Microsoft’s Nadella takes on privacy fears about LinkedIn, Cortana

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Oct 19, 2016
Featured Image

Gartner Top 10 technology trends you should know for 2017

Considering how much significance Gartner is placing the future influence of artificial intelligence and algorithms, it comes as little surprise that the group is saying that technology will be one of the most strategic and potentially disruptive for 2017. At its Gartner Symposium/ITxpo, David Cearley, vice president and Gartner Fellow detailed the key technology trends for 2017 as the group sees them including how data science technologies are evolving to include advanced machine learning and artificial intelligence is helping create intelligent physical and software-based systems that are programmed to learn and adapt. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Microsoft’s Nadella takes on privacy fears about LinkedIn, Cortana
Microsoft speech recognition technology now understands a conversation as well as a person
Gartner: Artificial intelligence, algorithms and smart software at the heart of big network changes
Down the rabbit hole, part 4: Securing your email
Hackers hide stolen payment card data inside website product images
Murphy’s Law: The security version
Half of US adults are profiled in police facial recognition databases
Hackers create more IoT botnets with Mirai source code

Video/Webcast: SentinelOne Inc.

Customer Testimonial - Global Cosmetics Company

Hear from Security Team Lead, Joe Miller, at a global cosmetics company, as he discusses their journey that led them to replace antivirus and deploy SentinelOne. Read More

Thumbnail Image

Microsoft’s Nadella takes on privacy fears about LinkedIn, Cortana

One Gartner analyst called Cortana "Big Brother" combined with productivity, and asked some pointed questions about Microsoft's intentions. Read More

Thumbnail Image

Microsoft speech recognition technology now understands a conversation as well as a person

Microsoft: This marks the first time that human parity has been reported for conversational speech Microsoft researchers say they have created a speech recognition system that understands human conversation as well as the average person does. Ina paper published this week the Microsoft Artificial Intelligence and Research group said its speech recognition system had attained “human parity” and made fewer errors than a human professional transcriptionist. Read More

Thumbnail Image

Gartner: Artificial intelligence, algorithms and smart software at the heart of big network changes

“CIOs will participate in the building of a new digital platform with intelligence at the center,” Sondergaard said told a crowd of more than 8,000 CIOs and IT leaders. “The new competitive differentiator is understanding the customer’s intent through advanced algorithms and artificial intelligence. Creating new experiences that solve problems customers didn’t realize they had.” Read More

Thumbnail Image

Down the rabbit hole, part 4: Securing your email

In his quest for online privacy and security, Bryan Lunduke explores how to ensure his email is as secure and private as possible. Read More

Thumbnail Image

Hackers hide stolen payment card data inside website product images

Attackers compromise online shops and store stolen payment card details inside legitimate image files in order to avoid detection. Read More

Thumbnail Image

Murphy’s Law: The security version

Murphy’s Law—anything that can go wrong, will go wrong—is alive and well in the information security world. Here are 10 variants. Read More

Thumbnail Image

Half of US adults are profiled in police facial recognition databases

Photographs of nearly half of all U.S. adults -- 117 million people -- are collected in police facial recognition databases across the country with little regulation over how the networks are searched and used, according to a new study. Read More

Thumbnail Image

Hackers create more IoT botnets with Mirai source code

Malware that can build botnets out of IoT products has gone on to infect twice as many devices after its source code was publicly released. Read More

White Paper: SentinelOne Inc.

Endpoint Security Strategy: A TCO Perspective

How much are you really paying for endpoint security? Learn two distinct endpoint protection strategies, which capabilities are critical, and what the true cost of a typical enterprise endpoint protection deployment is, including solution, IT resource, and other productivity cost factors. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Google Graveyard: What Google has killed in 2016

7 Linux command line tools you didn’t know you need Read More

Most-Read Stories

1. The fix for Windows 10 needs a fix
2. WikiLeaker Assange's internet access cut by a 'state actor'
3. Reality check: My weekend with the Sony PlayStation VR
4. Assange's internet allegedly cut by ‘state party;’ Guccifer 2.0 springs back to life
5. Check Point SandBlast takes endpoint protection to another level
6. 19 free cloud storage options
7. 7 free tools every network needs
8. The network effect on wealth creation
9. 7 chronic browser bugs plaguing the web
10. Gartner: Artificial intelligence, algorithms and smart software at the heart of big network changes
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.