|Headlines : Computer World News||Page 1|
|25/05 5:05 am||74% off Omaker M4 Portable Bluetooth Shower and Outdoor Speaker with 12 .. |
The M4 speaker from Omaker isIP54 rated, so its rugged splash, shock and dustproof design makes it ideal for shower and outdoor use. The latest Bluetooth 4.0 technology helps it pair quickly with your device (tap-to-pair with NFC capable devices) and maintain a long 33-foot connection range. Crystal clear sound quality and robust bass is realized through a 3W audio driver and passive subwoofer. The M4 is capable of producing12 hours of music at 80% volume, up to three times longer than ..
|25/05 12:35 am||IDG Contributor Network: Twilio does speech recognition and understanding, .. |
Weve all had horrendous experiences with voice recognition when calling a support center Id like to think that its just me with my slightly unusual Kiwi accent, but everyone I talk to has similar stories of getting exasperated at an automated call center that hopelessly gets even the most basic speech recognition exercises wrong. Its a sad reality of the modern world that organizations try to shoehorn users into solutions that arent yet fit for purpose, just to save some costs. The world of ..
|25/05 12:10 am||22% off Taotronics Universal Smartphone Bike Mount - Deal Alert |
The Taotronics phone mount is easy to install and features a fully adjustable viewing angle, non-slip rubber grips and a one-button phone release mechanism. It averages 4.5 out of 5 stars on Amazon ( read reviews ), where its list price of $15.99 has been discounted 22% to $12.49. See this deal now on Amazon . To read this article in full or to leave a comment, please click here
|24/05 11:26 pm||Appeals court gives Wikimedia thumbs up to sue NSA for 'Upstream' .. |
Well, well, well, the NSA may not waltz away legally unscathed after spying on Americans private communications due to the dogged determination of the Wikimedia Foundation, the ACLU, the Knight First Amendment Institute at Columbia University and eight other co-plaintiffs. The 4th US Circuit Court of Appeals ruled to give Wikimedia a chance to legally challenge the NSAs mass surveillance as being unconstitutional. The government has previously argued that the NSAs Upstream warrantless spying is ..
|24/05 7:02 pm||Apple is testing 5G: Why this matters to the iOS enterprise |
Faster, more stable, capable of supporting more devices and equipped to handle life in the fast lane, 5G technology is the next wave of networking, and Apple is deeply involved in testing and developing the standard. What does Apple hope to gain and why should this matter to an iOS enterprise ? What is 5G? While it is important to note that 5G is not yet ratified as a standard and networks that use the standard arent expected before 2020, 5G is touted as the next-generation of wireless ..
|24/05 6:01 pm||Google raises heat on Microsoft with new Chrome bundle for enterprises |
Google on Tuesday rolled out an enterprise bundle that packages Chrome, management templates and an add-on for dealing with legacy sites and apps, building on the chokehold its browser has on the web. The collection -- prosaically dubbed "enterprise bundle" -- includes a Chrome installer (in .msi format), the Legacy Browser Support (LBS) add-on, and a set of templates for applying group policies to Chrome within the company. It was essentially a convenience, since all its components have been ..
|24/05 6:00 pm||Are you sure it's not just in sleep mode? |
In the wake of a very bad thunderstorm, this field service pilot fish is dispatched to a client's restaurant to test and replace a patch cord after lightning blew up the cable modem. "My ticket said to replace the cord between the cable modem and the router," says fish. "The internet provider had replaced the modem, but the site was still on its backup wireless connection because the router still could not communicate through the modem. "The support desk -- which was on another continent -- ..
|24/05 6:23 am||BrandPost: Whats Your Strategy to Create a Great Company Culture? |
Much has been made about the potential of digital transformation to make companies more competitive, to engage more closely with customers, and to speed everything from decision making to time-to-market. This digital revolution has also impacted employees, and not always in a positive fashion. Always connected workers often work longer hours, both onsite and off, and the pace and volume of work has steadily increased for many employees. An Ernst & Young (EY) study found that one-third of ..
|24/05 5:53 am||Former NSA chief weighs in on cybersecurity, cyberespionage at ZertoCon |
BOSTON -- Retired Gen. Michael Hayden held nothing back when speaking to cybersecurity pros today at the ZertoCon business continuity conference . It's been more than a decade since he led the National Security Agency (NSA), but that didn't stop Hayden from asserting that the Russians were involved in last year's U.S. presidential election. His view: Only two presidents doubt that the Russians were involved in the 2016 election -- Donald Trump and Vladimir Putin. "They [the Russians] had an ..
|24/05 5:17 am||38% off Inateck USB 3.0 to IDE/SATA Hard Drive Adapter - Deal Alert |
This USB 3.0 adapter from Inateck can interface with up to three drives simultaneously. It is compatible with 2.5"/3.5" IDE/SATA hard drives and 5.25" IDE/SATA CD/DVD drives, and features a one-touch backup function. Use it to read an old internal drive from a crashed computer, or to use an internal drive similar to an external backup drive. You might find a lot of uses for this one. The typical list price of $47.99 has been reduced on Amazon 38% right now to $29.99. See this deal on Amazon . ..
|24/05 5:00 am||IDG Contributor Network: Wikileaks reveals potent Windows malware from the .. |
A few days ago, Microsofts top lawyer took the NSA to task over WannaCry, saying that problem was the agencys creation because it built and stockpiled such malware for its own use. Now WikiLeaks has revealed more government-created malware and this one is a nasty piece of work. Codenamed Athena, the spyware targets all version of Windows from Windows XP to Windows 10, and was released in August 2 . It was created in part by a private New Hampshire-based cyber security firm called Siege ..
|24/05 3:00 am||IDG Contributor Network: Tower of power, Apple-branded display promise Mac .. |
There isnt anything flashy about computer towers. And their lack of style made it easy for Apple to abandon them. But do we really prefer Apple produces more iMacs and unconventionally shaped Mac Pros?What if instead they decide to return to their most durable, albeit boring desktop hardware design? Returning to the tower designs of yesteryear could potentially be a big win for Apple not to mention its customers.iMac and Mac Pro hardware designs feature stylish good looks over the ability to ..
|24/05 2:15 am||IDG Contributor Network: The value of metadata the most Instagrammed .. |
Edward Snowdens revelations about federal interception of private electronic transmissions started to build public awareness about the concept of metadata. The simple concept suddenly has people thinking about the data relating to the data they are generating and sharingand the insights that could be gleaned from that. A few weeks ago, I received an email from online travel company TravelBird asking me whether I was interested in a report detailing some metadata analysis they had done on ..
|24/05 2:01 am||58% off RAVPower Portable Multi-Functional Power Bank with 9000mAh .. |
The RAVPower Savior 9000mAh portable charger has both a built built-in Apple Lightning Connector and a foldable two prong wall plug so you don't need to bring an extra cable to charge your Apple Device. The additional USB output is 1A & Lightning output is 2.4A - this means you can have incredible charging speeds up to 3.4A To read this article in full or to leave a comment, please click here
|24/05 12:30 am||IDG Contributor Network: The siren song of Hadoop |
Hadoop seems incredibly well-suited to shouldering machine-learning workloads. With HDFS you can store both structured and unstructured data across a cluster of machines, and SQL-on-Hadoop technologies like Hive make those structured data look like database tables. Execution frameworks like Spark let you distribute compute across the cluster as well. On paper, Hadoop is the perfect environment for running compute-intensive distributed machine learning algorithms across a vast amount of data. ..
|24/05 12:03 am||Hands on: Android O's most useful features |
With Google I/O officially behind us, it's time to start looking forward -- and that means time to start thinking in more detail about the next major version of Android and what it'll mean for us. Google Home and Photos may have stolen the show at last week's conference, but the already-under-development Android O certainly had its share of the spotlight. We've known about Android O for a while now, of course -- ever since the first developer preview of the software plopped out back in March -- ..
|23/05 10:48 pm||Apple, iOS, and IBM are transforming retail, one shop at a time |
Yet more evidence proves Apple has become a peer enterprise technology vendor , this time in the shape of an Apple and IBM project to digitally transform business processes at South Floridas leading furniture chain, City Furniture . I caught up with City Furniture CIO, Steve Wilder andRodney Bryant, IBM Global Business Services Retail Industry Lead for the Apple Partnership Team,to find out more. To read this article in full or to leave a comment, please click here
|23/05 9:43 pm||Google I/O: What about Android on Chrome OS? |
The hottest tech-show ticket these days is Google I/O . In the just-finished 2017 conference, Google announced lots of great stuff, including a lightweight version of Android, Android Go ; a first look at the next version of Android, Android O ; and a major upgrade to Google Home . One thing that was noticeably missing, however: big news about Android apps on Chrome OS . To read this article in full or to leave a comment, please click here
|23/05 9:28 pm||IDG Contributor Network: Why Im worried about Microsoft Teams deployment |
I did a deep dive into the features in Microsoft Teams , which is essentially a collaborative chat application for Office users (a.k.a., a Slack competitor). I wanted to find out what its like to use Teams with an actual team for actual work. Fortunately, Ive started doing some work with a local college -- Im mostly there to help with mentoring and development. Its a team of around 12 people, and Ill have more findings to share in the coming weeks, but theres one initial concern. Im starting to ..
|23/05 9:00 pm||Samsung Galaxy Book 12: A top 2-in-1 for the enterprise |
Picking up where last years Galaxy TabPro S left off, the Samsung Galaxy Book 12 tablet takes the lead in performance and mobile amenities while keeping its thickness and weight down. I lived and worked with the Galaxy Book 2-in-1 device for several days, and its now my top choice for executives and other mobile workers who need to travel light. At 11.5 x 7.9 x 0.3 in. and 1.6 lb., the Galaxy Book is slightly bigger and heavier than the TabPro S it replaces. Still, its thinner and about 3 oz. ..
|23/05 6:01 pm||4 ways blockchain is the new business collaboration tool |
While blockchain may have cut its teeth on the cryptocurrency Bitcoin , the distributed electronic ledger technology is quickly making inroads across a variety of industries. That's mainly because of its innate security and its potential for improving systems operations all while reducing costs and creating new revenue streams. David Schatsky, a managing director at consultancy Deloitte LLP , believes blockchain's diversity speaks to its versatility in addressing business needs, but "the impact ..
|23/05 6:00 pm||Connecting with work from the road? Here's how to stay safe |
Every company has workaholics who cant leave their duties behind when heading out on vacation.They're kind of worker who, if the hotel doesnt have Wi-Fi, will rush to the closest coffee shop or eatery to stay connected, check email and jump onto a video conference call. Those are the kinds of insecure wireless networks that make IT security managers nervous. And for good reason. Public Wi-Fi networksat cafes and coffee shops are open to, and can be accessed by, anyone, according to mobile ..
|There really ARE better ways to stay awake... |
IT pilot fish is working late one night when there's a slight case of user error -- with more-than-slight consequences. "There was a bank of network switches in a cabinet in cubeland -- no more room in the cable closet," says fish. "It was taken down when a colleague used a coffee jug and one of those in-the-cup immersion heaters to make tea. "He forgot about his boiling water, and after giving the switches 15 minutes of a damn good steaming, the pot was dry. "There followed an almighty bang ..
|23/05 5:06 am||5 ways to stop future global malware attacks |
The global WannaCry ransomware attack , which crippled hospitals, government organizations, companies and individuals around the world, didnt have to happen. It was no grand technological feat perpetrated by genius hacker masterminds. Instead, it took advantage of the lazy, patchwork way organizations handle security and the seamy roles that the National Security Agency (NSA) and big tech companies play in undermining security in the internet age. And that, in fact, is a piece of good news. ..
|23/05 5:05 am||25% off Pac-Man Connect and Play With 12 Classic Games - Deal Alert |
Bandai's Pac-Man Connect and Play brings back your favorite classic video games right to your television. Connect the included cords directly into your television A/V jacks, and head back in time. Featuring 12 Classic games like: Pac-Man, Pac-Man Plus, Bosconian, Galaxian, Mappy, Super Pac-Man, Galaga, Dig Dug, New Rally X, Pac & Pal and Xevious. Not to mention, Pac-Man 256, which offers fans the chance to play the coveted level once made unavailable due to a bug in the program of the ..
|23/05 3:57 am||No, Windows XP didn't fuel WannaCry |
The global WannaCry attack that started 10 days ago touched just a handful of Windows XP PCs, a security expert said Monday, contradicting the narrative that the aged OS was largely responsible for the ransomware's crippling impact. "There were no real WannaCry infections of Windows XP," said Costin Raiu, director of Kaspersky Lab's global research and analysis team, in an interview Monday. "We've seen only a handful of cases, less than a dozen, and it looks like most of them were testers ..
|23/05 2:00 am||IDG Contributor Network: Winning the war on ransomware |
Back in the 70s, the United States suffered a severe oil shortage. Lines at the gas station filled city blocks. Thieves siphoned gasoline not to save money but time. In response, the federal government created a measurement, miles per gallon. Since then, MPG has become a factor in many car purchase decisions. Today, fuel efficiency has improved threefold, and we have hybrid and electric cars. We are facing another crisis that threatens our way of life ransomware . Cybercriminals hold hostage ..
|23/05 12:46 am||60% off AUKEY USB-C to HDMI Adapter, 4k 1080p Support - Deal Alert |
Compatible with the new Macbooks, Chromebooks , this reversible connector from Aukey is USB-C to HDMI. Mirror or extend your display and experience the lightning fast data transfer speeds that come with this new generation of USB technology. The adapter's typical list price of $39.99 has been reduced 60% down to just $15.99. See this deal on Amazon . To read this article in full or to leave a comment, please click here
|23/05 12:05 am||Save 24% on Amazon's Echo Dot By Buying Certified Refurbished Right Now - .. |
Echo Dot is a hands-free, voice-controlled device with a small built-in speakerit can also connect to your speakers or headphones over Bluetooth or through a 3.5 mm audio cable to deliver stereo sound to the speakers you choose. Dot connects to the Alexa Voice Service to play music, make calls, send and receive messages, provide information, news, sports scores, weather, instantly.Echo Dot can hear you from across the room, even while music is playing. When you want to use Echo Dot, just say ..
|22/05 11:15 pm||IDG Contributor Network: Automation and the end of accounting |
Recently Ive been spending time looking at the various initiatives that the accounting software vendors have in terms of applying automation (via artificial intelligence) to their core offerings. While my assessment is that there is little happening in the enterprise space around this topic, in the small- and mid-sized accounting space there is huge amounts of work being done on this. I have seen development from a number of the main players in the space aligned to this automation theme and ..
|22/05 9:35 pm||47% off Pecham Vertical Stand for PS4 with Cooling Fan and Dual Controller .. |
Keep your PS4 or PS4 Slim compact, organized and functioning properly with this vertical stand from Pecham. It features an integrated cooling fan, dual controller changing and a USB hub for powering & charging your phone or other devices as needed. Pecham's stand currently averages 4.6 out of 5 stars from over 185 people on Amazon (82% rate the full 5 stars: read reviews here ), where its list price of $29.99 has been reduced 47% to just $15.99. See this deal now on Amazon . To read this ..
|22/05 9:18 pm||Leak: Secret Facebook rules on what violence, self-harm and child abuse .. |
Facebook allows users to livestream self-harm, post videos of violent deaths and photos of non-sexual child abuse, but comments which threaten to harm President Donald Trump are to be deleted, according to Facebooks secret rule books for monitoring what its 2 billion users can post. The Guardian got hold of leaked copies of over 100 internal Facebook manuals and documents that tell moderators how to handle content which includes violence, sex, hate speech, terrorism, nudity, self-harm, revenge ..
|22/05 7:00 pm||IDG Contributor Network: Amazon successfully fights off pricebots |
One big downside of the plethora of e-commerce shopping bots out there today is that they create the impression of a difference when there may not be one. If I may give my two cents worth, is a two-cent difference meaningful, especially when shipping prices are far more than that? Significant difference or not, shoppers love them. And even more importantly, they act on them. When a bot lists a product and shows 20 different sites, the ranking by lowest price is almost always selected. After ..
|22/05 6:48 pm||WWDC 2017: 10+ predictions for enterprise IT |
There is little argument that Apples solutions have entered the cutting edge of enterprise IT , empowering digital transformation across some of the worlds biggest companies . With this in mind I thought it might be interesting to put together just a few details concerning Apples enterprise-focused improvements you can expect to see revealed at the companys Worldwide Developers Conference next month . To read this article in full or to leave a comment, please click here
|22/05 6:00 pm||For enterprise protection, antivirus software is no longer enough |
Antivirus software to protect corporate systems from malware is like a flu shot. You should have it, but it won't likely protect you from every strain of the flu. To read this article in full or to leave a comment, please click here (Insider Story)
|And that's why we troubleshoot first |
IT support pilot fish who works for a public library system gets a work order from one of the branches: One of the PCs that's available for public use is making a beeping sound. "Trying to troubleshoot the device, I asked the onsite staff to be sure that there wasn't something on the keyboard that might be pushing down a key," says fish. "I had them clean the keyboard. I asked if there was a pattern to the beeping. Just random beeping, they said. "They were getting ready to open the library and ..
|22/05 8:37 am||Windows Defender does not defend Windows 7 against WannaCry |
Thanks to Kaspersky, we now know that 98% of the Windows machines infected by WannaCry/WannaCrypt were running Windows 7 . Since, once it gets a foothold, the malware can infect an entire network, most of the attention was focused on LAN based attacks. My previous blog was about using the Windows firewall as a defensive measure. But any malware can spread in multiple ways so there is always a need for anti-malware software on Windows PCs. The May 12th blog post, Customer Guidance for WannaCrypt ..
|20/05 7:00 pm||Google, A.I. and the rise of the super-sensor |
Google dazzled developers this week with a new feature called Google Lens. Appearing first in Google Assistant and Google Photos, Google Lens uses artificial intelligence (A.I.) to specifically identify things in the frame of a smartphone camera. In Google's demo, not only did Google Lens identify a flower, but the species of flower. The demo also showed the automatic login to a wireless router when Google Lens was pointed at the router barcodes. And finally, Google Lens was shown identifying ..
|20/05 4:37 am||The ransomware epidemic: How to prep for a shakedown |
'Know your enemy' understanding what to prepare for Image by Reuters While ransomware isn't new, this once-simple criminal hacker tactic has morphed into a devastatingly effective weapon wielded by more advanced cyber-criminals -- as seen with the recent Wannacry outbreack . These sophisticated attackers are highly motivated by the profitable nature of their efforts. Dan Larson, technical director at CrowdStrike , looks at the current state of ransomware, why organizations should take threats ..
|20/05 4:04 am||Microsoft does enterprise no favors when it won't explain Windows 10's .. |
Microsoft has failed to explain to corporate customers the repercussions of the twice-a-year schedule that will deliver Windows 10 upgrades each March and September, an analyst argued today. There are too many uncertainties about the upgrade schedule, a critical part of Microsoft's "Windows as a service" model, said Michael Cherry, analyst with Directions on Microsoft. [ Related: Fix Windows 10 problems with these free Microsoft tools ] "Customers shouldn't have to figure this out," Cherry ..