Help each other out of non-Webroot technical jams and discuss tech-related stuff in general.
- 4,753 Topics
- 12,036 Replies
Informatica’s Intelligent Data Platform To Offer ‘Virtual Data Highway’ for Structured, Unstructured, Machine Data Informatica Corp. is working on an innovative Intelligent Data Platform, designed to spur the delivery of all types of data to apps, people and even devices. The first three next-gen solutions to use this smart “virtual data highway,” which can provide intelligence, visibility and management for data, are due to ship by the end of 2014 and in early 2015.IDN speaks with Informatica execs. by Vance McCarthy Informatica’s IDP creates what the company calls a “virtual data highway,” and will do much more than transport data across an enterprise. It will provide intelligence, visibility and management services that can work with many of today’s popular data types and formats – traditional RDBMS, web, social, big data (Hadoop, etc.), machine data or web logs. IDP’s ability to let companies more easily leverage multiple data types across multiple platforms wi
By [b]John Callaham[/b] [img]http://www.wpcentral.com/sites/wpcentral.com/files/styles/large/public/field/image/2014/07/peggy-johnson.jpg?itok=IMLGfUD2[/img] A new report claims that [url=http://www.wpcentral.com/microsoft]Microsoft[/url] has hired Peggy Johnson, Qualcomm's executive vice president and its head of global market development, for a new high level executive position. Detail of what Johnson's new role at Microsoft will be have yet to be revealed. [url=http://www.wpcentral.com/microsoft-reportedly-snags-qualcomms-marketing-leader-new-gig]Full Article[/url].
By/ Mike Williams/ Posted June 15 2014 Everyone needs a good archive manager, and you've probably chosen one already. We're fans of 7-Zip: the current release may be three years old, but it still performs very well. There is some competition around, though, and B1 Free Archiver is an interesting example which really does stand out from the crowd. The program can be used almost everywhere, for instance. It's available in more than 30 languages, and runs on Windows, OS X, Android and Linux. B1 Free Archiver doesn't have any adware or other hassles, either. It's open source, genuinely free, and – importantly -- still being actively developed. betanews/full read here/ [url=http://betanews.com/2014/06/14/b1-free-archiver-is-a-friendly-cross-platform-archive-manager/]http://betanews.com/2014/06/14/b1-free-archiver-is-a-friendly-cross-platform-archive-manager/[/url] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/11158i30BD99D14A269
[H1]Webroot SecureAnywhere AntiVirus (2015)[/H1]BY [url=http://www.pcmag.com/author-bio/neil-j.-rubenking]Neil J. Rubenking[/url] How big is your [url=http://www.pcmag.com/reviews/antivirus]antivirus[/url]? Would it fit on a diskette, if you could find one? Webroot SecureAnywhere AntiVirus (2015) manages to outperform most of the competition while remaining ridiculously tiny and light on resources. Both in independent lab tests and in my own hands-on testing, Webroot gets top marks. [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/16663i464160B618DBEFA6.jpg[/img] The program's main window features a big button labeled Scan My Computer. It reports statistics, among them the time and duration of the latest scan. Simple switches let you turn the Realtime Shield, Web Shield, and Firewall on and off. Other links let you perform detailed configuration or get various views on the program's activities and system behaviors.
I thought it might be fun to indulge in some computer security history and nostalgia, so I'm going to post a weekly look back at significant events from the past. We'll start off with one of the largest computer worms, [url=http://en.wikipedia.org/wiki/Sobig]Sobig.F[/url] Released on August 18, 2003, Sobig.F set a record for volume of spam emails sent. It appeared as an email with an innocuous headline of "Re: Approved" or something similar, and had a .pif attachment it encouraged you to open. Once opened, the file setup its own SMTP engine and started sending out infection emails to every email address it could find on your machine. Sobig.F was programmed to phone home the next week for updates, and was designed to be used as a backdoor for spammers to send additional emails once it was inserted into your computer. Last year, on March 10, 2013, it reactivated itself again. The author of Sobig.F was never found, although an anonymous an
By [url=http://www.computerworld.com/s/author/9000320/Steven+Vaughan-Nichols]Steven J. Vaughan-Nichols[/url]August 15, 2014 02:04 PM E The patent wars keep going and going and we keep paying and paying. Computerworld - When I started covering technology in the '80s, the last thing I thought I'd need to learn about was intellectual property law. But as Nicolai Tesla learned in his fight with Thomas Edison in the [url=http://www.pbs.org/tesla/ll/ll_warcur.html]electrical-current patent wars of the 1890s[/url], wherever technology goes, IP law is sure to follow. My moment of revelation came in 2003, when I started covering [url=http://www.computerworld.com/s/article/81690/SCO_s_Sordid_Mess]SCO's copyright assault on Linux[/url]. SCO never really had a case, but I was soon to find out that with software patents, you really don't need a good case to profit. You see, defending yourself against a serious patent attack is expensive -- expensive enough to make not defending yourse
The Khronos Group, arbiters of the OpenGL 3D specification and a range of related specifications, has announced version 3.1 of OpenGL ES, its 3D API oriented toward mobile systems. The headline feature of the new spec is support for compute shaders. OpenGL and OpenGL ES are built around a graphics pipeline that feeds in geometry (lines and points) and textures at one end while producing pixels at the other. Compute shaders break out of that graphics orientation by providing a model for GPU-based computation that's not tied to any specific part of that pipeline. Compute shaders can still be used graphically—manipulating or producing geometry, for example—but they can also be used for non-graphical things, such as physics computations. ES 3.1 also adds support for indirect drawing, which enables the GPU to draw objects taken from a buffer in GPU memory rather than CPU memory. This is important especially in conjunction with compute shaders, as those shaders can be used to create objects
[b]By [url=http://www.computerworld.com/author/Gregg-Keizer/]Gregg Keizer[/url] Posted on 9/11/2014[/b] [b]Government-controlled media outlets in China yesterday speculated that the iPhone 6 will not be immediately sold there because Apple retaliated against carrier partners who leaked details of the new models before their Tuesday launch.[/b] [b]That was one reason publications such as [i]People's Daily[/i], the Communist Party's official organ, and the government's Xinhua News Agency put forward for the sudden change in the on-sale date for the new iPhone 6 and 6 Plus in the People's Republic of China (PR[/b] [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/15467iB42983258C02EDE6.png[/img] [b]ComputerWorld/ full article here/ [url=http://www.computerworld.com/article/2607292/china-state-run-media-dreams-up-conspiracy-theories-about-missing-iphone-6.html]http://www.computerworld.com/article/2607292/china-state-run-media-dre
[H2]70% of troll suits use patents from real companies. Will "license-on-transfer" fix things?[/H2]by [url=http://arstechnica.com/author/joe-mullin/]Joe Mullin[/url] - July 9 2014 [img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/12432i3BBE60046E51B45B.gif[/img] Six tech companies have kicked off a new program that they hope will put a major dent in patent trolling, even with Congress unable to pass patent reform. It's called the [url=http://www.lotnet.com/index.cfm]License on Transfer (LOT) Network[/url], founded today by Google, Newegg, Canon, Dropbox, SAP, and teamwork-software startup Asana. The idea behind LOT is that members put all their patents in a pool, which is immediately licensed to every other company in the network—if, and only if, they're ever sold (transferred) outside the network. That would include a sale to a patent troll or a hostile non-network competitor. That means that as long as the patents aren't sold, they can be used both d
[b]By Paul Krill, [url=http://www.infoworld.com/]InfoWorld[/url], September 4, 2014[/b] [b][img]https://d1qy7qyune0vt1.cloudfront.net/webroot-en/attachment/15131i23DFBD264977DD71.jpg[/img][/b] The famous tenet "all bugs are shallow" is a cornerstone of open source development. Known as Linus's Law, the idea that open code leads to more effective bug detection in a project is often the first thing IT pros think of when it comes to the security upside of the open source model. Now, thanks to popular code-sharing sites like GitHub, the open source community is increasingly aiding other organizations in securing their own code and systems, offering a wealth of security tools and frameworks for malware analysis, penetration testing, computer forensics, and more. Following are 11 essential security projects showcased on GitHub. Any admin interested in more secure code and systems should check them out. [b]InforWorld/ slide show here/ [url=http://www.infoworld
This month saw [url=http://bigstory.ap.org/article/us-secretly-created-cuban-twitter-stir-unrest]the exposure[/url] of a U.S. government-funded effort to create a Twitter-like social network in Cuba called ZunZuneo. It was quite a success, shutting down because it became [url=http://www.forbes.com/sites/parmyolson/2014/04/03/why-the-u-s-governments-fake-cuban-twitter-service-failed/]too big, too fast[/url]. Disregarding the embargo on doing business in Cuba, it would likely not seem so bad, [url=http://advocacy.globalvoicesonline.org/2014/04/08/spies-like-us-fake-twitter-violated-cubans-privacy-rights/]except[/url] for the secretive front companies, the theft of half a million Cuban cell phone numbers to jump start the network and the covert profiling of users’ political leanings through surveys. The humanitarian agency behind the project — USAID — said it just wanted to create a network where users could talk among themselves (like the networks that helped activists during the Arab Sp
By Rachel Metz: "A new app called [url=https://yovo.me/]Yovo[/url] aims to make disappearing messages truly short-lived by foiling a recipient’s attempts to take screenshots. Like Snapchat and other ephemeral-messaging apps, Yovo lets you send photos with notes on them that can be viewed for a limited amount of time before they self-destruct. But Yovo, available Wednesday and initially only for the iPhone, also includes a feature called D-fence that yields only an image interrupted by opaque vertical bars when you try to take a screenshot or a photo with another camera." [url=http://www.technologyreview.com/news/531521/an-optical-trick-makes-disappearing-messages-harder-to-screenshot/]http://www.technologyreview.com/news/531521/an-optical-trick-makes-disappearing-messages-harder-to-screenshot/[/url]
[b]By: Mark Wilson/ Posted on 8/16/2014[/b] [b]We expect, and are expected, to be contactable at any given moment -- and indeed we often expect the same of others. Send a text, and you expect a response. Pen an email, and you expect to receive one in return, and fast. Hit someone on Google chat and an all-but-instant reply is all but expected. Maybe this doesn’t sound like you, but I can guarantee that you fit on the spectrum, and also that the people you are in contact with make the same demands of you. When did this change? It used to be that you'd call a landline number and if you didn’t get a reply you might just try again a few hours later. The fact that we now carry mobiles with us virtually 24/7 means that it is [i]weird[/i] if someone doesn't answer the call.[/b] [b]betanews/ full read here/ [url=http://betanews.com/2014/08/16/constantly-turned-on-the-bleak-reality-of-being-permanently-connected/]http://betanews.com/2014/08/16/constantly-turned-on-the-bleak-realit
[b]Microsoft Lays Out Its Mobile Device Management Strategy[/b] by Pedro Hernandez Enterprise Mobility Suite, Azure Active Directory and Intune anchor Microsoft's new "mobile-first, cloud-first" approach to user and device management. Microsoft offered a glimpse of its mobile IT management ambitions during the March 27 launch of Office for iPad. Now, Brad Anderson, corporate vice president of Windows Server & System Center, is spelling out just how the company plans to make its mark in the sizzling mobile device management (MDM) market. "Our vision is to help organizations enable their users to be productive on the devices they love, while protecting the company", said Anderson in a statement. The long-awaited Office apps for the iPad, the best-selling tablet line from rival device maker Apple, weren't the only products Microsoft announced on March 27. The company also took the wraps off a new MDM solution called Enterprise Mobility Suite (EMS). Julia White, corpor
[b]By: Mike Williams/ Posted on 8/28/2014[/b] [b]Resizing and repositioning windows on the PC desktop is such a fundamental task that you’ll almost do it without thinking. Move the mouse to the title bar/ border, click, drag, release. Very basic, very simple -- but there might still be room for improvement.[/b] KDE Mover-Sizer is an open source, portable tool which brings a common Linux desktop trick to Windows. Instead of having to move your mouse cursor to the title bar or border, you just hold down the Alt key, then left-click [i]anywhere[/i] inside a window and drag to move it, right-click and drag to resize it. If this sounds incredibly simple, then it is, but in many ways that’s a good thing. There’s no need to check settings or scroll through online help, you already know enough about the program to speed up your window management. [b]betanews/ full article here/ [url=http://betanews.com/2014/08/28/kde-mover-sizer-brings-handy-linux-desktop-tric
It is a good job I do not eat many potato chips. by [url=http://nakedsecurity.sophos.com/author/nslisavaas/]Lisa Vaas[/url] on August 6, 2014 Imagine sitting in a soundproof room, talking to somebody, a bag of potato chips lying on the floor. Given the vibrations made to all objects by sound waves, that bag of crisps is giving off enough information for a normal video camera to pick up and decipher your conversation, using only visual information. MIT, Adobe and Microsoft researchers have done just that: they've created an algorithm that can [url=http://newsoffice.mit.edu/2014/algorithm-recovers-speech-from-vibrations-0804]reconstruct sound[/url], including intelligible speech, from the tiny vibrations it creates in objects. [url=http://nakedsecurity.sophos.com/2014/08/06/potato-chips-big-brothers-next-eavesdropping-tool/]Full Article.[/url]
By [url=http://betanews.com/author/brianfagioli/]Brian Fagioli[/url] Posted on 8/11/2014 The concept of a Chromebook is awesome. All of your files are stored in the cloud -- family photos, office documents and videos to name a few. This opens up an entire new way of thinking, where nothing seems impossible. Hell, even most of the apps are web-based and that is enough to blow someone's mind. Since local apps cannot be installed, this makes Chrome OS extremely secure and an ideal platform for accessing sensitive information. Unfortunately, as great as the operating system is, the hardware has been lacking. Most models require the user to make a compromise for the sake of cost. Poor quality screens, not enough RAM and questionable build quality are the issues that are most apparent. For some reason, manufacturers equate Chromebooks with "cheap" and this is not the case. People really do want a midrange Chromebook and not just throwaway, disposable tech. Today, Acer
[b]Announcing an updated version of Internet Explorer 11 - available on Windows 8.1, Windows 7, and Windows Phone 8.1[/b] [b] [/b] Wednesday, April 2, 2014 7:01 PM Today we’re excited to announce an updated version of Internet Explorer 11 available with the Windows 8.1 Update and for our Windows 7 customers as well as the debut of Internet Explorer 11 for Windows Phone 8.1. The Windows 8.1 Update will be available for download today on [url=http://msdn.microsoft.com/]MSDN[/url] and [url=http://technet.microsoft.com/]TechNet[/url], with automatic updates beginning April 8th for both Windows 7 and Windows 8.1 customers. We are also launching two new experiences today – [url=http://t.22tracks.com/]22Tracks[/url] and [url=http://www.3dfishgl.com/]FishGL[/url] – so you can explore what’s new with IE11 across Windows and Windows Phone. [url=http://blogs.msdn.com/b/ie/archive/2014/04/02/announcing-an-updated-version-of-internet-explorer-11-available-on-windows-8-1-windows-7-
By [b]Natalie Gagliordi[/b] [img]http://cdn-static.zdnet.com/i/r/story/70/00/032094/4571-sharks-board-close-440.jpg-550x0-v1-550x401.jpg?hash=ZGL3ZwOzA2&upscale=1[/img] Microsoft has finally joined the mini PC craze, introducing a Windows-compatible development board dubbed Sharks Cove. First teased during its April Build conference, the Raspberry Pi-ish device is the result of the combined efforts of Microsoft, Intel and product manufacturer CircuitCo. It's designed to facilitate development of software and drivers for mobile devices that run Windows, such as phones, tablets and similar SoC platforms, although it can also be used for Android development. [url=http://www.zdnet.com/microsoft-debuts-sharks-cove-a-costly-raspberry-pi-alternative-7000032094/]Full Article[/url].
[b]Microsoft Snaps Up Mobile Analytics Provider Capptain[/b] by Pedro Hernandez A brief summary: [i]Microsoft is adding Capptain's tech to its Azure cloud services suite to help businesses boost mobile app engagement.[/i] Microsoft announced today that it had acquired Capptain, a Paris-based mobile analytics specialist, for an unspecified sum. Aimed at marketers, Capptain's platform analyzes the behavior of mobile app users, segments those users, and pushes targeted and timely messages to foster greater levels of engagement and provide better customer service. Real-time geofencing support allows customers to target users within a certain area. Organizations can further segment their user base according to device type, network connection type, app version and several other criteria. Messages can be delivered using a mobile device's built-in system notification scheme. Alternately, it can deliver in-app or in-site notifications using the company's PUSH platform, which Capptain cl
By [b]Sam Sabri[/b] [img]http://www.wpcentral.com/sites/wpcentral.com/files/styles/large/public/field/image/2014/10/Plex_Xbox_One_Hero_0.jpg?itok=Sb4Kgxgy[/img] The official [url=http://www.wpcentral.com/tag/plex]Plex[/url] app on [url=http://www.wpcentral.com/xbox-one]Xbox One[/url] is now available for download. Today's app is available to anyone with a Plex Pass subscription and allows for video content to be streamed to your Xbox One. Yesterday's [url=http://www.wpcentral.com/plex-xbox-one-coming-tomorrow]post contains[/url] all the juicy details about Plex on Xbox One, but we'll hit a few highlights for you real quick. [list] [*]Personal library of movies, home video and TV shows can be streamed from your Plex Media Server to Plex on your Xbox One [*]Plex app for Xbox One has a new design to highlight content in a beautiful way [*]Power media discovery allows you to find related content by genre, actor and more [*]Voice and gesture control are enabled t
By/ [url=http://www.darkreading.com/author-bio.asp?author_id=322]Kelly Jackson Higgins[/url] Posted on June 23 2014 Paul Vixie launches Farsight Security, aimed at catching domain abuse early in the lifecycle. Farsight Security today came out of stealth mode with a service that spots potentially malicious new domain names as a way to fight spam and cybercrime activity. At the helm is DNS pioneer Paul Vixie, the principal author of the pervasive BIND DNS server software and creator of several DNS standards. This is Vixie's first commercial gig after nearly 20 years as founder, chairman, and president of the nonprofit Internet Systems Consortium. Dark Reading/ full read here/ [url=http://www.darkreading.com/analytics/dns-pioneer-founds-new-security-startup/d/d-id/1278777]http://www.darkreading.com/analytics/dns-pioneer-founds-new-security-startup/d/d-id/1278777?[/url]
Today is the anniversary of the invention of email. In 1978, a 14-year-old boy invented email. On August 30,1982, V.A. Shiva Ayyadurai received official recognition as the inventor of email from the U.S. government, for the work he had done in 1978. [i]"The efforts to belittle the innovation of a 14-year-old child should lead to reflection on the larger story of how power is gained, maintained, and expanded, and the need to encourage, not undermine, the capacities for creative inquiry that are widely shared and could flourish, if recognized and given the support they deserve. The angry reaction to the news of his invention of EMAIL and the steps taken to belittle the achievement are most unfortunate. They suggest an effort to dismiss the fact that innovation can take place by anyone, in any place, at any time. And they highlight the need to ensure that innovation must not be monopolized by those with power -- power which, incidentally, is substantially a public.gift."[/i
[b]By [url=http://www.infoworld.com/author-bios/peter-wayner]Peter Wayner[/url], June 16, 2014[/b] [b] [/b] [b]Can anyone truly get their head around Java? Seven major revisions; untold minor ones; hundreds of official APIs; thousands of third-party libraries, some of which, like the Apache Commons, might as well be part of the language -- given Java's breadth and [url=http://www.infoworld.com/d/application-development/java-forever-12-keys-javas-enduring-dominance-228504]ongoing dominance[/url], it's entirely possible that no one person knows more than 2 percent of the stack, regardless of what anyone claims during a job interview.[/b] [b] [/b] [b]InfoWorld/ full read here/ [url=http://www.infoworld.com/d/application-development/the-java-iq-test-round-2-243796]http://www.infoworld.com/d/application-development/the-java-iq-test-round-2-243796[/url] [/b]
Already have an account? Login
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.