Here the yesterdays IT News from Silicon UK, Networld, Computerworld & IDG 20. August 2018

Silicon UK

CyberCrime Apple Network Hacked By Australian Teenager Trouble from the land down under for iPhone maker, as Aussie fanboy breaks into Apple’s main network

Read

Censorship Google Staff Demand Answers Over Censorship Search App Search engine for Chinese market still a long way from launching says Alphabet boss, amid staff concern

Read

CyberCrime President Trump Eases Cyber Warfare Rules – Report Reverses Obama’s bureaucratic rules that dictate how and when the United States can deploy its offensive cyberweapon arsenal

Read

Most Read

CyberCrime Chinese Hackers Target Alaska Government – Report Ahead of Alaska’s trade mission to China, hackers targetted state government and local utility firms

Read

CyberCrime FBI Warns Of ATM Hacking Campaign Banks on fraud alert after the FBI warn that thieves could steal cash using cloned ATM cards

Read

Cloud Intel CPUs At Risk From Foreshadow Flaw Not again. Intel rocked by another data stealing vulnerability that affects the secure CPU enclave

Read

Most shared

Innovation Nvidia Unveils First High-End Chips Based On ‘Turing’ Architecture Turing’s real-time rendering advances could appear in Nvidia’s gaming chips, set to be announced as early as next week

Read

Cloud New Australian Law Requires Tech Firms To Help Cops Crack Encryption The newly proposed measures would levy fines of up to £6m for organisations that fail to comply

Read

Cloud Google ‘Tracks Users Even With Location History Switched Off’ An AP investigation found a number of Google services tracked users even when they had explicitly switched off location tracking

Read

Events

22-10-2018 – Enterprise Architecture Conference … Enterprise Architecture Conference Europe & BPM Conference Europe 2018 22-25 October 2018, London These are Europe’s only co-located conferences …

Sign up




Silicon Publich Sector

CyberCrime Chinese Hackers Target Alaska Government – Report Ahead of Alaska’s trade mission to China, hackers targetted state government and local utility firms

Read

Governement-IT GCHQ Snooping Deemed Unlawful By Watchdog Surveillance watchdog rules GCHQ bulk data collection is unlawful, but says no evidence that agency misused the system

Read

Innovation Home Office Launches ‘Start-Up’ Visa Programme The move aims to attract more entrepreneurs, following criticism of immigration restrictions from the UK’s tech industry

Read

Most Read

Governement-IT UK Government Pledges To Tackle “Wild West” Internet After tech firms snub government meeting, UK culture secretary pledges legislation to rein in social networking firms

Read

CyberCrime Government Implements Tough Rules To Protect Critical Infrastructure New rules come into force and mean critical infrastructure providers must implement “robust safeguards” against cyber attack or face stiff fines

Read

Regulation MPs Warn On ‘Unprecedented’ Brexit Trade IT Challenge Defra and the Department for International Trade face an ‘impossible’ task in preparing for Brexit

Read

Most shared

Artificial Intelligence Government, Tech Firms Invest £1bn Into British AI Industry Deal worth £1 billion from private sector and government to put UK at forefront of artificial intelligence industry

Read

Regulation Defra Extends IBM Contract For £30m Due To Brexit Pressure Defra has more than 250 applications to update ahead of Brexit next year

Read

Innovation UK To Work With Michigan On Driverless Cars The US state, home to the Big Three US automakers, is to work with British organisations on ideas and policies

Read

Whitepapers

AUTO LENDING-CASE STUDY Read more

Augmented Reality (AR) Read more

THE GLOBAL INTERCONNECTION INDEX




Network World

Are microservices about to revolutionize the Internet of Things?

Microservices have helped reinvent software development, and now a new startup says it’s going to combine them with edge computing to transform the Internet of Things (IoT). Read More ▶

10 Hot IoT startups to watch

With 20 billion internet of things devices online by 2020, the challenges and rewards are great for the top 10 startups hoping to capitalize on connected devices. Read More ▶

Getting grounded in IoT networking and security

A guide to the basics enterprises need to know about the internet of things. Read More ▶

REVIEW: 6 enterprise-scale IoT platforms

Here are the building blocks of successful enterprise internet of things deployment, plus details about AWS IoT and IoT 1-Click, Cisco Jasper, Azure IoT, IBM Watson IoT and Google Cloud IoT Core. Read More ▶

Finally, a smart way for insurers to leverage IoT in smart homes

Travelers Insurance is partnering with Notion to provide customers with IoT sensors to minimize and prevent damage to homes by automatically reporting problems. Read More ▶

Join the Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook ▶
Network World on LinkedIn ▶

Get the Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — in-depth articles available only to Insider members. You get access not only to Network World’s Insider content but to selected Insider content from Computerworld, CIO.com, InfoWorld, CSO, and other IDG publications. Sign up at no cost today! ▶

Businesses need better automation to regain control of their data centers

Data centers are an integral component of private and hybrid cloud strategies. Better automation can provide greater visibility and simplified operations. Read More ▶

White Paper: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More ▶

10 Hot IoT startups to watch

With 20 billion internet of things devices online by 2020, the challenges and rewards are great for the top 10 startups hoping to capitalize on connected devices. Read More ▶

$29 For Two Etekcity Smart Plugs With Alexa Compatibility – Deal Alert

Turn your appliances on/off remotely from your mobile device, or with your voice via Alexa. Or automate with a schedule. The plug also monitors and helps control energy usage, and the slow drain that occurs even when devices aren’t in use. Read More ▶

How to display data in a human-friendly way on Linux

Many Linux commands now have options to make their output a little easier to digest. Here’s a look at some that bring out the friendliness of our favorite operating system. Read More ▶

Apcela optimizes Office 365 performance, improving user productivity

Apcela says its Office 365 Accelerator enables enterprises to get the fastest possible Office 365 performance, without commissioning a cloud performance or acceleration effort. Read More ▶

Finally, a smart way for insurers to leverage IoT in smart homes

Travelers Insurance is partnering with Notion to provide customers with IoT sensors to minimize and prevent damage to homes by automatically reporting problems. Read More ▶

White Paper: Sophos

Firewall Best Practices to Block Ransomware

Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job. Read More ▶

Join the Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook ▶
Network World on LinkedIn ▶

Get the Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — in-depth articles available only to Insider members. You get access not only to Network World’s Insider content but to selected Insider content from Computerworld, CIO.com, InfoWorld, CSO, and other IDG publications. Sign up at no cost today! ▶




Computerworld Daily

Just think of 6 a.m. as Beta Time

Mainframe programmer working for a large defense contractor finds a way to become a lot more efficient: arrive at work at 6 a.m. At least that’s how it MOSTLY works… Read More ▶

WHITE PAPER: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶

How to use Bedtime Mode for Do Not Disturb in iOS 12

Make sure your phone doesn’t light up at night with Bedtime Mode Watch Now ▶

WHITE PAPER: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More ▶

Subscribe to Computerworld First Look

Sign up for our popular daily newsletter. You’ll get Computerworld’s top stories, first thing in the morning. We deliver breaking news and in-depth features on topics like Windows 10 and enterprise mobility, as well as authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶

Get the Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — in-depth articles available only to Insider members. You get access not only to Computerworld’s Insider content but to selected Insider content from InfoWorld, CIO.com, Network World, CSO, and other IDG publications. Sign up at no cost today! ▶

Computerworld First Look

SAP pilots blockchain-based supply chain tracker

SAP has created a consortium of business partners to help it craft applications for a cloud-based blockchain platform that can track goods from creation to shipment to manufacturer as part of an automated supply chain system. Read More ▶

WHITE PAPER: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶

Can the police search your phone?

Enterprises work hard to protect company secrets. Here’s why the biggest threat may be law enforcement. Read More ▶

Bolster your cloud understanding with this AWS certification training.

Amazon Web Services is one of today’s top cloud computing platforms, so certified cloud professionals will likely run into AWS at some point in their careers. It’s never too late to be prepared and learn the fundamentals of AWS cloud computing; this AWS Solution Architect Certification Training Bundle will show you how for $49. Read More ▶

IBM, Maersk launch blockchain-based shipping platform with 94 early adopters

After testing it earlier this year, the two companies announced scores of early adopters have agreed to pilot the distributed ledger technology, enabling them to track shipments in near-real time. Read More ▶

Woody Leonhard: 2 undocumented Microsoft patches may solve the 1803 TLS 1.2 blocking problem

Earlier this week, Microsoft announced that it wouldn’t push Win10 1803 upgrades onto 1709 machines if the machine has a .Net app (such as QuickBooks Desktop) that relies on TLS 1.2 security. Now it looks as if there’s a fix. Read More ▶

Jonny Evans: We need to talk about Steve Jobs

It’s time for much deeper insights into the character of Steve Jobs. Read More ▶

WHITE PAPER: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More ▶

Subscribe to Computerworld First Look

Sign up for our popular daily newsletter. You’ll get Computerworld’s top stories, first thing in the morning. We deliver breaking news and in-depth features on topics like Windows 10 and enterprise mobility, as well as authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶

Get the Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — in-depth articles available only to Insider members. You get access not only to Computerworld’s Insider content but to selected Insider content from InfoWorld, CIO.com, Network World, CSO, and other IDG publications. Sign up at no cost today! ▶




IDG

WHITE PAPER: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More ▶

Six tips for creating a winning talent strategy

Talent may not be the only factor for transforming IT for the digital era, but it’s one of the most critical. Read More ▶

What’s new in TensorFlow machine learning

Google’s TensorFlow 2.0 beta is expected later this year, with a focus on improving performance and correcting mistakes in compatibility and continuity Read More ▶

2 undocumented patches from Microsoft may solve the 1803 TLS 1.2 blocking problem

Earlier this week, Microsoft announced that it wouldn’t push Win10 1803 upgrades onto 1709 machines if the machine has a .Net app (such as QuickBooks Desktop) that relies on TLS 1.2 security. Now it looks as if there’s a fix — but there’s no documentation. Read More ▶

Corporate pre-crime: The ethics of using AI to identify future insider threats

Remember “Minority Report”? Artificial intelligence can spot employee behavior that suggests a future risk. Here’s how to use that data ethically and effectively. Read More ▶

What’s new in the F# programming language

The main behavioral change makes F# tuple types and System.Tuple types completely synonymous, while the Version 4.5 beta brings in Span Read More ▶

How National Life manages organic growth from the inside out

National Life Group’s CIO, Tom Anfuso, reveals how the organization — one of the fastest-growing American life insurance companies — is transforming in a traditionally staid industry. Read More ▶

SAP pilots blockchain-based supply chain tracker

SAP has created a consortium of business partners to help it craft applications for a cloud-based blockchain platform that can track goods from creation to shipment to manufacturer as part of an automated supply chain system. Read More ▶

WHITE PAPER: Bronze Drum Consulting

How Powerful New Technologies are Powering a Real-Time Revolution in Capital Markets

Discover how machine learning, informed by rich, streaming data, is helping business leaders transform financial services is this white paper from Bronze Drum Consulting. By leveraging cloud services, financial service firms now have the power to put real-time streaming data to work. Read More ▶

IT News Silicon UK, Networld, Computerworld & IDG 20. August 2018https://i1.wp.com/diewebservisten.com/wp-content/uploads/2018/08/ITnews-3.jpg?fit=1024%2C576https://i1.wp.com/diewebservisten.com/wp-content/uploads/2018/08/ITnews-3.jpg?resize=150%2C150MichaelNewsapple,censorship,chinese,cybercrime,network,read,report,rules,search,staffHere the yesterdays IT News from Silicon UK, Networld, Computerworld & IDG 20. August 2018 Silicon UK CyberCrime Apple Network Hacked By Australian Teenager Trouble from the land down under for iPhone maker, as Aussie fanboy breaks into Apple’s main network Read Censorship Google Staff Demand Answers Over Censorship Search App Search engine for Chinese...The world own the knowledge