74% off Omaker M4 Portable Bluetooth Shower and Outdoor Speaker with 12 Hour Playtime - Deal Alert

The M4 speaker from Omaker is IP54 rated, so its rugged splash, shock and dustproof design makes it ideal for shower and outdoor use. The latest Bluetooth 4.0 technology helps it pair quickly with your device (tap-to-pair with NFC capable devices) and maintain a long 33-foot connection range. Crystal clear sound quality and robust bass is realized through a 3W audio driver and passive subwoofer. The M4 is capable of producing 12 hours of music at 80% volume, up to three times longer than similar-sized portable speakers. It  fully recharges in just 3 hours using an included Micro USB cable. The unit averages 4.5 out of 5 stars from over 5,000 people on Amazon (read reviews), many of which report sound quality that rivals more expensive speakers. Amazon indicates that its list price has been reduced significantly to just $22.99. See the discounted Omaker M4 speaker now on Amazon.To read this article in full or to leave a comment, please click here

Posted on: 24 May 2017 | 4:05 pm

Gravityscan, keeping WordPress sites safe

If your website, in common with roughly 25% of all websites, is running WordPress then it's pretty much certain that it's being constantly attacked. WordPress is to hackers what raw meat is to jackals because unless sites are assiduously maintained, they quickly become vulnerable to a huge number of exploits.The root cause of this vulnerability is WordPress' ecosystem of complex core software augmented by thousands of third party developers whose themes and plugins are often buggy and not quickly (or often, never) updated to fend off known security problems. Add to that many site owners being slow to update their core WordPress installation and you have an enormous and easily discovered collection of irresistible hacking targets.To read this article in full or to leave a comment, please click here

Posted on: 24 May 2017 | 3:34 pm

Top 20 AI experts you should follow on Twitter

As artificial intelligence (AI) increases in importance in new technology and applications, several people have risen to the top of the field—achieving expert-level status and providing insight into breakthroughs, new applications and ideas about the technology.The people on this list are an interesting collage with very different backgrounds. Some are traditional AI Ph.D. scholars who have slogged through research long before AI’s recent resurgence. Others are cross-over experts from one advanced science who saw the benefit of AI in their research and became experts in a second field. + Also on Network World: What AI can and cannot do today + The short summaries of each persons’ biographical information add depth to the tweets. The biographical information was extracted from public sources, such as Twitter, LinkedIn, Wikipedia, university websites, Crunchbase and business websites. Given the suspicions about the authenticity of news stories, the biographical information about each person adds a level of diligence to choose if the reader finds personal value in following one of them.To read this article in full or to leave a comment, please click here

Posted on: 24 May 2017 | 2:51 pm

10 more killer Raspberry Pi projects

Prolific developers of Raspberry PiImage by Mark GibbsWelcome to the third collection of Killer Raspberry Pi Projects. Our first and second collections were such a hit that we just had to produce another. There are so many interesting applications of the Raspberry Pi it's getting hard to pick and choose but, once again, we've sorted the wheat from the chaff to bring you ten more projects that embody the creativity and enthusiasm that defines the Raspberry Pi market. We have animatronic horror driven by Alexa, toy cars driven by deep learning, a couple of display projects, and cats recognized and monitored by Raspberry Pis. In short, more RPi goodness than you can shake a stick at.To read this article in full or to leave a comment, please click here

Posted on: 24 May 2017 | 2:23 pm

iPhone 8 might be cheaper than we thought

Apple's upcoming iPhone 8 is going to be jam-packed with all sorts of advanced technologies and compelling new features. Of course, the most obvious change will be the iPhone 8's brand new form factor. Seeing as how the iPhone form factor hasn't really changed at all since the iPhone 6 and iPhone 6s Plus were released in 2014, the iPhone 8 will finally provide users with a fresh new design.Hardly a secret at this point, the iPhone 8 will feature an edgeless OLED display wherein the entire front face of the device will be the display. As for the home button and the Touch ID sensor, rumor has it that Apple has figured out a way to embed these into the display itself. The end result is that the iPhone 8 will essentially look like one giant piece of glass, which, interestingly enough, has long been Jony Ive's vision of an ideal iPhone design.To read this article in full or to leave a comment, please click here

Posted on: 24 May 2017 | 1:32 pm

IDG Contributor Network: Why we need more shades of gray

Few things in life can be expressed in black and white terms. Sure, a light switch is either on or it's off; one baseball team wins the World Series each year and one doesn't; and every line of computer binary starts with either a one or a zero.Most of the time, though, our lives are full of gray areas, not absolutes. Brent crude almost never drops below $40 a barrel, but it did happen once and the chances of it happening again are greater than zero. There may be a 60 or 70 percent chance of rain tomorrow, but it's rarely 100 percent. And, sometimes, even the Chicago Cubs win the World Series.So why is it that security practitioners often treat their threat environment as if it's black or white, rather than a spectrum of possible states or probable outcomes — even when this binary view diminishes the quality of their comprehension and decision-making and thus jeopardizes their actual security?To read this article in full or to leave a comment, please click here

Posted on: 24 May 2017 | 11:15 am

22% off Taotronics Universal Smartphone Bike Mount - Deal Alert

The Taotronics phone mount is easy to install and features a fully adjustable viewing angle, non-slip rubber grips and a one-button phone release mechanism. It averages 4.5 out of 5 stars on Amazon (read reviews), where its list price of $15.99 has been discounted 22% to $12.49. See this deal now on Amazon.To read this article in full or to leave a comment, please click here

Posted on: 24 May 2017 | 11:10 am

Top 5 Reasons IoT projects fail

If you’re doing an Internet of Things deployment, prepare for failure. That’s the overarching takeaway from a survey Cisco conducted of more than 1,800 IT leaders in the U.S. and U.K.Up to 60% of IoT projects that respondents started stalled at the proof of concept phase, Cisco found. Just 26% of respondents said they had what they considered a successful IoT deployment. So where do IoT projects go south?+MORE AT NETWORK WORLD: Cisco: Secure IoT networks, not the devices +To read this article in full or to leave a comment, please click here

Posted on: 24 May 2017 | 10:50 am

IDG Contributor Network: Machine learning: Are we there yet?

In my recent blogs, I have written about automation tying the network to other domains of IT, and how it’s a capability available today that you should start using.Machine learning is another hot topic. While the timeline is several years out for many machine learning applications in networking, it has the potential to be one of those rare technologies that comes along every few decades and fundamentally transforms how networks run.To read this article in full or to leave a comment, please click here

Posted on: 24 May 2017 | 9:00 am

Hackers can use malicious subtitles to remotely take control of your device

Do you use Kodi, Popcorn Time, VLC or Stremio? Do you use subtitles while you watch? If so, then you need to update the platform as Check Point researchers revealed that not all subtitles are benign text files and hackers can remotely take control of any device running vulnerable software via malicious subtitles.The attack is not in the wild, since Check Point developed the proof of concept attack vector; however, with news of the attack vector and an estimated 200 million video players and streaming apps running vulnerable software, attackers might jump on the malicious subtitle wagon to gain remote access to victims’ systems.To read this article in full or to leave a comment, please click here

Posted on: 24 May 2017 | 8:48 am

IDG Contributor Network: PureSec picks up investment because serverless is exciting

While in Israel late last year, I caught up with Shaked Zin and Avi Shulman, co-founders of security company PureSec. PureSec was in a bit of a conundrum. It was doing important work but in a space that was still nascent: serverless computing. As such, it was having a hard time both articulating its value proposition and getting investors to understand and commit to their story.I found this conundrum interesting. Serverless computing is, after all, pretty high on the hype cycle. Ever since Amazon Web Services (AWS) introduced the notion of serverless via its Lambda offering a few years ago, all vendors have been rushing to commercialize their own serverless offering.To read this article in full or to leave a comment, please click here

Posted on: 24 May 2017 | 8:00 am

The AI fight is escalating: This is the IT giants' next move

Artificial intelligence is where the competition is in IT, with Microsoft and Google both parading powerful, always-available AI tools for the enterprise at their respective developer conferences, Build and I/O, in May. It's not just about work: AI software can now play chess, go, and some retro video games better than any human -- and even drive a car better than many of us. These superhuman performances, albeit in narrow fields, are all possible thanks to the application of decades of AI research -- research that is increasingly, as at Build and I/O, making it out of the lab and into the real world.Meanwhile, the AI-powered voice technologies behind virtual assistants like Apple's Siri, Microsoft's Cortana, Amazon.com's Alexa and Samsung Electronics' Bixby may offer less-than-superhuman performance, but they also require vastly less power than a supercomputer to run. Businesses can dabble on the edges of these, for example developing Alexa "skills" that allow Amazon Echo owners to interact with a company without having to dial its call center, or jump right in, using the various cloud-based speech recognition and text-to-speech "-as-a-service" offerings to develop full-fledged automated call centers of their own.To read this article in full or to leave a comment, please click here

Posted on: 24 May 2017 | 4:07 am

BrandPost: How Close Are We To The Self-Driving WAN?

In my last few blogs I’ve talked about the journey from the Software Defined WAN to the Self-Driving WAN. Applying artificial intelligence and machine learning to the WAN might seem futuristic, but it’s already happening with our Unity EdgeConnect SD-WAN solution. A great example is our revolutionary First-packet iQ application classification technology which we announced at the end of March.Traditional Application ClassificationTo read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 7:17 pm

Cisco: Secure IoT networks, not the devices

With networking pros unable to trust the security of Internet of Things devices, Cisco says they should focus on implementing network-based security protections that limit the blast radius of IoT security breaches.This week Cisco unveiled a new package named IoT Threat Defense at the company’s IoT World Forum in London. IoT Threat Defense combines seven separate offerings, including network-segmentation rule creator TrustSec, network behavior analytics platform Stealthwatch and device-visibility offering named Cisco Identity Service Engine. +MORE AT NETWORK WORLD: 8 Tips to secure IoT devices | IoT security guidance emerges +To read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 6:14 pm

38% off Inateck USB 3.0 to IDE/SATA Hard Drive Adapter - Deal Alert

This USB 3.0 adapter from Inateck can interface with up to three drives simultaneously. It is compatible with 2.5"/3.5" IDE/SATA hard drives and 5.25" IDE/SATA CD/DVD drives, and features a one-touch backup function. Use it to read an old internal drive from a crashed computer, or to use an internal drive similar to an external backup drive. You might find a lot of uses for this one. The typical list price of $47.99 has been reduced on Amazon 38% right now to $29.99. See this deal on Amazon.To read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 4:17 pm

Forget the plus-sized screen, the regular iPhone is the best fit

Like a lot of people, I found myself getting a sore neck and eyes from squinting at a smartphone screen for too long. It’s not that the iPhone 6 has a small screen relative to the market, it’s just that prolonged staring at the screen really isn’t a good idea to anyone but a chiropractor looking to boost his business. I had fiddled with the iPhone 6s Plus in the local Best Buy, and I liked what I saw. Also, it didn’t feel too cumbersome in my hand, so I decided to go for it. The iPhone 7 was out. The removal of the headphone jack was a deal-breaker for me. + Also on Network World: One-third of iPhones are the Plus model + I purchased a used iPhone 6 Plus through Glyde, which acts as an intermediary between buyers and sellers of devices like smartphones, tablets and laptops. Swapping phones was easy in my situation. I am with AT&T, which uses a SIM chip. All I had to do was pop the chip out of the old phone and insert it in the new one, and I had service. I restored the app and settings backup from the old phone on the new one, and I was off to the races. To read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 2:04 pm

IDG Contributor Network: SD-WANs lost my voice

If there’s one application that brings chills to the hearts of SD-WAN implementers it’s providing a predictable real-time voice service. So let’s talk about how SD-WANs might help.The problem with voice We need to separate from the theory of voice and the reality of voice. The theory goes something like this. The Internet is fine for email and web browsing. It’s even pretty good for personal voice. But if I want to deliver a voice service, day-in-day out without a hiccup, then I run into a problem. Voice is a real-time protocol with strict tolerances around latency, loss and jitter. Exceed those tolerances and symptoms common to a poor voice service set in. Increased delays from traffic routing or lost packets disrupt voice calls. Outages and brownouts can cause calls to drop.To read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 2:00 pm

58% off RAVPower Portable Multi-Functional Power Bank with 9000mAh Built-in Apple Lightning Connector and AC Plug - Deal Alert

The RAVPower Savior 9000mAh portable charger has both a built built-in Apple Lightning Connector and a foldable two prong wall plug so you don't need to bring an extra cable to charge your Apple Device.  The additional USB output is 1A & Lightning output is 2.4A - this means you can have incredible charging speeds up to 3.4A To read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 1:01 pm

IDG Contributor Network: Do you know where your data is?

Modern businesses must be agile, flexible and innovative. Business leaders are always looking for the next opportunity and speed is of the essence. Whether they’re looking to scale up quickly for a new project, or seeking to harness the benefits of the latest and greatest technology, it’s often necessary to go beyond company walls and sign up with a vendor for new software or services.You may have spent considerable resources to ensure that your security is strong, but what about your third-party vendors? We’ve discussed how cybersecurity is only as strong the weakest link before, but sometimes that weak link is a partner.To read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 1:00 pm

35% off Anker Phone Camera Lens Kit With Fisheye, 0.65x Wide Angle, 10x Macro - Deal Alert

This multi-functional camera lens kit works on most standard sized smartphones including the iPhone 7 (excluding Plus), and brings even more life to your photos with 180-degree fisheye, 0.65x wide angle and 10x macro lenses. It currently averages 4 out of 5 stars on Amazon, and its list price of $20 has been reduced 35% to just $13. See the lens kit now on Amazon.To read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 12:42 pm

IDG Contributor Network: 6 ways to manage your data – and team

Decision making comes with its challenges as it’s part of a process of nurturing a variety of perspectives, usually by encouraging discussion and debate. However, when competing points of view are left unmanaged, it can easily – and without warning – digress into an unhealthy conflict. Proponents are often passionate about their views and become blind to certain, inconvenient, facts.Today, data has become a reliable arbiter for such debates. This is why business intelligence (BI) has emerged as crucial to the decision making process. BI provides actionable insights that are based on numbers. A growing number of organizations are recognizing its value. In 2016, 73 percent of businesses increased their analytics capabilities.To read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 12:00 pm

IDG Contributor Network: Educating the public about security – are we doing it all wrong?

In 2016 consumers were exposed to a larger number of high profile data breaches than any year previously. According to the Breach Level Index, 1,792 data breaches led to almost 1.4 million data records being compromised worldwide, an increase of 86% compared to 2015. Identity theft was the leading type of data breach last year, accounting for 59% of all data breaches. These numbers have helped raise public awareness around the serious threats to personal data that exist in the modern era, and awareness is also growing for some of the solutions that businesses and individuals can use to minimize the risks from data breaches. But is it enough?To read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 11:35 am

IDG Contributor Network: How security executives can feel comfortable in the boardroom and server room

With information security being a major concern at all companies, successful security executives need to be equally comfortable in the boardroom and the server room. While being well-versed in traditional security duties, like developing incident response plans and knowing what technology will keep the bad guys at bay, is still essential, CISOs and CSOs also need to know how security factors into the business’ operations.Three skills that are essential for future leaders to master are being able to clearly articulate the importance of security to non-technical executives, show how security can help a company achieve its business goals and balance security with innovation. These skills are consistently mentioned by CEOs and CSOs when we’re discussing how business and security leaders can work better together.To read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 11:15 am

IDG Contributor Network: Avoiding a data disaster: could your business recover from human error?

“Data.” Ask senior management at any major organization to name their most critical business asset and they’ll likely respond with that one word.As such, developing a disaster recovery strategy – both for data backup and restoration – is a central part of planning for business continuity management at any organization. It is essential that your company and the vendors you work with can protect against data loss and ensure data integrity in the event of catastrophic failure – whether from an external event or human error.Think about this: What would you do if one of your trusted database administrators made a mistake that wiped out all of your databases in one fell swoop? Could your business recover?To read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 11:00 am

IDG Contributor Network: Doesn’t the cloud solve all of my performance issues?

I have heard it said many times that the cloud can solve all of our performance issues. There are two reasons why this claim is not necessarily true: A misunderstanding of the difference between performance and scalability. Performance remains application-dependent. Performance versus scalability The terms performance and scalability are sometimes used interchangeably, but in actuality they have very distinct differences. The important distinction between the terms is that performance is a measure of a data point, such as the response time of a request, the amount of CPU or memory that a request needs, etc. Scalability, on the other hand, measures your application’s ability to maintain its performance as load increases. In other words, if you can service a single request in 500ms, can you service 1000 requests at 500ms each or does the response time degrade as your load increases?To read this article in full or to leave a comment, please click here

Posted on: 23 May 2017 | 11:00 am