What's really new in SharePoint 2016?

The SharePoint community has reacted with enthusiasm to Microsoft’s roadmap for SharePoint 2016, even though much of it is familiar to anyone who’s been using SharePoint for a while. It’s so confusingly familiar, in fact, that you may find yourself asking whether that wasn’t what SharePoint already did or wondering what else SharePoint was trying to do.To read this article in full or to leave a comment, please click here(Insider Story)

Posted by on 31 May 2016 | 8:52 am

Apple is said to be extending iPhone refreshes to once every three years

Apple is looking to make evolutionary rather than revolutionary changes to its iPhone this year as it extends the major refresh cycle to once every three years, according to a report in Tuesday's Nikkei newspaper. The change, which the newspaper said Apple is "likely" to make, is due to there being little room left for major advances in smartphone hardware -- at least until an entirely new technology comes on the scene. As chips get faster and software gets better, the benefits seen by annual upgrades are getting smaller.MORE: 10 mobile startups to watch Nikkei said this year's model will look "almost identical" to the iPhone 6 and have minor changes such as improved camera quality, water resistance and a better battery. The headphone jack is also slated to be removed, it said.To read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 8:49 am

Effective IT security habits of highly secure companies

When you get paid to assess computer security practices, you get a lot of visibility into what does and doesn’t work across the corporate spectrum. I’ve been fortunate enough to do exactly that as a security consultant for more than 20 years, analyzing anywhere between 20 to 50 companies of varying sizes each year. If there’s a single conclusion I can draw from that experience, it’s that successful security strategies are not about tools -- it's about teams. With very good people in the right places, supportive management, and well-executed protective processes, you have the makings of a very secure company, regardless of the tools you use. Companies that have an understanding of the importance and value of computer security as a crucial part of the business, not merely as a necessary evil, are those least likely to suffer catastrophic breaches. Every company thinks they have this culture; few do.To read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 8:48 am

Master Class (with video): To deliver more personalized healthcare, ditch the manuals

At St. Joseph Health, David Baker has made it his mission to give patients a more personalized and transparent experience in the way they communicate with the healthcare facility, either through interactions with their doctors or simply setting up their next medical appointment.To read this article in full or to leave a comment, please click here(Insider Story)

Posted by on 31 May 2016 | 8:46 am

15 tips to get the most from your HTC 10

Make a good phone even betterImage by Ryan WhitwamHTC knew it had something to prove with the HTC 10, and it's a very good phone. It has solid performance, excellent design, and the latest Sense interface is only a mild change from stock Android. Even with all its good points, you can make your new HTC 10 even better. We've got 15 tips and tricks to make the HTC 10 the best device it can possible be.To read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 8:45 am

Will your backups protect you against ransomware?

In theory, nobody should be paying any money to the ransomware extortionists. Doesn't everyone have backups these days? Even consumer has access to a wide variety of free or low-cost backup services. But the headlines are full of reports about institutions such as hospitals and police departments, organizations that should have business continuity plans in place with solid backup strategies.To read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 8:44 am

How to increase your project management knowledge

With 10 interconnected knowledge areas that incorporate the use of 47 processes organized into five process groups, project management can be a multifaceted maze to navigate. Developing a deeper understanding of this discipline can be an all-consuming and intimidating task at times, and just trying to find out where to turn for training can feel overwhelming.5. Professional books and articlesTo read this article in full or to leave a comment, please click here(Insider Story)

Posted by on 31 May 2016 | 8:43 am

Laptop updaters riddled with security holes

A recent test of pre-installed updater software on 10 laptops showed that every single one had security problems."We went and bought about 10 laptops," said Darren Kemp, security researcher at Duo Security. "And every single vendor had their own piece of software to perform software updates, including the Microsoft Signature Editions, and they were all pretty terrible."For example, some laptop manufacturers weren't using encryption in their updaters."We found exploitable vulnerabilities in every vendor," he said.We found exploitable vulnerabilities in every vendor. Darren Kemp, security researcher at Duo SecurityTo read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 8:41 am

80% off XML & Ajax Programming Bootcamp - Deal Alert

Add These Critical Skills to Your Coding Resume with 34 Hours of Training. Discounted for a limited time from $199 to just $39.

Posted by on 31 May 2016 | 8:25 am

IDG Contributor Network: Alibaba invests in ecommerce search game

Ecommerce vendors are increasingly under pressure to deliver the most relevant products to site visitors. As choices available to consumers increase, so too does the requirement to filter the myriad of options and offer the most relevant products in response to a consumer's search. It is for this reason that ecommerce search tools from companies such as SLI Systems are increasingly important.Another player in the space is stealth Israeli company Twiggle. Twiggle combines the buzzwords du jour—machine learning, artificial intelligence and natural language processing—and delivers them within the context of ecommerce search.To read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 8:00 am

Startup Nervana joins Google in building hardware tailored for neural networks

At the MIT EmTech Digital conference, startup Nervana announced plans to design and build a custom ASIC processor for neural networks and machine learning applications that the company’s CEO, Naveen Rao, claims will run 10 times faster than graphic processor units (GPU).The news comes after Google last week announced it had secretly deployed its neural network and machine-learning-tailored processors in its data centers about a year ago. The company reported that its custom processor had improved performance by an order of magnitude. Google’s approach and improvements in performance validate Nervana’s technical strategy.To read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 7:00 am

65 million Tumblr account records are up for sale on the underground market

A few weeks ago, Tumblr notified users of a data breach that resulted in the theft of user email addresses and hashed passwords. The company did not say how many accounts were affected, but recently someone put the data up for sale and the number is: 65 million records.The data is being sold on a Tor dark market website called TheRealDeal by a user named peace_of_mind who also sold 167 million user records stolen from LinkedIn. Recently he also posted offers for 360 million accounts allegedly stolen from MySpace and 40 million from adult dating website Fling.com.To read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 6:45 am

IDG Contributor Network: Components of modern hacking operations

During my conversations with security executives, a topic that consistently comes up is what, exactly, constitutes a modern hacking operation. Security professionals understand they’re no longer facing script kiddies who lack a comprehensive plan. However, they’re also not fully aware of how detail-oriented adversaries are when developing an attack campaign.Today’s hacking operations are well-organized and developed by well-funded teams of highly trained adversaries who have diverse experiences and backgrounds. In fact, attack planning is handled like a business operation and includes hiring plans, budgets and timelines.To help security professionals better understand the attacks they’re facing, I thought I’d share some of my observations on the work that goes into planning a hack.To read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 6:30 am

Cisco’s evolution: Technology and branding changes over the years

From niche router vendor to all things networkingCisco’s new campaign “There’s Never Been A Better Time” urges everyone to consider how the network can solve the world’s biggest problems. The company is on a mission to change the world, but it didn’t start out that way. As Cisco evolved from a niche router vendor to the de facto standard for all things networking, so too has its message to the world.    To read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 6:00 am

Overclockers have pushed Intel's new Broadwell chip to 5.7GHz

Intel's new 10-core Broadwell-E gaming chip is only a few hours old, but already overclockers have pushed a 3GHz version of the chip to 5.7GHz and they say they're only just getting started.Overclocking is the process by which software commands and extreme cooling are used to push processors to run faster than they are typically designed to run -- the chip equivalent of putting your foot on the gas and flooring it while keeping your car under control.At an overclocking event at the Computex trade show in Taipei on Tuesday, large tanks of liquid nitrogen stood on the ready to help overclockers keep the processors cool.To read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 5:19 am

Review: Hot new tools to fight insider threats

In the 1979 film When a Stranger Calls, the horror is provided when police tell a young babysitter that the harassing phone calls she has been receiving are coming from inside the house. It was terrifying for viewers because the intruder had already gotten inside, and was presumably free to wreak whatever havoc he wanted, unimpeded by locked doors or other perimeter defenses. In 2016, that same level of fear is being rightfully felt towards a similar danger in cybersecurity: the insider threat.To read this article in full or to leave a comment, please click here(Insider Story)

Posted by on 31 May 2016 | 5:00 am

3 top tools to fight insider threats

Lurking insideImage by Flickr/Dennis SkleyWe tested three products, each concentrating on a different aspect of the insider threat problem. Fortscale did an amazing job protecting a traditional network. Its machine learning capabilities and concentration on access and authentication logs gives it an extremely high accuracy rate. Cloud-based insider threats can be even harder to detect, yet Avanan uniquely protects against threats related to trusted insiders within the cloud. PFU Systems applies insider threat security to mobile devices with their iNetSec system. (Read the full review.) Here are the individual reviews:To read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 5:00 am

Intel beefs up VR ammo with Extreme Edition Core i7 chips

Intel considers virtual reality a key growth vector as it reshapes to survive in a post-PC world, and new Core i7 Extreme Edition chips will play a big role in that transition.The new chips, code-named Broadwell-E, are speed demons with up to 10 cores, a new high for Intel PC chips. Primarily for gaming PCs, the new chips will also go in desktops certified to work with headsets like Oculus Rift and HTC Vive.The Core i7-6900 series and 6800 series chips are targeted at enthusiasts looking for the latest and greatest technologies in PCs. These chips can be overclocked and unlocked, which could instantly upgrade PC performance by cranking up CPU frequency.To read this article in full or to leave a comment, please click here

Posted by on 31 May 2016 | 1:00 am

Stealth Falcon group uses custom spyware, fake journalists to target UAE dissidents

Meet Stealth Falcon, a sophisticated and likely state-sponsored cyberespionage group, which is hell bent on conducting targeted spyware attacks “against Emriati journalists, activists and dissidents.” The digital attacks started in 2012 and are still being carried out against United Arab Emirates (UAE) dissidents. It’s not “just” spying with custom spyware that leads to dissidents being “arbitrarily detained;” once identified as criticizing the authorities, UAE dissidents can be forcibly disappeared.“The UAE has gotten much more sophisticated since we first caught them using Hacking Team software in 2012,” Bill Marczak, a senior researcher at Citizen Lab told the New York Times. “They've clearly upped their game. They're not on the level of the United States or the Russians, but they're clearly moving up the chain.”To read this article in full or to leave a comment, please click here

Posted by on 30 May 2016 | 12:14 pm

Move over Skylake: An Asus PC with Intel's Kaby Lake chip is coming in Q3

The wait for Intel's Kaby Lake chip will end in the third quarter this year, as the first PC with the 7th Generation Core chip was announced at Computex. Kaby Lake, the successor to Intel's Skylake Core processor chips, will be in the Asus Transformer 3 tablet. The device is much like Microsoft's Surface Pro 4, and will ship in the third quarter starting at US$799, according to a blog entry on Microsoft's website. The Transformer 3 was among a gaggle of PC and phone products announced by Asus at Computex. No other Kaby Lake PC has been announced yet, but expect Lenovo, HP, Dell and others to follow suit.To read this article in full or to leave a comment, please click here

Posted by on 30 May 2016 | 9:40 am

Nvidia chief downplays challenge from Google’s AI chip

Nvidia has staked a big chunk of its future on supplying powerful graphics chips used for artificial intelligence, so it wasn't a great day for the company when Google announced two weeks ago that it had built its own AI chip for use in its data centers.Google's Tensor Processing Unit, or TPU, was built specifically for deep learning, a branch of AI through which software trains itself to get better at deciphering the world around it, so it can recognize objects or understand spoken language, for example.To read this article in full or to leave a comment, please click here

Posted by on 30 May 2016 | 8:21 am

Flaw in popular WordPress plug-in Jetpack puts over a million websites at risk

Owners of WordPress-based websites should update the Jetpack plug-in as soon as possible because of a serious flaw that could expose their users to attacks.Jetpack is a popular plug-in that offers free website optimization, management and security features. It was developed by Automattic, the company behind WordPress.com and the WordPress open-source project, and has over 1 million active installations.Researchers from Web security firm Sucuri have found a stored cross-site scripting (XSS) vulnerability that affects all Jetpack releases since 2012, starting with version 2.0.The issue is located in the Shortcode Embeds Jetpack module which allows users to embed external videos, images, documents, tweets and other resources into their content. It can be easily exploited to inject malicious JavaScript code into comments.To read this article in full or to leave a comment, please click here

Posted by on 30 May 2016 | 8:00 am

New products of the week 5.30.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.Actiance Platform for the healthcare and pharmaceutical industriesKey features: The Actiance Platform addresses communications challenges for healthcare and pharmaceutical organizations in the midst of changing regulations by ensuring companies meet industry-specific data retention and security requirements. With the Actiance Platform for the healthcare and pharmaceutical industries, organizations can embrace new communications channels while protecting data and ensuring compliance. More info.To read this article in full or to leave a comment, please click here

Posted by on 30 May 2016 | 4:57 am

Iran orders messaging apps to store data of local users in the country

Iran has ordered foreign messaging apps to transfer data and activity records of Iranian users to local servers within a year, a move that will give the country a greater ability to monitor and censor the online activity of its people.The country’s Supreme Council of Cyberspace has issued instructions to foreign messaging companies active in the country, requiring them “to transfer all data and activity linked to Iranian citizens into the country in order to ensure their continued activity," news reports said quoting state-run media.Social media platforms such as Twitter and Facebook are already blocked in the country whose government holds a tight control over Internet access by its people.To read this article in full or to leave a comment, please click here

Posted by on 30 May 2016 | 1:34 am

Microsoft CEO Satya Nadella follows Apple’s Tim Cook to India

Microsoft’s CEO Satya Nadella is visiting India, reflecting the growing importance of the country as a market for multinational technology companies. Nadella’s visit follows the first trip to India by Apple CEO Tim Cook, who visited the country this month to drum up support for the company’s plans to offer refurbished iPhones in the price-sensitive market as well as to get permission to set up its wholly-owned stores in the country. Both deals appear to have been blocked by regulators, according to reports. While Apple was largely seen as lacking focus on India until recently, when its China revenue fell 11 percent, while iPhone sales in India grew 56 percent year-on-year in the last quarter, Microsoft has been a long-time player in the Indian market.To read this article in full or to leave a comment, please click here

Posted by on 29 May 2016 | 9:50 pm