s senior executive. Case in point are Snapchat and Seagate as companies that inadvertently gave up employees’ personal information.To read this article in full or to leave a comment, please click here

How a giant like GE found home in the cloud

For Jim Fowler, CIO of General Electric, there’s a simple reason he is marching the company toward the cloud: “I’m not going to sell another aircraft engine because I run a global compute factory very well; I’m not going to sell another locomotive because I figured out how to engineer the user experience really well for my developers; I’m not going to sell an oil and gas pump because I’ve figured out how to do self-service,” he said at last year's Amazon Web Service’s re:Invent conference. “That’s AWS’s differentiator. That's what they do well.”  GE, the 123-year-old staple of the global industrial sector, is going all in on the cloud. The company plans to migrate 9,000 applications to public IaaS over the next three years. It is reducing its data centers from more than 30 to the single digits.To read this article in full or to leave a comment, please click here

Reinventing the WAN

While some organizations continue to make use of WAN services such as Frame Relay and ATM, the use of those services is quickly diminishing. As a result, we are rapidly approaching a time when IT organizations will have only two WAN services to choose from: MPLS and the Internet. Given that trend, a key question facing network organizations is how to best design a branch office WAN using just those two services.Location of functionality Abogado states that security in the branch will evolve from a model that relies on the perimeter approach to a multi-layered model that requires embedding security into all branch technologies. The philosophy behind this change is that administrators will have to make the “trust" zone an “untrust” zone, since attacks can come from any vector, including inside the branch. He believes that a single layer of encryption is probably insufficient, and that IT organizations should consider encryption at both the application and network layers. Increased branch deployment of network and data segmentation are also key technologies that will support the multi-layer security model.To read this article in full or to leave a comment, please click here(Insider Story)

Reinventing the WAN

While some organizations continue to make use of WAN services such as Frame Relay and ATM, the use of those services is quickly diminishing. As a result, we are rapidly approaching a time when IT organizations will have only two WAN services to choose from: MPLS and the Internet. Given that trend, a key question facing network organizations is how to best design a branch office WAN using just those two services.Location of functionality Abogado states that security in the branch will evolve from a model that relies on the perimeter approach to a multi-layered model that requires embedding security into all branch technologies. The philosophy behind this change is that administrators will have to make the “trust" zone an “untrust” zone, since attacks can come from any vector, including inside the branch. He believes that a single layer of encryption is probably insufficient, and that IT organizations should consider encryption at both the application and network layers. Increased branch deployment of network and data segmentation are also key technologies that will support the multi-layer security model.To read this article in full or to leave a comment, please click here(Insider Story)

New products of the week 4.18.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Altify MaxKey features: Altify Max is the first "augmented intelligence" platform that combines human and machine intelligence. Altify Max includes more than 30 years of sales knowledge built-in and combines the deep muscle memory of a million sales engagements, knowledge of the world’s best sales methodologies and insights from each individual business to create instant, real-time recommendations about how to progress each opportunity. More info.To read this article in full or to leave a comment, please click here

New products of the week 4.18.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Altify MaxKey features: Altify Max is the first "augmented intelligence" platform that combines human and machine intelligence. Altify Max includes more than 30 years of sales knowledge built-in and combines the deep muscle memory of a million sales engagements, knowledge of the world’s best sales methodologies and insights from each individual business to create instant, real-time recommendations about how to progress each opportunity. More info.To read this article in full or to leave a comment, please click here

New products of the week 4.18.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Altify MaxKey features: Altify Max is the first "augmented intelligence" platform that combines human and machine intelligence. Altify Max includes more than 30 years of sales knowledge built-in and combines the deep muscle memory of a million sales engagements, knowledge of the world’s best sales methodologies and insights from each individual business to create instant, real-time recommendations about how to progress each opportunity. More info.To read this article in full or to leave a comment, please click here