Office 365's spam filter gets smarter at sorting bulk mailings

In time for the holiday shopping season, Microsoft has refined how Office 365 handles bulk promotional emails from vendors like Amazon, eBay and Macy’s.Those messages, which contain special offers, newsletters and other sales incentives, fall into a gray area between legitimate email and obvious spam. Depending on a variety of factors, recipients sometimes find them useful and other times annoying.Now, Microsoft has added what it describes as a “simple, intuitive control” to the Exchange Online Protection (EOP) security engine in Exchange Online so that Office 365 admins can fine-tune the treatment of these messages for their domain.EOP rates bulk messages on a scale of 1 to 9. The lower the rating, the less likely the message will be considered a nuisance by recipients. Criteria used to rate messages include whether recipients signed up for the mailings, whether the sender offers unsubscribe options and how many complaints the emails have generated.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 5:40 pm

Jolla’s open-source tablet might actually stay the course

via IndieGoGo, Jolla The Jolla Tablet, an open-source device that promises privacy, ease of use and comparable hardware to late-model Android tablets and iPads, has demolished its funding goals on IndieGoGo in just the first few days of its campaign.The project page shows a little over $1.2 million raised as of noon on Monday – well over triple Jolla’s initial goal of $380,000.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 4:19 pm

11 Black Friday deals for HP Pavilion All-in-One PCs with Windows 8.1

If you happen to have someone on your Christmas list who insists upon using a desktop PC, when in fact they don’t need a powerful machine and don’t want a laptop, then maybe an HP Pavilion All-in-One (AIO) PC is the answer? It becomes an even more attractive option if they have an ancient machine still running Windows XP – even after you’ve warned them and cut off all 24/7 family-tech support! If that sounds like you, or you are in the market for an all-in-one PC, then here’s the HP Pavilion TouchSmart and non-touch-enabled versions available for Black Friday sales or available at Black Friday prices right now.HP is currently selling Pavilion AIO PCs for prices comparable to Black Friday prices. There are three basic options that come with Windows 8 installed and a 23-inch screen. As the name implies, it’s a desktop computer that’s built all-in-one as opposed to a tower and separate monitor; it comes with a mouse and keyboard as well.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 4:12 pm

Big IT vendors mostly mum on commercial drone plans

Word that the Federal Aviation Administration might take a very hard line on commercial drone use has those with designs on such activity nervous. But as for big enterprise IT vendors, it's really hard to tell what they think because they're keeping any plans in this field very hush-hush.The Wall Street Journal reported Monday that the FAA -- tasked by Congress with coming up with rules next year -- is very likely to require operators of commercial drones (or unmanned aerial vehicles/unmanned aircraft systems) to have actual licenses that include manned aircraft experience. Other restrictions on those who might want to use UAVs/UASs take aerial photos of real estate property, cover news events or monitor agricultural or other properties could include operation only in daylight hours, line-of-site operation and flying only below 400 feet.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 3:45 pm

Intel to tame passwords with biometric authentication

Forget typing in passwords, Intel wants you to use your body to log into email and online bank accounts.McAfee software that will use biometric technology to authenticate users will be available for download by the end of the year, said Kirk Skaugen, senior vice president and general manager of the PC Client Group at Intel, last week.“Your biometrics basically eliminate the need for you to enter passwords for Windows log in and eventually all your websites ever again,” Skaugen said.Further product details were not immediately available. But one of the major inconveniences in using PCs and tablets is remembering passwords, which biometrics can tame.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 3:30 pm

Regin is groundbreaking malware on par with Stuxnet, Symantec says

Regin, a complex and stealthy piece of espionage malware, steals passwords, logs keystrokes and can read, write, move and copy files, among other malicious activity, and has stunned the Symantec researchers that detailed it in a report.“In the world of malware threats, only a few rare examples can truly be considered groundbreaking and almost peerless,” according to Symantec’s report on the threat. “What we have seen in Regin is just such a class of malware.” Be sure not to miss:To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 3:21 pm

IoT in the enterprise up three-fold, study finds

Internet of Things deployment in the enterprise has increased 333% since 2012, according to research from an Internet of Things company.Zebra Technologies, a maker of marking and printing products using RFID and real-time location services, says a study it commissioned and conducted by Forrester Research found that IoT deployment in businesses increased over threefold since 2012. Nearly 65% of its survey respondents have deployed IoT technologies in the enterprise in 2014, compared to only 15% in 2012.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 3:06 pm

NSA privacy director defends agency's surveillance

The U.S. National Security Agency’s surveillance programs are legal and under close scrutiny by other parts of the government, the agency’s internal privacy watchdog said Monday in an online Q&A.NSA surveillance and data collection programs conform to the U.S. Constitution, Rebecca Richards, the agency’s first civil liberties and privacy director, wrote during an hour-plus Q&A on Tumblr.The NSA operates under rules that “ensure that its activities fall within the parameters of the Constitution,” Richards wrote when asked why she believes the surveillance programs are constitutional.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 3:05 pm

Slack now letting employers tap workers' private chats

Slack, whose chat app aims to help workers get stuff done, might now have them running scared, knowing the boss could access their chats.The company’s upcoming paid Plus plan will include an optional feature called Compliance Exports, announced Monday, which will let administrators access their team’s communications, encompassing public and private messages.The tool is far-reaching, potentially including the edit history for workers’ messages as well as messages workers have marked for deletion, if the supervisor so desires.Workers today might expect that emails stored on their company’s computers could be looked at later. But Slack, by virtue of it being a chat service, will undoubtedly raise privacy concerns here, especially among people who use its private messaging functions.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 2:55 pm

Five top tips for Android 5.0 Lollipop

Play the hidden flappy Android gameThere's a hidden Easter Egg in Android 5.0 --- the flappy Android game. To play it, go to Settings-->About phone/tablet-->Android version. Then tap the Android version a number of times until the screen changes to a Lollipop screen. Tap the screen multiple times, then press and hold the Lollipop wording and after a while, the game appears. Tap the screen and you launch a small Android robot. You'll need to manouver it between the passing lollipops. It's a lot harder than you might think.+ ALSO ON NETWORK WORLD 12 great Lollipop APIs every Android 5.0 developer will love +To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 2:53 pm

Would Amazon Web Services ever build an on-premise private cloud?

Like some of its major competitors, would Amazon Web ever offer an on-premises private cloud management software? AWS Vice President of Marketing Ariel Kelman wouldn’t rule it out - “never say never” he said - but he added that company executives have discussed doing it, but it just doesn’t fit AWS’s business model at this time. + MORE FROM NETWORK WORLD: Gartner cloud showdown: Amazon Web Services vs. Microsoft Azure + AWS is a services business that operates at massive scale. The company has a market-leading public IaaS platform with a plethora of web services that it updates and adds to all the time. The model of a fast-changing, constantly updating cloud doesn’t work very well in an on-premises private cloud model, Kelman said.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 2:33 pm

AMD tablet development stalls as priorities change

Advanced Micro Devices’ interest in tablets has waned as the company restructures operations in an effort to turn around its finances.The tablet market is in a price battle and profit margins for chip makers are minuscule, said Kevin Lensing, senior director for mobility solutions at AMD.“We’re evaluating [tablets] closely. It’s not our priority,” Lensing said.Tablet sales are slowing, with the market concentrated around Apple, Samsung and low-cost Chinese tablet makers whose products do not play to AMD’s strength in areas such as graphics.Instead of tablets, the company is concentrating resources on products in which it has the best chance to grow, which includes PCs, Lensing said. The PC market is slowly rebounding and AMD this week announced a new line of PC chips code-named Carrizo, which use as little as 10 watts of power.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 12:40 pm

SMBs get their very own Salesforce app store

Users of Desk.com, Salesforce’s cloud-based customer service product for small and medium-size businesses, now have an app store designed just for them. Called Desk.com App Hub, the store offers 50 apps from Salesforce partner companies that handle functions including group chat, social monitoring, language translation and e-commerce analytics.Customer data from these apps can eventually be integrated with Desk.com via new technology called Canvas, a feature that can lead to better customer service, according to a Desk.com executive.Small companies use many cloud services and need to a way to centrally organize data to provide good customer service, said Leyla Seka, senior vice president and general manager of Desk.com. The challenge, though, is that many of these apps don’t work together and small companies lack the resources to integrate this information. This forces users to access multiple apps to gather relevant data, a situation that can hurt service efforts if employees miss information that’s stored across disparate cloud applications.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 12:30 pm

11 technologies Apple has killed

Out with the oldImage by REUTERS/Stephen LamOne of the things that makes Apple so successful is that it’s not afraid to abandon/kill popular technologies in the interest of something new. In doing so, the company often creates a bit of controversy, even if in the long run it seems to pan out well. At the same time, Apple’s revolutionary products have helped bring down entire product categories. Here is a rundown of technologies and products that Apple has killed (or is in the process of killing) over the last 17 years.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 12:12 pm

Breaking up Google is just one possible antritrust option, EU lawmakers say

Breaking up Google by separating its search engine from other commercial services is only one of the actions the European Commission could take to resolve the company’s antitrust problems, say members of Parliament who are proposing the split.A draft version of a European Parliament resolution, reported by news outlets over the weekend, calls on the Commission to break up Google as one way to solve competition issues with the search engine provider, which is the biggest in Europe.The Parliament is set to discuss the resolution, which also deals with a range of other European tech issues, on Wednesday in Strasbourg and vote on it on Thursday. As the resolution is still a draft, its text could still change. If adopted, it would also be non-binding though it would force a response from the Commission.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 11:25 am

Segmenting for security: Five steps to protect your network

Relying on a DMZ to protect your network and data is like putting money in a bank that depends on one guard and a single gate to secure its deposits. Imagine how tempting all those piles of money would be to those who had access — and how keen everyone else would be to obtain access. But banks do not keep cash out on tables in the lobby, they stash it in security boxes inside vaults, behind locked doors, inside a building patrolled by a guard and secured by a gate. Likewise, network segmentation offers similar security for an organization’s assets. + ALSO ON NETWORK WORLD Free security tools you should try +To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 10:42 am

Alcatel-Lucent Enterprise Unveils OpenTouch Suite for SMBs

Alcatel-Lucent Enterprise has added to its unified communications portfolio with its OpenTouch Suite for SMB, targeting the small- and medium-sized business. New features include simplified SIP support, BYOD solutions, and a flexible cloud approach.The OmniPCX Office RCE release 10 communication server offers plug-and-play voice and data deployment capability, with a PowerCPU Extended Edition that eliminates the need for a hard disk, to improve reliability. SIP deployment and public trunking solutions have removed the need for Session Border Controller, according to the company’s statement.Other new features within the unified communications foundation include multi-device unified instant messaging, along with conversation and history tracking accessible on Premium DeskPhones through web-based and mobile applications. BYOD features are supported for iOS 8 and Android 4.4.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 10:40 am

Thwarting attackers with threat intelligence

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach. News reports show cyber attacks continue to outpace IT’s ability to protect critical data, but teams that have built systems to deliver accurate threat intelligence can often end an attack before damage is done. Threat intelligence comes from commercially available information, ongoing analysis of user behavior and native intelligence from within the organization. + ALSO ON NETWORK WORLD 5 ways to escape password hell +To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 10:26 am

5 essentials of effective cloud data integration, a customer perspective

In search of agility and low overhead, companies are putting as many applications as practical in the cloud. But the resulting hybrid IT environments, where certain applications remain on-premise for security or other reasons, can result in data integration issues that reduce efficiency drags and hamper agility. In fact, cloud integration is much more demanding than many people want to believe.ALSO ON NETWORK WORLD 10 of the Most Useful Cloud Databases As an applications intelligence company that has built its customer-facing and internal operations primarily on cloud applications within a hybrid environment, AppDynamics has had considerable experience with cloud data integration. Here are the five essential data integration capabilities that any company serious about harnessing the cloud should have in its pocket:To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 10:15 am

Microsoft's Silicon Valley campus now guarded by Daleks

If you ever visit the Microsoft campus in the Silicon Valley and hear a mechanical voice shout "Ex-ter-min-ate!", don't be too spooked. It just means some geek humor has gone a little crazy.Microsoft's campus in Silicon Valley will be patrolled by a team of five security guard robots from a company called Knightscope. The robot, dubbed K5, is five feet tall, weighs 300 pounds, and looks disturbingly like the Daleks of "Doctor Who" fame.Fortunately, they are not armed with lasers. They use cameras and sensors to monitor their assigned area and look for suspicious activity. They are armed with high-definition cameras and audio recorders, able to record events and voices, analyze faces, read license plates, and even detect biological and chemical agents.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 9:49 am

Global Forum: Innovation creates opportunity, causes disruption

Geneva, Switzerland -- The 23rd Global Forum, an annual policy and strategy conference for technology leaders, was held last week in the shadow of the International Telecommunications Union’s (ITU) modernist tower. The conference theme was “opportunities and disruptions in a time of transition” and presenters repeatedly stressed that what’s occurring in the world today is a mixed bag of unprecedented technical advance amid serious social disruption. + FROM LAST YEAR'S CONFERENCE: Global Forum welcomes new era of open innovation +To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 9:47 am

'Less' means more to malware authors targeting Linux users

Using the “less” Linux command to view the contents of files downloaded from the Internet is a dangerous operation that can lead to remote code execution, according to a security researcher.At first glance, less appears to be a harmless command that outputs a file’s content to a terminal window and allows the users to navigate forward and backward through it. Less does not allow file editing, which is a job for file editors like the widely used vi, but has the benefit of displaying data on the fly without needing to load an entire file into memory. This is useful when dealing with large files.Less is frequently used to view text files, but on many Linux distributions, including Ubuntu and CentOS, it supports many more file types including archives, images and PDF. That’s because, on these systems, less is extended through a script called lesspipe that relies on different third-party tools to process files with various extensions.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 9:40 am

4 surprising tech trends we should be thankful for

In the run up to the Thanksgiving holiday, it’s customary to identify some of the things for which we want to offer our gratitude. Typically, that means family, friends, good health, and the like.That’s always a good idea, but for those of us in the technology industry or who work in IT, there are plenty of other things to be thankful for, from falling storage prices to fancy new tablets and smartphones. That’s a good idea, too, but I want to take this opportunity to give thanks for a few things that we might usually think of as problems, but can actually add significant value to our organizations and our careers. Let’s start with an easy one:To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 9:20 am

UK plans to introduce new Web snooping law

A U.K. counterterrorism bill would require ISPs to retain IP addresses in order to identify individual users of Internet services.The proposed law is meant to bridge a “capabilities gap” that authorities face when trying to obtain communications data, said U.K. Home Secretary Theresa May, who introduced the bill, in a speech on Monday.The measures will build on emergency legislation that the U.K. introduced during the summer, May said, who added that “it is not a knee-jerk response to a sudden perceived threat.”The measures include a requirement for ISPs to supply information allowing law enforcement to match an IP address to the person using a service.To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 8:55 am

CA's secret recipe: An organic engineering team

I spent the early part of last week at the Mandalay Bay Resort in Las Vegas attending CA World. This was a very different CA World than in the past. It wasn’t just that Magic Johnson and The Fray appeared, it was that CA has a new laser focus on the three key pillars on which they are building their business. All three are built on the back of the “organic engineering team,” which has been built up under the leadership of CEO Mike Gregoire.Since taking over in 2012, Gregoire has steered CA into a strategy of building the company holistically rather than via acquisition. I had a chance to sit down and speak with Michael one-on-one.  He says his biggest accomplishment is building a “culture of software engineering.”To read this article in full or to leave a comment, please click here

Posted by on 24 November 2014 | 8:35 am