Cloud sandboxing for DevOps: What you need to know
Sandboxes provide environments for developers and testers to reproduce even the most complex infrastructures, from data centers to public and hybrid clouds.
Sandboxes allow ITOps and dev/test teams to create personalized replicas of production environments with self-service, on-demand environments that can quickly allow even the most complex environments to be created, modeled, orchestrated and deployed -- from physical patch panels to distributed applications. This can rapidly speed up release cycles while drastically lowering cost and reducing risk.
Have anxiety over the 2016 US election? Spotify will make you laugh or cry
While 2016 is the actual election year, it sort of feels as though it began soon after the previous inauguration back in January 2013. For many people, it hasn't been a fun ride, but there has certainly been some entertainment along the path to November 8th.
We're into the final fortnight of this whole circus and it's perhaps time to put it in perspective. What better way than with music? It has a way of defining lives -- songs invoke certain memories, and awaken past events.
SoftPerfect File Access Monitor now freeware
The comprehensive hard drive activity tracker SoftPerfect File Access Monitor is now freeware. The program enables logging and filtering all the file system activity on a PC, including file creations, reads, writes and deletions.
Setup requires installing a service on your system. This isn’t as convenient as portable products, but does deliver more reliable results, and allows logging more of what’s happening as Windows boots.
Twitter shareholder letter: 'meaningful' safety update, machine learning, timeline changes, and redundancies
Twitter's troll and harassment problem is well-documented, and the social media site has faced mounting criticism over its apparent inability to keep users in check. In a letter to shareholders, Twitter today announced that it will be making "meaningful updates" to its safety policy -- but it doesn’t say what they might be.
The letter says that Twitter wants to "drive value" across three key areas: audience, content, and revenue. For the audience side of things, this means timeline tinkering and contextualizing content. For content, it means partnerships, streaming video and syndication. To make the most of revenue, some fat must be trimmed, and this means internal restructuring and job losses.
Smartphone shipments rise despite Samsung Galaxy Note7 recall
Smartphone shipments have increased in the third quarter of the year, even when Samsung's recalled Galaxy Note7 flagship is taken out of the equation. How much they rose depends on which analyst company you choose to believe. IDC is the most conservative, announcing a growth of one percent bump year-over-year, while Canalys is more optimistic, claiming a six percent bump.
Both Canalys and IDC exclude the Galaxy Note7 because Samsung stopped sales of its latest flagship and wants every unit it shipped to be returned by its customers. The smartphone performed well in the short time it was available, which is why the two companies specifically mention it in their reports -- though it did not dramatically affect Samsung's status as a market leader.
Facebook adds augmented reality Halloween masks to Live video plus spooky reactions
Out on the streets people may be keeping an eye open for killer clowns, but on Facebook this Halloween things are also taking a frightening turn. The social network is using this spooky time of year to introduce augmented reality masks to Live video -- with a Halloween twist, of course.
At the same time, Facebook is also adding "limited-edition" Halloween reactions. These transform the now familiar Like, Love, Haha, Wow, Sad and Angry reactions in something rather more ghoulish.
How to watch Apple's 'Hello Again' Mac launch live on any device including Windows, Linux and Android
In just a few hours, Apple will be taking the wraps off its latest MacBook Pro. We’ve already seen a leaked photo of the new device, with OLED Magic Toolbar, but Apple will have more to show us than just that. Rumors suggest the tech giant will be updating the MacBook Air and iMac too, debuting an external 5K display, and announcing an Apple TV app called "The Watch List" that will recommend shows users may like.
The event is scheduled to start at 10am PDT/1pm EDT/6pm BST, and as always it will be streamed live so you can tune in at home or (maybe) work.
DevOps is driving the move to cloud-first businesses
New research from cloud business management specialist ServiceNow indicates that enterprise cloud services have reached a tipping point, with 52 percent of respondents saying they would select cloud as the platform of choice for new business applications.
In addition 85 percent say they now are headed towards a cloud-first footing, with almost nine out of 10 saying they will complete the shift within two years.
New software suite helps business decision making
Businesses increasingly rely on analytics tools to make sense of their data. But often these can be complex and require several different programs to deliver results.
Analytics software company TARGIT is launching its new Decision Suite 2017 which offers a universal analytics solution with an enterprise-grade in-memory database and back-end tool set.
What you need to know about artificial intelligence
Artificial intelligence (AI) has quickly become a hot topic in the last couple of years, thanks primarily to the rapid progression of software and the development of new and exciting (or new and scary, depending on your view) technologies.
Movies and TV have long made us aware of the potential of AI, but many of the seemingly farfetched ideas are now closer to becoming a reality. And, as investment continues to grow, so too will the interest and success of such projects.
Something wicked this way comes… the cyber security issues that scare people most
"There is a time to take counsel of your fears," General George S. Patton once famously said. Halloween marks the end of National Cyber Security Awareness Month (NCSAM). Let’s make this the time to take counsel of the cyber security fears that keep us up at night.
We asked more than 250 business professionals from across the country to share their concerns. Their answers seem influenced by recent headlines, the pending election, and the coming shopping season.
Naked Cases protect your iPhone 7 from scratches, without hiding its beauty
The iPhone 7 is undeniably an attractive smartphone. The Jet Black model is particularly beautiful -- I should know, I own one. However, the high gloss finish of the Jet Black model is prone to scratches, and what Apple refers to as "fine micro-abrasions" caused by everyday use.
Apple suggests that if you want to keep your phone in pristine condition you should use one of the many available cases to protect it. But then people won’t see the beauty of the new device, which is a shame. This is where Naked Cases come in.
Inventor of DNS on the DYN attack: 'DDoS threatens our values and freedoms, as well as our surfing'
Imagine standing in line at a coffee shop, the place is brimming with people all shouting their order at the one overwhelmed barista. You place your order but he can’t hear you. You shout it, you scream it over the din of the thousands of people also ordering their coffee, but the barista just shrugs because he can’t get your order much less process it. No coffee for you. As you leave you realize those thousands of other customers aren’t even customers, they were just noise generated to keep you from getting your coffee.
Welcome to DDoS.
Healthcare staff lack basic cyber security awareness
The consequences of a security breach in the healthcare sector can be severe, yet a new survey reveals that healthcare staff are among the most likely to fall victim to social engineering attacks.
The study from SecurityScorecard exposes vulnerabilities across 700 healthcare organizations including medical treatment facilities, health insurance agencies and healthcare manufacturing companies.
Office 2013 can now block macros to prevent infection -- here's how to enable it
If someone sends you a document, modern versions of Microsoft Office will automatically open it in Protected View, to keep you safe from malware. If you need to edit it, you can do so, but it's at your own risk.
Office 2016 also gives administrators the ability to prevent users from running macros in Office documents that originated from the Internet, adding further protection. Frustratingly, this feature wasn’t made available in Office 2013, leaving users of the older suite at risk.



