Microsoft is set to upend a 12-year practice of providing security patches on the same day each month to everyone. Or not.
AMD CEO Lisa Su let the cat out of the bag: <a href="http://www.computerworld.com/article/2912897/windows-pcs/windows-10-to-launch-in-july-seriously.html">Microsoft will be releasing Windows 10 in late July</a>.
Winston Churchill once said of Russia, "It is a riddle, wrapped in a mystery, inside an enigma." Now, I don't deal with international politics. I just write about technology. But when I've looked at HP lately I've been left thinking of its strategy as, well, "a riddle, wrapped in a mystery, inside an enigma."
Sony is reliving the nightmare that <a href="http://www.computerworld.com/article/2858358/fbi-calls-sony-hack-organized-but-declines-to-name-source-or-finger-north-korea.html">its hacked databases</a> gave rise to late last year, now that <a href="http://www.computerworld.com/article/2910891/wikileaks-publishes-searchable-database-of-hacked-sony-docs.html">Wikileaks has thoughtfully published all of the leaked documents in a searchable database</a>. Really, they are the most courteous hoodlums ever.
Last week, I was horrified to discover a problem with my <a href="http://www.computerworld.com/article/2569669/security0/two-sides-of-vulnerability-scanning.html">vulnerability scanner</a>. The product I use relies on a user account to connect to our Microsoft Windows servers and workstations to check them for vulnerable versions of software, and that user account had never been configured properly. As a result, the scanner has been blind to a lot of vulnerabilities. And this has been going on for a long time.
It's a cliché to say that in the past few decades "everything has become computerized" and that the power and quality of our computers has increased massively.
What is artificial intelligence (AI), and what is the difference between general AI and narrow AI?
It's almost time.
I've been using email longer than most people (more than a quarter of a century), so I think I have the credibility to say it's overdue for an overhaul.
Enough is enough. Apple's iOS 8 mobile operating system came out in mid-September. Since then, the company has delivered seven -- count 'em, seven -- patch releases, and iOS 8 still doesn't work that well. Argh!
Over the past 5-yrs, organizations have complained about Microsoft Outlook calendaring problems where users describe issues of calendar appointments not showing up, meeting appointments disappearing, calendar delegate issues occurring, just overall "odd" behavior of calendars. It usually happens in mixed environments where some users are Apple Mac users, and some users (frequently the exec admin / delegate) running Windows, and typically active use of iPhones, iPads, Android, or other mobile devices and tablets. And over the past 5-yrs, I have actively blogged about the problem and the solution to FIX the calendaring inconsistencies.
Now that <a href="http://www.computerworld.com/article/2889261/fcc-approves-net-neutrality-rules-reclassifies-broadband-as-utility.html">net neutrality is the law of the land</a>, you may feel inclined to pat yourself on the back for a job well done. After all, a big reason the FCC backed net neutrality was the outpouring of support for it.
Now we know why Facebook ripped Messenger out of the mobile version of the Facebook app last April: Messenger was destined to become a "platform" in its own right, complete with an API and developer program to help and encourage software companies to make Facebook Messenger-specific apps.
Back in the dark ages, when the only way to get onscreen entertainment was by tuning in a television set at a specific time (get home late? miss your favorite show? too bad for you!), networks had a habit of scheduling similar shows opposite each other. The notion was presumably, that the competition would cause one show to win out over the other, which would eventually drop in the ratings and get cancelled. The idea that viewers might be interested in seeing both apparently was not in the networks' psychology.
It's a time-honored tradition: U.S. businesses find ways to skirt inconvenient or expensive laws by moving operations to other countries. Thus we have had U.S. corporations operating overseas to exploit child labor, run sweatshops or avoid taxes and rigorous health and safety inspections. Now the U.S. government says something similar is happening in regards to email.
So, it's April 25, 2015 and the delivery man has just delivered your new Apple Watch. Your first instinct: Spend more hard-earned cash trying out Apple's mobile payment system, Apple Pay.
When Apple execs took the stage on Monday, virtually everyone expected them to focus on the soon-to-be-released Apple Watch. That, they did. The Watch, we now know, arrives in retail on April 24, and it did indeed get most of the attention. But it wasn't the only thing to catch my eye.
Lenovo pre-installing Superfish software was a security disaster. Whether Lenovo was evil, or, as they eventually claimed, merely incompetent, it's hard to trust them going forward. If nothing else, their initial denials that anything was wrong, leave a lasting impression. Of course, Superfish, along with the software that they bundled from Komodia, also deserve plenty of blame for breaking the security of HTTPS and SSL/TLS.
Organisations that were born digital are built around their IT platform, and all their business processes are IT-driven and data-powered. Every action, every decision, is based on the processing of data sets about users and customers, about usage patterns, external conditions, etc.
Several electronic and mobile payment options have become available, but most of us in the U.S. are still using plain-vanilla credit and debit cards with magnetic stripes. They use technology that dates to the first Nixon administration. That's not a problem in itself; I have no problem with time-tested security measures that work effectively. But just look around: Data breaches are everywhere, and those magnetic-stripe cards are often implicated.
Help drive innovation - Accelerate your customers adoption of new technologies. Read more