Tuesday, 31 July 2018

Microsoft hints at September release of Windows 10's next feature upgrade

7 hidden shortcuts for typing faster on Android

Cynozure lets you hire a chief digital officer on demand



Why Apple’s Create ML matters to your enterprise

UK fintech investment exceeds US and China



Security Think Tank: A risk-based approach to security outsourcing



Intelligent automation spending to hit $232bn by 2025



UK business overestimating level of consumer trust, study shows



SamSam ransomware reaps $5.9m and counting



If at first you don’t succeed, .Net, .Net, .Net again

Utilita Energy supplier uses cloud to rapidly scale IT service desk



Court RPA or get sidelined



How Estonia took a digital lead



Why Pinterest pinpointed features for the visually impaired



Comms providers may be forced to notify out-of-contract users



The state of wireless charging: 2018 and beyond

Forget the facts -- we want something to blame!

Dixons Carphone ups data breach figure to 10 million



Briton ran pro-Kremlin disinformation campaign that helped Trump deny Russian links



Monday, 30 July 2018

At T-minus 18 months, Windows 7 still powers 184M commercial PCs

How updates to SharePoint self-service site creation affect governance, IA

M&S aims to give 1,000 employees data skills



Pentagon flags risky software suppliers



Government to fund six connected vehicle simulation projects



IBM and CLS to work on blockchain app store



Apple's VP of education writes on the future of teaching

Security Think Tank: Not all security service providers are created equal



An open letter to Microsoft management re: Windows updating

Dubai disputes court and Smart Dubai partner to apply blockchain



Apple VP Education writes on the future of teaching

Digital identity system for EU nationals should be used for all UK citizens, says report



Search begins for UK’s cyber security Unsung Heroes



With DaaS Windows coming, say goodbye to your PC as you know it

Never mind that it works, think how it LOOKS!

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

New MacBook Pros at work? Here's how to manage them right

Earlier this month, Apple unveiled its newest generation of MacBook Pros; all feature a significant bump in performance, a redesigned butterfly keyboard, the arrival of "Hey Siri" commands and a second generation of Apple's T-series chips. The T2 chip works to improve performance and includes a Secure Enclave for encryption operations to secure the laptops and power Apple's TouchID as well as the Touch Bar. (The T2 chip is already in Apple's iMac Pro.)

One of the big narratives around the new MacBook Pro - and the T2 chip, in particular - is that they are true professional-level machines with IT-friendly security capabilities that help protect everything from the SSD storage to the start-up process to the apps being used. (This last item is important since users can install apps from outside of the Mac App Store, which is curated by Apple.)

To read this article in full, please click here

(Insider Story)

How to make sense of desktop as a service



Friday, 27 July 2018

Atlassian move to ditch Stride and Hipchat in Slack deal angers users

Post-quantum security on Airbus’s radar



Interview: Dame Stephanie ‘Steve’ Shirley: 'Scared silly' by Brexit



Fileless malware a growing trend, warns McAfee



April 2007: When Apple stopped the rot

Openreach doubles down on full-fibre broadband roll-out



BT bounces back in strong first quarter



IT meltdown pushes TSB into loss



How to negotiate (Extreme Clarity edition)

Hackers targeting software supply chains, US report warns



Thursday, 26 July 2018

Microsoft Patch Alert: Still reeling from one of the worst patching months ever

What's in the latest Chrome update?

Google touts G Suite momentum in office productivity battle

8 easily overlooked Android P additions that'll make your life easier

Brace for PowerGhost cryptominer, warns Kaspersky Lab



Crest report highlights need for bug bounty best practice



6 productivity-enhancing apps for Apple’s iPhone

Fix culture to make digital a success



Software development remains insecure



O2 canvasses support from UK Plc to build case for 5G



Throwback Thursday: Is this the end for Y2K?

Android security: Analysis, advice, and next-level knowledge

Google brings machine learning data processing to IoT edge environments



Facebook stock price falls on slowing growth forecast



Cyber security vulnerability concerns skyrocket



Wednesday, 25 July 2018

15 wireless chargers for Apple's iPhone X

July Windows updates, for all versions, are stumbling all over themselves

Overstock.com puts a lot of stock in blockchain

Microsoft releases previews of Exchange 2019, other Office 2019 servers

Blockchain, chatbots, and AI could reinvent corporate finance

Smart cities face challenges and opportunities



MPs to investigate progress of digital government



Dark web cyber crime markets thriving



Vodafone sales tick down on new reporting rules



Future tech cannot be ‘defined by a particular population’, says CA executive



ERP applications are under cyber attack, research confirms



Beyond GDPR: ePrivacy could have an even greater impact on mobile



Apple’s swift MacBook Pro response shows its advantages

Stagecoach trials full-size driverless bus



Government outsourcing at a crossroads, says PAC report



Apache OpenWhisk users urged to patch



Unique, redefined

How to pick the best project management methodology for success

Choosing the right project management methodology for the job is essential. Our guide to evaluating project management methodologies will ensure you pick the perfect fit for your next project.

The risks associated with global Internationalized Domain Names | Salted Hash Ep 36

Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.

About that MacBook Pro Core i9 throttling story (updated)

Application attacks demand new security approach



Google Cloud CEO Diane Greene on how its enterprise-readiness push is paying off



Ransomware concern drops despite being top cost



Tuesday, 24 July 2018

Google adds AI features to G Suite, including ‘Smart Reply’ for Hangouts Chat

Review: 6 data recovery tools for USB flash drives and more

As USB thumb drives and memory cards have grown larger and cheaper over the years, it's become easier to trust more data to them. Cloud storage services notwithstanding, flash drives have remained a common way to store data and transport files from one computer to another — and it's all too easy to accidentally erase data from one or have it hiccup on you.

That’s where file recovery tools come in; they restore deleted files from hard drives and other storage devices. For this roundup, we tested how effectively six tools recover data from USB flash drives.

Most data recovery tools work similarly: Through their interfaces, you select the storage device (flash drive, hard drive, SSD, memory card) from which your files went missing. Then you pick another storage device (such as your computer’s own hard drive or SSD) where the recovery tool will save your recovered files to.

To read this article in full, please click here

(Insider Story)

The Brave browser basics – what it does, how it differs from rivals

The limitless potential of mobile gesture communications — and how it will trip up users

Tech Talk: Machine learning and AI deciphered

Ofcom proposes regulatory changes to support broadband investment



Atos acquires Syntel for £2.6bn



The rapidly growing business case for Apple’s ARKit

Yet another Surface Book 2 problem: GPU not detected. Microsoft doesn’t care.

Top execs cyber security hypocrites, report shows



Fuchsia, Chrome OS, and the danger of black-and-white thinking

Capital markets firms to ramp up public cloud spending



No good deed goes unpunished -- for anyone involved

Openreach to cut wholesale broadband costs for CSP customers



Most firms have software security vulnerability



Organisations are ready to adopt DevOps to power digital transformation



Nordnet drops AI assistant while SEB deepens collaboration



MPs call for inquiry into smart meter roll-out



What the ICO's Facebook fine teaches us



Alphabet shares up after better-than-expected quarter



Building intelligent aircraft engines with AI and analytics



Monday, 23 July 2018

Google to offer blockchain as part of cloud service

European infrastructure cloud deals grow, as contract sizes shrink



Commerzbank creates Hadoop-based platform for business-critical insights



The MacBook Pro’s T2 chip boosts enterprise security

BDUK has £200m to kick-start rural full-fibre network build



July Windows .Net patches appear, disappear, reappear, disappear again

Zero trust security model boosts business confidence



Cyber security: A work in progress



Full-fibre broadband for all to cost £30bn



Nice to know our financial world is in safe hands

5 ways to make Windows 10 act like Windows 7

One of the things I typically spend time doing after holidays and birthdays is helping family members with new PCs, which invariably these days come with Windows 10. I notice one thing in common across all of these little projects: All of the recipients ask me how to make Windows 10 look like the Windows they’re used to — usually Windows 7, or in some cases, Windows 8.1. Things like putting the Start menu back, bringing back functional search, fixing high-DPI display issues, removing Cortana, and so on.

None of these family members really wants to rip and replace Windows 10 with a previous version of the OS, but they want Windows 10 to have the interface to which they are accustomed. “Make it look like it did before!” is a familiar cry in the workplace as well, as more and more enterprises make the move to Windows 10.

To read this article in full, please click here

(Insider Story)

Don't ignore application security | Salted Hash Ep 35

In this episode, Michael Feiertag, CEO and co-founder of tCell, joins host Steve Ragan to talk about why application security is more critical than ever and why it's just now getting more attention from security teams.

Has collaboration software wrought perilous communication overload?



PCs shape up for the digital workplace



Convert text to image, and image to text

Barclays to open tech hub in Glasgow



Friday, 20 July 2018

How to decide whether to deploy blockchain

Microsoft dives down a bizarre non-cumulative rabbit hole with July patches

Huge Singapore data breach shows need for new approach



GDPR drives down UK insider threat



Brussels aims to become an insurtech hub



About that MacBook Pro Core i9 throttling story

NCSC report underlines cyber threat for legal firms



Spotlight on the Digital Career Institute, Berlin



Cloud sales stoke Microsoft’s strong growth



Uptick in UK privacy awareness, says ICO



Cisco and UCL to open AI research unit in $100m digital economy boost



Confusion reigns over value of 5G, says report



It was a JOKE, OK?

UK alerted to potential cyber risks of Huawei equipment



Thursday, 19 July 2018

Why Windows 7 updates are getting bigger

Is mobile sensor-based authentication ready for the enterprise? Some big players think it might be.

The EU's Android antitrust ruling overlooks 3 critical points

Cyber criminals use fake domains to scam businesses



CNI sector lacks cyber security skills, government warned



Why two Apple HomePods really are better than one

Digital consortium aims to develop digital inclusion project



Just Eat on the lookout for 150 tech professionals



Collaborative alliance to advance UK’s cyber security profession



SAP Q2 2018: Cloud revenue shows momentum, 600 more S/4 customers



The next corporate collaboration tool: Podcasts?

Throwback Thursday: How to guarantee business will grow

Container storage: Docker in flash, HCI and software-defined



Uber hires appoints first privacy and data protection chiefs



Orange starts 5G tests in Paris



Committee proposes new laws for immigration of skilled workers after Brexit



Heathrow flights grounded by IT failure



What's in the hidden Windows AppData Folder, and how to find it if you need it

Wednesday, 18 July 2018

Mingis on Tech: The blockchain evolution, from services...to smartphones

Oracle joins other major tech vendors by rolling out its blockchain-as-a-service offering, and two smartphone makers plan to include the technology in new devices this year. Get the latest on the blockchain craze.

Microsoft to dump Windows 10's smaller delta updates

Mingis on Tech: The blockchain evolution moves from services...to smartphones?

CW ASEAN: Defend against disruption



CW ANZ: Fix the weak links



Google faces $5B fine over Android browser and search engine ties

Walmart and Microsoft partner to boost digital in retail



Global trading firm opens office in Ireland because of Brexit



Retail cyber security spending ineffective as breaches rise



Google record fine could lead to Android fork



Deloitte launches EMEA-wide initiative to close cyber security gender gap



Cyber security top priority for aircraft makers, says Airbus



Internet meets tornado. Guess who wins?

What is a business analyst? A key role for business-IT efficiency

Business analyst help guide businesses in improving processes, products, services and software through data analysis. These agile workers straddle the line between IT and the business to help bridge the gap and improve efficiency.

Spectre variant gives buffer overflow a new twist



Tuesday, 17 July 2018

How to handle Windows 10 updates

Microsoft lures Windows 2008 users to cloud with offer of extra support

Stung by a festering pile of bugs on Patch Tuesday, MS releases 27 more patches

Get ready for the next silly smartphone superlative

Nordic CTO interview: Martin Whitlock, Telenor Connexion



Saudi Arabia entices UK fintechs to its shores



Cryptominers plateau while backdoors shoot up



A third of organisations do not have a security expert, survey shows



Spectrum costs hit the world’s poorest hardest



Oracle rolls out its own blockchain service

It's a Y2K miracle!

Voting open: vote now for the most influential woman in UK technology 2018



JWT slashes server estate in move to Ctera cloud appliances



Kcom secures second aggregate HSCN contract



Most Influential Women in UK IT 2018: Entrants to the Hall of Fame



Code First: Girls teaches more women to code in UK than universities



How container technology is evolving



Expect jobs equilibrium if government sticks with AI plan



Monday, 16 July 2018

Mobile devices lost in London underline security risk



Enterprise PC-buying spree spurs first shipment climb in six years

Data protection for containers: Why, and how to do Docker backup



Disaster recovery as a service: what you need to know 



How to use Apple Maps more effectively

Canada raises banner of AI to boost tech industry



ITPS expands datacentre to support Azure Stack and HPC



The show must go on!

Russian cyber attacks show need for international rules



Streamline infrastructure management through robotic automation



Friday, 13 July 2018

Chat happens: Your guide to 11 group-chat services

Everyone knows the secret to success — personal and business alike — is good communication. But in what form? If you're trying to communicate with a group in real time, you're no doubt familiar with the old standby: conference calls. You know: those mind-numbing phone meetings in which talkers overlap, voice quality is terrible, half the people aren't paying attention and somebody's dog barks intermittently throughout the call.

But what's the alternative? Consider an old (very old) standby: instant messaging. Except nobody calls it that anymore; now it's group chat. These virtual meeting rooms are focused on text-based communication — and often vastly preferable to conference calls.

To read this article in full, please click here

(Insider Story)

Surface Pro 2 owners wonder: Will Microsoft ship TPM firmware that works?

Matching disaster recovery to cyber threats



Is the UK’s computing curriculum too focused on coding?



Microsoft yanks buggy Office 2016 patch KB 4018385, republishes all of this month’s patch downloads

Adobe has killed the ‘iPad is not productive’ story

Virtus Data Centres plots further expansion of Slough colocation site



Here come the first blockchain smartphones: What you need to know

How to win friends and influence people, eventually

Windows 7 migration powers PC uptick



Guinness World Records bets on Office 365 and AWS to boost business expansion



Hackers increasingly targeting cloud infrastructure



Thursday, 12 July 2018

Google flips switch on Chrome's newest defensive technology

Microsoft takes on Slack with a free version of Teams

Saudi’s growing e-commerce market offers global tech opportunities



How to get Android-P-like features on any phone right now

Security Think Tank: A good password policy alone is not enough



Executive interview: Bill Ruh, CDO of GE



Brexit proposal calls for standards alignment and data sharing



Half of young girls don’t think tech careers are exciting



Patch Tuesday problems abound, Server 2016 crashes, and a .Net patch goes down in flames

Delaware to test blockchain-based business filing system

Broadcom acquires enterprise business with CA Technologies deal



8 things we learned about Apple Car this week

Cyber attackers cashing in on ‘hidden’ attack surface



Three-quarters of consumers have interacted with artificial intelligence



Investments in on-premise enterprise datacentres on the up as demand for multi-cloud rises



Most influential women in UK tech: The 2018 longlist



Throwback Thursday: Hey mister, got the time?

Delaware to test of a blockchain-based business filing system

An exciting time to be in cyber security innovation



CW Middle East: Can Saudi Arabia build the Silicon Valley of the Middle East?



Hedvig teams up with Veeam to offer scale-out backup appliance



Wednesday, 11 July 2018

7 tools to supplement (or supplant) PowerPoint

It can be a challenge to create presentations that are relevant and engaging and make your customer want to say, “Yes, yes, yes!”

For years, Microsoft PowerPoint has been the go-to presentation tool — even though PowerPoint presentations can be tedious, with text of all one size and bullet points listed smack in the center of the screen. The tool has evolved, in an attempt to ditch its dull reputation, but as it has become more feature-rich, with more design templates and collaborative features, it has been rendered less intuitive. While it’s fair to say you can wow your audience with a PowerPoint presentation today, for most people the learning curve is steep enough to make them reluctantly stick with the basics.

To read this article in full, please click here

(Insider Story)

Microsoft puts Dynamics 365 on twice-a-year release cadence

Russian startup event more international than ever



Swedish state-private partnership will use advanced IT to secure cities



Why Microsoft's Surface Go is no 'iPad-killer'

Cloudian adds Storage Made Easy file-sync-and-share compliance



White-hat hackers find record number of vulnerabilities



Do iOS 12 and 'Mojave' mean it's time to dump old hardware?

UK firms too confident about cyber security



Security Think Tank: Cracking the code – what makes a good password?



How to be efficient and cost effective (or not)

UK fintech industry fears Brexit-induced talent squeeze



Mind your drone business



Facebook could face ICO fine of up to £500,000



Tuesday, 10 July 2018

Hidden costs of data breaches difficult to manage, study finds



Lords urge Brexit negotiators to reach agreement on security



As bitcoin values slide, high-end GPU prices drop, too

Android P's biggest shift may be one of philosophy

Carrenza expands public sector footprint with move into Ark Data Centres



If you forgot your Windows admin password, try this

Chess grandmaster Garry Kasparov tells Tableau users human intelligence still has role to play



NIC calls for nationwide broadband plan



Corporate networks vulnerable to insider attacks, report finds



Apple’s App Store: 10 years to change the world

Cyber crime: why business should report it



Goonhilly Earth Station sets out plans to open green colocation datacentre in 2018



Really, it'll be easier that way

Security Think Tank: Some basic password guidelines



Tackling the digital identity problem



Monday, 9 July 2018

UK slips down broadband speed league table



IT buyer's guide to business projectors

When it comes to effectively communicating with potential customers, training employees or collaborating on your company’s next-gen gadget design, a good projector setup can help you put your best business foot forward. With the ability to send anything from a computer, phone or tablet across the room and onto a screen, projectors have the power to put your company in the best possible light.

The good news is that there is an extraordinary variety of projectors available today that can put a sharp and bright image onto a screen to get your company's message across. From miniature marvels not much bigger than a smartphone to 90-pound monsters that can light up an auditorium's screen, there's a business projector for every purpose and budget.

To read this article in full, please click here

(Insider Story)

Make sure Windows Update is temporarily disabled, particularly on Win7

What Apple's 32-bit app phase-out on Mojave means to you

Holiday Extras uses machine learning and artificial intelligence for personalisation



As prime minister unveils Brexit plans, TechUK calls for deal on services



How to turn your iPhone into a step counter

Casino group bets on Pivot3 hyper-converged infrastructure for surveillance



Dutch government IT projects run €1bn over budget



Government needs to improve its outsourcing approach



Superbike team adds managed UC to support racers



Security Think Tank: Passwords alone are not good enough



We need to take ‘black box’ out of AI to increase diversity, says panel



Collaborative taskforce launches security intelligence network



The top 3 disruptive FinTech technologies to watch in 2018

Who says lowly IT techs don't get any power?

Three chooses SSE for 5G fibre backhaul



London NHS organisations pick Kcom for HSCN



Enhance efficiency by automating IT services



Friday, 6 July 2018

5 clever little iCloud tips you’ll probably use

Infosec community welcomes bank sector focus on cyber resilience



CNet Training calls on datacentre sector for input on skill shortage research



Investment flows into Nordic startups from all directions



Security Think Tank: Firms need to support good password practices



5 clever little iCloud tips you’ll probably use

HSBC previews the banking staff of the future



ICO Grants Programme launches second round of funding



European Parliament calls for suspension of Privacy Shield



How changes in retail law could affect customer experience



Where did THAT come from?!?

Crank up your Chromebook's cloud-connecting power

Banks given three months to report on how they respond to outages



Thursday, 5 July 2018

Wednesday, 4 July 2018

Why AI must move beyond pattern-matching



Dell/VMware and Nutanix dominate a growing hyper-converged market



Slow broadband fuels a post-Brexit storm for rural communities



Industry bets on fixed wireless access for first 5G deployments



Cloud HCI survey: Cloud functionality in hyper-converged infrastructure



Apple’s iPhone 8 is about to get even better

Security Think Tank: Complex passwords provide a false sense of security



European banks need to balance fintech strategies



Software firm Clevermed enhances NHS user experience on Health and Social Care Network



Wayback Wednesday: Undependence Day

Israel accuses Hamas of using spy apps to target soldiers



Tuesday, 3 July 2018

Top web browsers 2018: Being the default does little good

Top R language resources to improve your data skills

Does your Surface Book 2 or Pro 4 have super slow write speeds? You aren’t alone

Exiting EU committee cattle-prods government on 'data adequacy'



Containers and storage: Array suppliers’ container capabilities



Security Think Tank: Use pass phrases and 2FA to beef up access control



Thoughts on Apple's rapidly evolving AI

IT service provider HCL acquires sector expertise as part of European strategy



Government welcomes Lords AI report, vaunts industrial strategy



The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

Take our 2018 salary survey and tell us what you think about your job in IT



Feds expand Facebook data sharing probe



...And never come back!

What is the Epic browser (and what makes it different)?

New deals bolster IBM’s European cloud business



UK financial services firms up tech investments to fuel new service



Future-proofing Gatwick Airport’s networks



Monday, 2 July 2018

Here’s the latest on when Apple will ship its wireless charger

Case study: Logistics firm GWC moves from paper to digital HR in three months



Linux targeted by illicit cryptocurrency miners



Security Think Tank: Put more layers around passwords to up security



Oracle decides on Brussels for European fintech innovation centre



Get the Microsoft June patches applied, but watch out for Win7 NICs and old antivirus

iOS 12: 26 ways Apple is about to improve Maps

Let automation take away the tedium



How AI will change enterprise mobility

Your smartphone is about to get smarter, thanks to artificial intelligence (AI) and machine learning (ML). And that has huge implications for enterprise support for mobility.

Enterprise mobility has long promised to allow workers to be productive wherever they are, to speed up business processes and to improve accuracy and efficiency by putting the most up-to-date data in the hands of workers in the field, says Kevin Burden, vice president of mobility research and data strategy at 451 Research. The addition of AI will help deliver on those promises, he says.

The ways it will do that are multifaceted, with the effects seen in the areas of device management, user experience, security, applications and the very devices themselves. At the same time, new concerns about privacy are sure to arise as AI and ML become ever more efficient at gathering data points.

To read this article in full, please click here

(Insider Story)

You're not helping!

Finland’s R&D spending is recovering after a lost decade



HMRC deactivates record number of fake websites