15 awesome office gadgets and must-haves! – 2013 is just around the corner, so prepare your office for the new year with a fine selection of 15 excellent office gadgets and must-haves! Sure to induce coworker jealousy.
Verizon to throttle pirates’ download speeds – TorrentFreak is reporting that Verizon will actually be throttling the download speed of repeat offenders for a limited period of time. As expected, users aren’t happy about this, and it’s easy to understand why. People following this news are not pleased that these ISPs are so willingly cooperating with these copyright enforcers instead of taking action only when a court demands it.
Staples Kicking Off ‘Black Friday’ Deals This Sunday – Staples announced that its Black Friday deals will kick off on Sunday, Nov. 18 and run all week long.
WB iOS App Offers ‘Day After’ TV Show Access – Warner Brothers has launched an iOS app to keep avid TV fans in their favorite shows, and out of spoilers.
IDF vs. Hamas War Extends to Social Media – Israeli and Palestinian forces use social media to win over world sympathy.
Enable Spotify’s Web player right now – Anxious to try out the Web player that Spotify is rolling out, but it hasn’t hit your account yet? Try these steps to enable it now.
Soluto: The state of Windows 8 – Does Windows 8 crash more or less than Windows 7? What devices is it installed on? How many BSoDs are users seeing per month? Soluto answers these — and more – questions.
Five apps to help you mine valuable information from big data – Brien Posey presents five apps he believes can help you mine valuable information from your organization.
Digital storage basics, part 2: External drive vs. NAS server – CNET editor Dong Ngo goes over the basics of digital storage devices for home users.
LTE can be disabled with a $650 jammer, but not really – Yesterday, the MIT Technology Review boldly stated that LTE networks can be easily shut down with a “simple jamming trick” utilizing a cheap software-defined radio. However, they are incorrect in believing that the trick shuts down the network, or can shut it down city-wide.
Three weeks in: The lackluster launch of Windows 8 – Microsoft’s Windows 8 and Windows RT — and dozens of new touch-enabled devices, such as MS’s own Surface tablet — have now been on the market for three weeks. Whether you’re a critic of the new Start screen, a Windows zealot, or just an interested bystander, you’re all probably wondering the same thing: Has the Windows 8 launch been a success or not?
New WiFi protocol boosts congested wireless network throughput by 700% - Engineers at NC State University have discovered a way of boosting the throughput of busy WiFi networks by up to 700%. Perhaps most importantly, the breakthrough is purely software-based, meaning it could be rolled out to existing WiFi networks relatively easily — instantly improving the throughput and latency of the network.
Companies collecting personal info face financial risks – The Edelman Privacy Risk Index reveals a lack of preparedness in managing the potential financial and reputational damage relating to the loss or misuse of personal information. Businesses, particularly at a senior level, are not reacting quickly enough to data and security risk.
Anonymous takes on Israeli websites, wipes Jerusalem bank – Hacking collective Anonymous has gone on a hacking spree in protest over attacks on Gaza.
PoC malware for remote hijacking of USB smart readers – Researchers from malware.lu, a Luxembourg-based malware analysis and incident response team, have created proof-of-concept malware that allows attackers to gain access to and remotely control users’ USB smart card readers.
Microsoft pushes IE 9 tweak via Windows Update to close three critical security holes – Microsoft has reminded Internet Explorer users of the importance of keeping their browser updated against security threats.
Over 10,000 identity fraud rings active in the U.S. – There are more than 10,000 identity fraud rings in the U.S. according to a new study released today by ID Analytics’ ID:A Labs.
VMware Security Update Fixes DoS, Other Vulnerabilities – Virtualization software maker VMware shipped a security update for its vSphere API yesterday that resolved a denial of service vulnerability in ESX and ESXi, as well as adding a number of open source security updates to the ESX Service Console.
TNS24 – a fake courier company website, used by online scammers – Beware of attractive strangers contacting you on Facebook, and requesting that you help finance a shipment of goods in your name.. you might find yourself out of pocket, with little chance of redress.
LinkedIn spam drives traffic to Toronto Drug Store – That email you just received from LinkedIn might be promoting a Thanksgiving sale of Viagra instead.
Here’s happens when security watchdogs ignore their own advice – Germany’s federal IT security agency regularly releases guidelines aimed at helping users keep their PCs safe. To show what happens when good security policies are ignored, the federal agency let two differently configured systems be attacked and documented the results.
Dell’s PC strategy: Damned if it does, damned if it doesn’t – Dell faces a PC conundrum. The company isn’t playing the commodity PC game and losing share and desperately needs to grow other parts of its business to offset the declines.
Cisco, Dell acquisitions: Bring on datacenter automation – Automation is key to delivering on-demand datacenter and cloud services
Lytro Light Field Camera Gets Filters, Perspective Shift – Lytro this week announced new creative tools to add to its Light Field Camera.
Report: Apple interested in arbitration in Motorola Mobility case – Apple is reportedly interested in arbitration in resolving its disputes with Motorola Mobility, which could have worldwide repercussions.
Big Data – Big data is a buzzword, or catch-phrase, used to describe a massive volume of both structured and unstructured data that is so large that it’s difficult to process using traditional database and software techniques. While the term may seem to reference the volume of data, that isn’t always the case. The term big data — especially when used by vendors — may refer to the technology (which includes tools and processes) that an organization requires to handle the large amounts of data and storage facilities. The term big data is believed to have originated with Web search companies who had to query very large distributed aggregations of loosely-structured data.
Off Topic (Sort of):
Chris Anderson: Why I left Wired – 3D Printing Will Be Bigger Than The Web – Chris Anderson, former Editor-in-Chief of Wired magazine, believes home-based “replicators” will transform our future.
Learn How to Break Down a Door (Without Hurting Yourself) – Perhaps you’re saving a child from a burning building, or perhaps you’re breaking into the stronghold of an enemy spy-but one way or another, you have to break down a door.
Study: We Humans Are Getting Dumber – Stanford professor and colleagues argue that pre-Agricultural Revolution humans had better spatial awareness and emotional smarts due to natural selection
An Incredibly Simple Way to Escape from Wrist-Binding Zip Ties – “Imminent threat solutions” blog ITS Tactical shows you how easy it can be to break zip ties with a little practice.
Kaspersky: ‘No neutral’ on secure industrial OS – Eugene Kaspersky on his company’s secure OS, cyberweapons, attribution of malware and the security talent crunch.
“One of the most obvious facts about grownups to a child is that they have forgotten what it is like to be a child.”
- Randall Jarrell
Today’s Free Downloads:
NADetector 1.4 – NADetector monitors and analyzes the network traffic and displays statistical information pertaining to each IP address pair and protocol, helping network administrators and users troubleshoot network problems. The main purpose of NADetector is to allow you to collect statistical information about your network traffic that passes through network adapters and display incoming, outgoing and summary traffic statistics.
Microsoft Sysinternals Suite November 15 – The Sysinternals Troubleshooting Utilities have been rolled up into a single Suite of tools. This file contains the individual troubleshooting tools and help files.