Home Tags Wireless access points

Tag: wireless access points

Research on unsecured Wi-Fi networks across the world

The very nature of wireless Wi-Fi networks means that hackers or criminals simply need to be located near an access point in order to eavesdrop and intercept network traffic. Poorly configured access point encryption or services that allow data to be sent without any encryption pose a serious threat to user data. Confidential data can be protected by encrypting traffic at wireless access points.
In fact, this method of protection is now considered essential for all Wi-Fi networks.

But what actually happens in practice? Is traffic always encrypted on public Wi-Fi networks? How does the situation differ from country to country? Kaspersky Security Network statistics can answer all these questions. We compared the situation with Wi-Fi traffic encryption in different countries using data from our threat database. We counted the number of reliable and unreliable networks in each country that has more than 10 thousand access points known to us (this obviously excludes Antarctica and other regions where there is not enough data to draw any conclusions). Security of Wireless Networks Using statistics from Kaspersky Security Network (KSN), we analyzed data from across the world for almost 32 million Wi-Fi hotspots accessed by the wireless adapters of KSN users. Encryption type used in public Wi-Fi hotspots across the world Approximately 24.7% of Wi-Fi hotspots in the world do not use any encryption at all.

This basically means that by using an antenna capable of sending and receiving data at 2.4 GHz, any individual located near an access point can easily intercept and store all user traffic and then browse it for data they are interested in.

Fortunately, modern online banking systems and messengers do not transfer unencrypted data.

But this is the only thing that prevents users of Wi-Fi networks with unencrypted traffic from revealing their passwords and other essential data when using an unsecure access point. The WEP (Wired Equivalent Privacy) protocol for encryption of data transferred over Wi-Fi is used by approximately 3.1% of all analyzed access points.

The protocol was the first to be created, quite a long time ago, and is now completely unreliable – it would take hackers just a few minutes to crack it.

From a data security point of view, using WEP is not much different from using open networks.

This protocol is being relegated to oblivion everywhere, but as we see from the chart above, it can still be found in use. Around three-quarters of all access points use encryption based on the Wi-Fi Protected Access (WPA) protocol family.

The protocols from this family are currently the most secure.

The effort required to hack WPA depends on its settings, including the complexity of the password set by the hotspot owner.
It is worth noting that an attempt to decipher traffic from “personal” (WPA-Personal, PSK authentication) wireless networks (with public access points) can be made by intercepting the handshakes between the access point and the device at the beginning of the session. “Corporate” versions are protected from this sort of interception because they use internal company authorization. When it comes to “personal” WPA2 attacks, the situation is similar to that of WPA and mostly depends on the strength of the password set by the hotspot owner. It is only fair to note that during a standard attack on a Wi-Fi access point, a personal computer can generate from 50 to 300 keys per second on average.
If the encryption key is strong, it will take years to hack it.
Still, no one can guarantee that the key used at a cafe will be secure and that the attacker will have nothing but a PC at their disposal. Overall, it can be said that today’s WPA/WPA2 “non-enterprise” versions are reasonably, but not absolutely, secure.
In particular, they allow brute-force and dictionary attacks.

There are ready-to-use publicly available tools (aircrack-ng and similar software) for performing such attacks, as well as a large number of manuals. Geography of Unsecured Wi-Fi Access Points Share of Wi-Fi hotspots that use unreliable WEP or do not encrypt data (by country) We would like to note that the five countries with the highest proportion of unsecured connections include Korea (47.9% of unsecured Wi-Fi access points), while France (40.14%) and the US (39.31%) rate 9th and 12th respectively in the list. Germany appears to be the most secure among Western European countries, with 84.91% of access points secured by WPA/WPA2 protocol encryption. Share of Wi-Fi hotspots that use WPA/WPA2 (by country) However, even when using an encrypted connection, you should not completely rely upon this security measure.

There are several scenarios that could compromise even well-encrypted network traffic.

These include fake access points with names that duplicate or mimic real ones (for example, TrainStation_Free or TrainStation Free) and compromised routers forwarding traffic without encryption to attackers (malware tools that infect such devices are already “in the wild”).

At any rate, taking care of your own security is a good idea. Recommendations for Users There are several simple rules that help protect personal data when using open Wi-Fi networks in cafes, hotels, airports, and other public places. Do not trust networks that are not password-protected. Even if a network requests a password, you should remain vigilant. Fraudsters can find out the network password at a coffee shop, for example, and then create a fake connection with the same password.

This allows them to easily steal personal user data. You should only trust network names and passwords given to you by employees of the establishment. To maximize your protection, turn off your Wi-Fi connection whenever you are not using it.

This will also save your battery life. We recommend disabling automatic connection to existing Wi-Fi networks too. If you are not 100% sure the wireless network you are using is secure, but you still need to connect to the internet, try to limit yourself to basic user actions such as searching for information. You should refrain from entering your login details for social networks or mail services, and definitely not perform any online banking operations or enter your bank card details anywhere. To avoid being a target for cybercriminals, you should enable the “Always use a secure connection” (HTTPS) option in your device settings.
It is recommended to enable this option when visiting any websites you think may lack the necessary protection. If possible, connect via a Virtual Private Network (VPN). With a VPN, encrypted traffic is transmitted over a protected tunnel, meaning criminals won’t be able to read your data, even if they gain access to them. And, of course, you should use dedicated security solutions.

They inform users about any potential dangers when connecting to a suspicious Wi-Fi network and prevent any passwords or other confidential data from being compromised if there is a threat. One example of a dedicated solution is the Secure Connection tool included in the latest versions of Kaspersky Internet Security and Kaspersky Total Security.

This module protects users connected to Wi-Fi networks by providing a secure encrypted connection channel.
Secure Connection can be launched manually or, depending on the settings, activated automatically when connecting to public Wi-Fi networks, when navigating to online banking and payment systems or online stores, and when communicating online (mail services, social networks, etc.).

Multiple Vulnerabilities in Network Time Protocol Daemon Affecting Cisco Products: November...

Product Cisco Bug ID Fixed Release Availability Cisco SocialMiner CSCvc32449 11.6.1 (15-Jun-2017) Cisco Unified MeetingPlace CSCvc23583 Cisco WebEx Node for MCS CSCvc23453 Cisco Jabber Guest CSCvc23580 11.0.1 (28-Feb-2017) Cisco Application and Co...

LANDESK Unveils 2016.3 Releases, Providing Organisations with Greater Visibility

Latest product updates empower organisations to discover, provide insight and take action based on increased visibility in their environmentsLondon – October 18, 2016 – LANDESK today announced its 2016.3 product releases, bringing new visibility and discovery capabilities to the LANDESK solutions portfolio. With the latest updates, LANDESK gives organisations an improved view of what’s in their environment and the ability to take action within the same system. There is a growing need for IT to better understand what’s happening in the environment and have the tools to take action when needed. Without this level of visibility, organisations face higher risks of failed audits, security threats, inconsistent policies and support for devices, and lacklustre IT and business services. Visibility issues manifest in different ways and affect multiple IT business practices.

For example, if the asset team doesn’t know what software they have and where it is being used, the organisation is at risk for failed audits or for over-buying of software licenses.
If the security team doesn’t have enhanced discovery capabilities, they may fail to identify nefarious devices trying to connect to the network. When it comes to managing traditional, mobile, and VDI endpoints, an extensive inventory allows IT to correctly configure and manage each device type and version.

Finally, improved visibility helps service desk staff to quickly identify what may have changed on devices experiencing difficulties, and helps organisations understand the impact of changes to help them deliver top quality IT and business services. With such high stakes, organisations have taken steps to increase visibility, but without an integrated solution, it’s not enough.

A recent Enterprise Management Associates report, Optimising IT for Financial Performance, found the average organisation has more than 11 discovery tools.

The problem is, these tools don’t provide visibility across all IT security and management activities, and don’t enable IT to take immediate action on the results. “At LANDESK, we think there’s a better way, and we’ve added new capabilities across the entire solutions portfolio to improve access and visibility, giving our customers the tools to take action like never before,” said Duane Newman, VP of product management at LANDESK. “The latest 2016.3 releases give IT speed of remediation, delivering positive business outcomes to their consumers.” LANDESK’s updated solutions portfolio caters to a variety of visibility-related scenarios, with invisible or short-lived assets serving as a prime example.

Because of what virtualisation allows, assets will sometimes appear on the network, live their entire life and come down between discovery scans. However, their disappearance doesn’t exonerate an organisation from paying licensing fees, nor does it protect from security issues or breaches, should the item be nefarious. To solve for this, LANDESK has enhanced its passive discovery mechanisms, updating its Neighbourhood Watch technology, which leverages other known devices to quickly identify and report new, unknown items as they appear on the network. With the 2016.3 release, it gives IT the option to automatically instigate a full inventory of each discovered asset, down to hardware, firmware and what software is on the device, enabling IT to gather key data required for managing end user devices, securing data and tracking assets. In the 2016.3 release, LANDESK is helping to improve overall IT visibility into organisations’ environments in the following ways: LANDESK IT Asset Management: With agentless scanning for invisible assets and a new dashboard search gadget in the latest LANDESK IT Asset Management Suite release, IT can now discover new assets and search for them faster. LANDESK Security Suite: Security Suite 2016.3 brings additional visibility with improved insights into applications running on all discovered endpoints, as well as the ability to take action on suspicious and malicious apps from within the same interface.

Because the data is also integrated with Management Suite, organisations have visibility across IT security and management activities to reduce risk and improve decision-making. Unified Endpoint Management: The updates to LANDESK UEM provide deeper agentless discovery, and enable discovery through distributed wireless access points (managed devices on the network as part of the “Neighbourhood Watch”), Android for Work, and extended Windows 10 support, plus common licensing, enrolment, and MDM across Apple Mac and iOS devices. LANDESK Service Desk: Service Desk 2016.3 delivers visibility faster, with dashboard knowledge search, impact analysis in the Workspace interface and query filters for record location. Plus, discover the Kbot Design app from the Design App Store. Xtraction: The 2016.3 update to Xtraction offers IT an improved user experience and connectors updates for LANDESK Management Suite, Service Desk, Wavelink Avalanche 5.3, and SCCM. For more information about enhancements in the 2016.3 versions of these products, see: LANDESK Management Suite 2016.3, LANDESK Security Suite 2016.3, LANDESK IT Asset Management Suite 2016.3, and LANDESK Service Desk 2016.3. About LANDESK:LANDESK is the global authority on user-cantered IT.

By integrating and automating IT tasks, LANDESK helps organisations balance rapidly evolving user requirements with the need to secure critical assets and data. LANDESK is headquartered in Salt Lake City, UT, and has offices all over the world.

To learn more, visit www.landesk.com.Copyright © 2016, LANDESK.

All rights reserved.
Media Contacts:Sarah LewisLANDESK01344 442164sarah.lewis@landesk.com Tanya PennellsOctopus Group020 3837 3686landesk@weareoctopusgroup.net

WatchGuard Releases Industry’s Fastest Full UTM Tabletop Appliance

New WatchGuard T70 Network Security Appliance Delivers Over 1 Gbps UTM Throughput4 October 2016 – WatchGuard® Technologies, has announced its new Firebox T70 hardware appliance, which sets a new standard for tabletop UTM performance.

According to Miercom, an independent testing lab, the T70 delivers the fastest throughput available in the industry today, with speeds over 1 Gbps when operating in full Unified Threat Management (UTM) mode.

This means that customers don’t have to compromise between network bandwidth and leveraging the UTM security services to protect their networks. WatchGuard T70 Miercom found that the T70 achieves over 1 Gbps throughput in full UTM mode, which is 52 percent higher than the average competitor appliance tested and 38 percent higher than the next competitor.
So, even with today’s environment of heavy HTTPS traffic, network users and administrators will always get the full benefit of all WatchGuard security services. KEY FEATURES:Performance: Customers benefit from the highest speeds and performance levels available in a tabletop security appliance, with over 1 Gbps throughput with full UTM protection enabled. Power over Ethernet (PoE): Using the two PoE+ ports to power peripheral devices, such as wireless access points, network administrators can extend the reach of their networks without having to run costly AC power to remote devices. RapidDeploy: Centralised IT teams can use RapidDeploy to pre-configure appliances for quick and non-technical installations at distributed locations. Full UTM Protection for Fibre Broadband: Organisations can benefit from fibre broadband services, such as Google Fiber, knowing the T70 can easily manage these expanding speeds. SUPPORTING QUOTES:Andrew Evers, Group IT Manager at Red Carnation Hotels: “The T70 provides the highest levels of performance and capability I’ve seen in such a small unit.
I can now deploy the same enterprise-grade security services across our entire organisation, whether in a small office, or at larger sites.

The T70 delivers a small footprint, allowing for a good amount of diversification and growth, before needing to trade-up. Ultimately, this solution represents a valued addition to the WatchGuard family because it hardens security, enables automation for my team and creates greater flexibility and enablement for my users.” Dave Ashton, Sales Director at Sec-1: “The T70 is a great addition to the WatchGuard range and has been universally welcomed by the WatchGuard channel.
It offers unmatched price / performance for our SME customers who want enterprise level security and performance at affordable prices.” Rob Smithers, CEO, Miercom: "Overall, the WatchGuard Firebox T70 exhibited the best overall throughput performance of the competitive security appliances tested.
In addition, while competitors' performance was greatly reduced as more security functions and features were enabled, the WatchGuard Firebox T70's continued to prove exceptional performance.” Andrew Young, Vice President of Product Management at WatchGuard Technologies: “Organisations today require fast, reliable and secure internet connectivity, but are struggling to find network security solutions that can keep up with their ever-growing needs.

This challenge is further exacerbated by the growing availability of fibre broadband around the world.

The WatchGuard T70 is ideal for small and midsize businesses or distributed enterprises that need the highest performance available in a tabletop security appliance.

The blazing fast performance of the T70 will make network slowdown concerns a thing of the past.” ADDITIONAL RESOURCES: WatchGuard will be showcasing the Firebox T70 at this week’s IP Expo Europe. About WatchGuard TechnologiesWatchGuard® Technologies, Inc. is a global leader in network security, providing best-in-class Unified Threat Management, Next Generation Firewall, secure Wi-Fi, and network intelligence products and services to more than 75,000 customers worldwide.

The company’s mission is to make enterprise-grade security accessible to companies of all types and sizes through simplicity, making WatchGuard an ideal solution for Distributed Enterprises and SMBs. WatchGuard is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America.

To learn more, visit WatchGuard.com. For additional information, promotions and updates, follow WatchGuard on Twitter, @WatchGuard on Facebook, or on the LinkedIn Company page.

Also, visit our InfoSec blog, Secplicity, for real-time information about the latest threats and how to cope with them at www.secplicity.org. Contacts:Rowena Case, WatchGuard Technologies0203 608 9070, ukmarketing@watchguard.com Peter Rennison, PRPR01442 245030, pr@prpr.co.uk

FAF deciding on filters on post to be syndicated:

​Cisco tackling human element of security with cyber training course

Array ( [post_title] => ​Cisco tackling human element of security with cyber training course [post_content] => Cisco has launched a cybersecurity course aimed at teaching adults how to avoid the most common threats, attacks, and vulnerabilities cyberspace presents. [post_excerpt] => Cisco has launched a cybersecurity course aimed at teaching adults how to avoid the most common threats, attacks, and vulnerabilities cyberspace presents. [post_date_gmt] => 2017-06-23 01:22:07 [post_date] => 2017-06-23 02:22:07 [post_modified_gmt] => 2017-06-23 01:22:07 [post_modified] => 2017-06-23 02:22:07 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 7fdea0b0-a6b9-414e-a4ad-f28e3dd63005 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/cisco-tackling-human-element-of-security-with-cyber-training-course/#ftag=RSSbaffb68 [syndication_item_hash] => f0735dcee44b53fef2acaefceb49abd0 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/cisco-tackling-human-element-of-security-with-cyber-training-course/#ftag=RSSbaffb68 [syndication_item_hash] => f0735dcee44b53fef2acaefceb49abd0 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => )

No match on

Decide filter: Returning post, everything seems orderly :​Cisco tackling human element of security with cyber training course

Array ( [post_title] => ​Cisco tackling human element of security with cyber training course [post_content] => Cisco has launched a cybersecurity course aimed at teaching adults how to avoid the most common threats, attacks, and vulnerabilities cyberspace presents. [post_excerpt] => Cisco has launched a cybersecurity course aimed at teaching adults how to avoid the most common threats, attacks, and vulnerabilities cyberspace presents. [post_date_gmt] => 2017-06-23 01:22:07 [post_date] => 2017-06-23 02:22:07 [post_modified_gmt] => 2017-06-23 01:22:07 [post_modified] => 2017-06-23 02:22:07 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => 7fdea0b0-a6b9-414e-a4ad-f28e3dd63005 [meta] => Array ( [enclosure] => Array ( [0] => ) [syndication_source] => Latest topics for ZDNet in Security [syndication_source_uri] => http://www.zdnet.com/ [syndication_source_id] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed] => http://www.zdnet.com/topic/security/rss.xml [syndication_feed_id] => 45 [syndication_permalink] => http://www.zdnet.com/article/cisco-tackling-human-element-of-security-with-cyber-training-course/#ftag=RSSbaffb68 [syndication_item_hash] => f0735dcee44b53fef2acaefceb49abd0 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

Progressive web apps challenge native mobile apps

Array ( [post_title] => Progressive web apps challenge native mobile apps [post_content] =>

Native mobile apps have generally had the edge when it comes to user experience over web-based apps. But the tide is turning, with progressive web apps — a technology spearheaded by Google and Mozilla—catching on at major web properties and developer tools becoming available.

“We’re starting to see a lot of large companies come back to the web because of its low friction,” said Addy Osmani, an engineering manager on Google’s Chrome team. He cited Lyft and Twitter as examples.

Twitter’s progressive web app, Twitter Lite, takes up less than 1MB of memory, compared to more than 100MB for its native iOS app and 23MB for its native Android app, Osmani said. The client-side JavaScript app uses less data and supports push notifications and offline use.

To read this article in full or to leave a comment, please click here

[post_excerpt] =>

Native mobile apps have generally had the edge when it comes to user experience over web-based apps. But the tide is turning, with progressive web apps — a technology spearheaded by Google and Mozilla—catching on at major web properties and developer tools becoming available.

“We’re starting to see a lot of large companies come back to the web because of its low friction,” said Addy Osmani, an engineering manager on Google’s Chrome team. He cited Lyft and Twitter as examples.

Twitter’s progressive web app, Twitter Lite, takes up less than 1MB of memory, compared to more than 100MB for its native iOS app and 23MB for its native Android app, Osmani said. The client-side JavaScript app uses less data and supports push notifications and offline use.

To read this article in full or to leave a comment, please click here

[post_date_gmt] => 2017-06-26 10:00:00 [post_date] => 2017-06-26 11:00:00 [post_modified_gmt] => 2017-06-26 10:00:00 [post_modified] => 2017-06-26 11:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => tag:www.infoworld.com://0b89536d9afb6a33e73bfbb550cb6f64 [meta] => Array ( [enclosure] => Array ( [0] => http://zapt1.staticworld.net/images/article/2016/11/ninja_vs_luke-100695617-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3202660/mobile-development/progressive-web-apps-challenge-native-mobile-apps.html#tk.rss_all [syndication_item_hash] => 424abe3a6a80d4ea4e73c02de3df72e7 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( [0] => 681 [1] => 683 [2] => 682 ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => http://zapt1.staticworld.net/images/article/2016/11/ninja_vs_luke-100695617-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3202660/mobile-development/progressive-web-apps-challenge-native-mobile-apps.html#tk.rss_all [syndication_item_hash] => 424abe3a6a80d4ea4e73c02de3df72e7 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => http://zapt1.staticworld.net/images/article/2016/11/ninja_vs_luke-100695617-large.3x2.jpg )

grab remote location : http://zapt1.staticworld.net/images/article/2016/11/ninja_vs_luke-100695617-large.3x2.jpg

Image exists, checking for same file size

New Enclosure:http://cyberparse.co.uk/wp-content/uploads/2017/06/-ninja_vs_luke-100695617-large.3x2.jpg

Decide filter: Returning post, everything seems orderly :Progressive web apps challenge native mobile apps

Array ( [post_title] => Progressive web apps challenge native mobile apps [post_content] => Native mobile apps have generally had the edge when it comes to user experience over web-based apps. But the tide is turning, with progressive web apps — a technology spearheaded by Google and Mozilla—catching on at major web properties and developer tools becoming available.“We’re starting to see a lot of large companies come back to the web because of its low friction,” said Addy Osmani, an engineering manager on Google’s Chrome team. He cited Lyft and Twitter as examples.[ Get started: How to launch the right mobile development strategy. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ] Twitter’s progressive web app, Twitter Lite, takes up less than 1MB of memory, compared to more than 100MB for its native iOS app and 23MB for its native Android app, Osmani said. The client-side JavaScript app uses less data and supports push notifications and offline use.To read this article in full or to leave a comment, please click here [post_excerpt] => Native mobile apps have generally had the edge when it comes to user experience over web-based apps. But the tide is turning, with progressive web apps — a technology spearheaded by Google and Mozilla—catching on at major web properties and developer tools becoming available.“We’re starting to see a lot of large companies come back to the web because of its low friction,” said Addy Osmani, an engineering manager on Google’s Chrome team. He cited Lyft and Twitter as examples.[ Get started: How to launch the right mobile development strategy. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ]Twitter’s progressive web app, Twitter Lite, takes up less than 1MB of memory, compared to more than 100MB for its native iOS app and 23MB for its native Android app, Osmani said. The client-side JavaScript app uses less data and supports push notifications and offline use.To read this article in full or to leave a comment, please click here [post_date_gmt] => 2017-06-26 10:00:00 [post_date] => 2017-06-26 11:00:00 [post_modified_gmt] => 2017-06-26 10:00:00 [post_modified] => 2017-06-26 11:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => tag:www.infoworld.com://0b89536d9afb6a33e73bfbb550cb6f64 [meta] => Array ( [enclosure] => Array ( [0] => http://cyberparse.co.uk/wp-content/uploads/2017/06/-ninja_vs_luke-100695617-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3202660/mobile-development/progressive-web-apps-challenge-native-mobile-apps.html#tk.rss_all [syndication_item_hash] => 424abe3a6a80d4ea4e73c02de3df72e7 [faf_featured_image] => 1382475 [faf_process_image] => 1382475 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( [0] => 681 [1] => 683 [2] => 682 ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

Review: Appian blends low-code dev with BPM

Array ( [post_title] => Review: Appian blends low-code dev with BPM [post_content] =>

Application development is difficult, time-consuming, and expensive. For a business, that means prioritizing some app development projects over others, and waiting for the development team to turn ideas into code. Often, the application the business needed yesterday doesn’t arrive for months. Sometimes it never arrives at all.

To read this article in full or to leave a comment, please click here

(Insider Story) [post_excerpt] =>

Application development is difficult, time-consuming, and expensive. For a business, that means prioritizing some app development projects over others, and waiting for the development team to turn ideas into code. Often, the application the business needed yesterday doesn’t arrive for months. Sometimes it never arrives at all.

To read this article in full or to leave a comment, please click here

(Insider Story) [post_date_gmt] => 2017-06-26 10:00:00 [post_date] => 2017-06-26 11:00:00 [post_modified_gmt] => 2017-06-26 10:00:00 [post_modified] => 2017-06-26 11:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => tag:www.infoworld.com://63cbf1a6f15d827b8f05da16a4a05e54 [meta] => Array ( [enclosure] => Array ( [0] => http://zapt0.staticworld.net/images/article/2017/01/4_low-code-development-100705193-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3202323/application-development/review-appian-blends-low-code-app-dev-with-bpm.html#tk.rss_all [syndication_item_hash] => d6d648b543cafec2d1a92c79ae3dd405 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( [0] => 681 [1] => 683 [2] => 682 ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => http://zapt0.staticworld.net/images/article/2017/01/4_low-code-development-100705193-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3202323/application-development/review-appian-blends-low-code-app-dev-with-bpm.html#tk.rss_all [syndication_item_hash] => d6d648b543cafec2d1a92c79ae3dd405 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => http://zapt0.staticworld.net/images/article/2017/01/4_low-code-development-100705193-large.3x2.jpg )

grab remote location : http://zapt0.staticworld.net/images/article/2017/01/4_low-code-development-100705193-large.3x2.jpg

Image exists, checking for same file size

New Enclosure:http://cyberparse.co.uk/wp-content/uploads/2017/06/-4_low-code-development-100705193-large.3x2.jpg

Decide filter: Returning post, everything seems orderly :Review: Appian blends low-code dev with BPM

Array ( [post_title] => Review: Appian blends low-code dev with BPM [post_content] => Application development is difficult, time-consuming, and expensive. For a business, that means prioritizing some app development projects over others, and waiting for the development team to turn ideas into code. Often, the application the business needed yesterday doesn’t arrive for months. Sometimes it never arrives at all.To read this article in full or to leave a comment, please click here(Insider Story) [post_excerpt] => Application development is difficult, time-consuming, and expensive. For a business, that means prioritizing some app development projects over others, and waiting for the development team to turn ideas into code. Often, the application the business needed yesterday doesn’t arrive for months. Sometimes it never arrives at all.To read this article in full or to leave a comment, please click here(Insider Story) [post_date_gmt] => 2017-06-26 10:00:00 [post_date] => 2017-06-26 11:00:00 [post_modified_gmt] => 2017-06-26 10:00:00 [post_modified] => 2017-06-26 11:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => tag:www.infoworld.com://63cbf1a6f15d827b8f05da16a4a05e54 [meta] => Array ( [enclosure] => Array ( [0] => http://cyberparse.co.uk/wp-content/uploads/2017/06/-4_low-code-development-100705193-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3202323/application-development/review-appian-blends-low-code-app-dev-with-bpm.html#tk.rss_all [syndication_item_hash] => d6d648b543cafec2d1a92c79ae3dd405 [faf_featured_image] => 1382484 [faf_process_image] => 1382484 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( [0] => 681 [1] => 683 [2] => 682 ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

How to use correlation IDs in ASP.Net Web API

Array ( [post_title] => How to use correlation IDs in ASP.Net Web API [post_content] =>

When working with microservices that communicate over the HTTP protocol, you will want to use correlation IDs to track individual requests. Because requests might flow through many services that are spread across multiple systems, tracking them with correlation IDs will be your only hope of detecting and diagnosing errors that might creep into the middleware systems. This article discusses what correlation IDs are, why they are useful, and how they can be used in ASP.Net Web API.

What are correlation IDs?

Let’s assume you have implemented a microservices architecture. In an application comprised of microservices, different aspects of incoming requests will be handled by different microservices, all working asynchronously on their specific tasks and ultimately coming together to generate the response. Now, if something goes wrong, how would you determine by looking at the logs exactly where the request failed? Your logs might contain millions upon millions of log messages. It would be a daunting task to find the relevant log entries among so many messages.

To read this article in full or to leave a comment, please click here

[post_excerpt] =>

When working with microservices that communicate over the HTTP protocol, you will want to use correlation IDs to track individual requests. Because requests might flow through many services that are spread across multiple systems, tracking them with correlation IDs will be your only hope of detecting and diagnosing errors that might creep into the middleware systems. This article discusses what correlation IDs are, why they are useful, and how they can be used in ASP.Net Web API.

What are correlation IDs?

Let’s assume you have implemented a microservices architecture. In an application comprised of microservices, different aspects of incoming requests will be handled by different microservices, all working asynchronously on their specific tasks and ultimately coming together to generate the response. Now, if something goes wrong, how would you determine by looking at the logs exactly where the request failed? Your logs might contain millions upon millions of log messages. It would be a daunting task to find the relevant log entries among so many messages.

To read this article in full or to leave a comment, please click here

[post_date_gmt] => 2017-06-26 10:00:00 [post_date] => 2017-06-26 11:00:00 [post_modified_gmt] => 2017-06-26 10:00:00 [post_modified] => 2017-06-26 11:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => tag:www.infoworld.com://a3ad64fabc2d5129874a583b2e4614b5 [meta] => Array ( [enclosure] => Array ( [0] => http://zapt0.staticworld.net/images/article/2017/05/puzzle_inspect_examine_identify_missing_piece_magnifying_glass_solution_thinkstock_178361022-100724505-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3201975/application-development/how-to-use-correlation-ids-in-aspnet-web-api.html#tk.rss_all [syndication_item_hash] => a0058542bba651f4d5701f09cb302eba ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( [0] => 681 [1] => 683 [2] => 682 ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => http://zapt0.staticworld.net/images/article/2017/05/puzzle_inspect_examine_identify_missing_piece_magnifying_glass_solution_thinkstock_178361022-100724505-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3201975/application-development/how-to-use-correlation-ids-in-aspnet-web-api.html#tk.rss_all [syndication_item_hash] => a0058542bba651f4d5701f09cb302eba )

Execute : Enclosure images

Enclosure save:

Array ( [0] => http://zapt0.staticworld.net/images/article/2017/05/puzzle_inspect_examine_identify_missing_piece_magnifying_glass_solution_thinkstock_178361022-100724505-large.3x2.jpg )

grab remote location : http://zapt0.staticworld.net/images/article/2017/05/puzzle_inspect_examine_identify_missing_piece_magnifying_glass_solution_thinkstock_178361022-100724505-large.3x2.jpg

404 - File not found

Decide filter: Returning post, everything seems orderly :How to use correlation IDs in ASP.Net Web API

Array ( [post_title] => How to use correlation IDs in ASP.Net Web API [post_content] => When working with microservices that communicate over the HTTP protocol, you will want to use correlation IDs to track individual requests. Because requests might flow through many services that are spread across multiple systems, tracking them with correlation IDs will be your only hope of detecting and diagnosing errors that might creep into the middleware systems. This article discusses what correlation IDs are, why they are useful, and how they can be used in ASP.Net Web API.What are correlation IDs? Let’s assume you have implemented a microservices architecture. In an application comprised of microservices, different aspects of incoming requests will be handled by different microservices, all working asynchronously on their specific tasks and ultimately coming together to generate the response. Now, if something goes wrong, how would you determine by looking at the logs exactly where the request failed? Your logs might contain millions upon millions of log messages. It would be a daunting task to find the relevant log entries among so many messages.To read this article in full or to leave a comment, please click here [post_excerpt] => When working with microservices that communicate over the HTTP protocol, you will want to use correlation IDs to track individual requests. Because requests might flow through many services that are spread across multiple systems, tracking them with correlation IDs will be your only hope of detecting and diagnosing errors that might creep into the middleware systems. This article discusses what correlation IDs are, why they are useful, and how they can be used in ASP.Net Web API.What are correlation IDs? Let’s assume you have implemented a microservices architecture. In an application comprised of microservices, different aspects of incoming requests will be handled by different microservices, all working asynchronously on their specific tasks and ultimately coming together to generate the response. Now, if something goes wrong, how would you determine by looking at the logs exactly where the request failed? Your logs might contain millions upon millions of log messages. It would be a daunting task to find the relevant log entries among so many messages.To read this article in full or to leave a comment, please click here [post_date_gmt] => 2017-06-26 10:00:00 [post_date] => 2017-06-26 11:00:00 [post_modified_gmt] => 2017-06-26 10:00:00 [post_modified] => 2017-06-26 11:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => tag:www.infoworld.com://a3ad64fabc2d5129874a583b2e4614b5 [meta] => Array ( [enclosure] => Array ( [0] => http://zapt0.staticworld.net/images/article/2017/05/puzzle_inspect_examine_identify_missing_piece_magnifying_glass_solution_thinkstock_178361022-100724505-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3201975/application-development/how-to-use-correlation-ids-in-aspnet-web-api.html#tk.rss_all [syndication_item_hash] => a0058542bba651f4d5701f09cb302eba [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( [0] => 681 [1] => 683 [2] => 682 ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

BrandPost: A Look Ahead (and Back) to the Intel HPC Developer Conference

Array ( [post_title] => BrandPost: A Look Ahead (and Back) to the Intel HPC Developer Conference [post_content] =>

Intel’s “DevCon” has been going on for a handful of years now, and it’s emerged as a popular and interesting venue for those interested in HPC and newer fields like HPDA and AI/ML (High Performance Data Analytics, Artificial Intelligence, and Machine Learning). This year the conference will be held Saturday and Sunday morning, November 11 and 12, in Denver.

While Intel just announced a “call for submissions” for the 2017 conference, it seemed like a good time to also mention the available online materials from this conference.  The past resources are all freely available on the web. Previous HPC Developer Conferences have been very well rated by attendees, and that’s due to the high quality of the speakers who have participated in talks, tutorials, and panels.

To read this article in full or to leave a comment, please click here

[post_excerpt] =>

Intel’s “DevCon” has been going on for a handful of years now, and it’s emerged as a popular and interesting venue for those interested in HPC and newer fields like HPDA and AI/ML (High Performance Data Analytics, Artificial Intelligence, and Machine Learning). This year the conference will be held Saturday and Sunday morning, November 11 and 12, in Denver.

While Intel just announced a “call for submissions” for the 2017 conference, it seemed like a good time to also mention the available online materials from this conference.  The past resources are all freely available on the web. Previous HPC Developer Conferences have been very well rated by attendees, and that’s due to the high quality of the speakers who have participated in talks, tutorials, and panels.

To read this article in full or to leave a comment, please click here

[post_date_gmt] => 2017-06-20 16:24:00 [post_date] => 2017-06-20 17:24:00 [post_modified_gmt] => 2017-06-20 16:24:00 [post_modified] => 2017-06-20 17:24:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => tag:www.infoworld.com://da1919d53c922b4bd549999feffdcf89 [meta] => Array ( [enclosure] => Array ( [0] => http://zapt4.staticworld.net/images/article/2017/06/istock-507726997-100726568-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3202191/software/a-look-ahead-and-back-to-the-intel-hpc-developer-conference.html#tk.rss_all [syndication_item_hash] => 9a8e52326c733d13d43419d34a0895ae ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( [0] => 681 [1] => 683 [2] => 682 ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => http://zapt4.staticworld.net/images/article/2017/06/istock-507726997-100726568-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3202191/software/a-look-ahead-and-back-to-the-intel-hpc-developer-conference.html#tk.rss_all [syndication_item_hash] => 9a8e52326c733d13d43419d34a0895ae )

Execute : Enclosure images

Enclosure save:

Array ( [0] => http://zapt4.staticworld.net/images/article/2017/06/istock-507726997-100726568-large.3x2.jpg )

grab remote location : http://zapt4.staticworld.net/images/article/2017/06/istock-507726997-100726568-large.3x2.jpg

404 - File not found

Decide filter: Returning post, everything seems orderly :BrandPost: A Look Ahead (and Back) to the Intel HPC Developer Conference

Array ( [post_title] => BrandPost: A Look Ahead (and Back) to the Intel HPC Developer Conference [post_content] => Intel’s “DevCon” has been going on for a handful of years now, and it’s emerged as a popular and interesting venue for those interested in HPC and newer fields like HPDA and AI/ML (High Performance Data Analytics, Artificial Intelligence, and Machine Learning). This year the conference will be held Saturday and Sunday morning, November 11 and 12, in Denver.While Intel just announced a “call for submissions” for the 2017 conference, it seemed like a good time to also mention the available online materials from this conference.  The past resources are all freely available on the web. Previous HPC Developer Conferences have been very well rated by attendees, and that’s due to the high quality of the speakers who have participated in talks, tutorials, and panels.To read this article in full or to leave a comment, please click here [post_excerpt] => Intel’s “DevCon” has been going on for a handful of years now, and it’s emerged as a popular and interesting venue for those interested in HPC and newer fields like HPDA and AI/ML (High Performance Data Analytics, Artificial Intelligence, and Machine Learning). This year the conference will be held Saturday and Sunday morning, November 11 and 12, in Denver.While Intel just announced a “call for submissions” for the 2017 conference, it seemed like a good time to also mention the available online materials from this conference.  The past resources are all freely available on the web. Previous HPC Developer Conferences have been very well rated by attendees, and that’s due to the high quality of the speakers who have participated in talks, tutorials, and panels.To read this article in full or to leave a comment, please click here [post_date_gmt] => 2017-06-20 16:24:00 [post_date] => 2017-06-20 17:24:00 [post_modified_gmt] => 2017-06-20 16:24:00 [post_modified] => 2017-06-20 17:24:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => tag:www.infoworld.com://da1919d53c922b4bd549999feffdcf89 [meta] => Array ( [enclosure] => Array ( [0] => http://zapt4.staticworld.net/images/article/2017/06/istock-507726997-100726568-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3202191/software/a-look-ahead-and-back-to-the-intel-hpc-developer-conference.html#tk.rss_all [syndication_item_hash] => 9a8e52326c733d13d43419d34a0895ae [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( [0] => 681 [1] => 683 [2] => 682 ) [post_format] => Array ( ) ) )

FAF deciding on filters on post to be syndicated:

What you need to know about Power BI now

Array ( [post_title] => What you need to know about Power BI now [post_content] =>

Come microservice, come cloud, the line-of-business application is always going to be with us. We need to know how our businesses are working: how much we’re selling, how much we’re buying, how our customers are feeling, and every one of a thousand little markers that show the pulse of business.

And that leaves us with the ever-present question: How do we show that information? That’s where business intelligence tools come in, to let us ask questions and get answers, exploring the ever-growing pool of business data we’re storing in our myriad business systems.

Microsoft’s tool for that business data exploration is Power BI, even if you didn’t realize that.

To read this article in full or to leave a comment, please click here

[post_excerpt] =>

Come microservice, come cloud, the line-of-business application is always going to be with us. We need to know how our businesses are working: how much we’re selling, how much we’re buying, how our customers are feeling, and every one of a thousand little markers that show the pulse of business.

And that leaves us with the ever-present question: How do we show that information? That’s where business intelligence tools come in, to let us ask questions and get answers, exploring the ever-growing pool of business data we’re storing in our myriad business systems.

Microsoft’s tool for that business data exploration is Power BI, even if you didn’t realize that.

To read this article in full or to leave a comment, please click here

[post_date_gmt] => 2017-06-20 10:00:00 [post_date] => 2017-06-20 11:00:00 [post_modified_gmt] => 2017-06-20 10:00:00 [post_modified] => 2017-06-20 11:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => tag:www.infoworld.com://c8840f8ca95dca6f3594363da938f895 [meta] => Array ( [enclosure] => Array ( [0] => http://zapt4.staticworld.net/images/article/2017/05/artificial_intelligence_machine_learning_thinkstock_533903294-100724410-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3201824/analytics/what-you-need-to-know-about-power-bi-now.html#tk.rss_all [syndication_item_hash] => 01d237acc7895f9f710603ed7db8bd66 ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( [0] => 681 [1] => 683 [2] => 682 ) [post_format] => Array ( ) ) )

Doing filter:faf_remove_html

Doing filter:faf_image_filter

Execute image filter

Image process

No image matches

Array ( )

Array ( [enclosure] => Array ( [0] => http://zapt4.staticworld.net/images/article/2017/05/artificial_intelligence_machine_learning_thinkstock_533903294-100724410-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3201824/analytics/what-you-need-to-know-about-power-bi-now.html#tk.rss_all [syndication_item_hash] => 01d237acc7895f9f710603ed7db8bd66 )

Execute : Enclosure images

Enclosure save:

Array ( [0] => http://zapt4.staticworld.net/images/article/2017/05/artificial_intelligence_machine_learning_thinkstock_533903294-100724410-large.3x2.jpg )

grab remote location : http://zapt4.staticworld.net/images/article/2017/05/artificial_intelligence_machine_learning_thinkstock_533903294-100724410-large.3x2.jpg

404 - File not found

Decide filter: Returning post, everything seems orderly :What you need to know about Power BI now

Array ( [post_title] => What you need to know about Power BI now [post_content] => Come microservice, come cloud, the line-of-business application is always going to be with us. We need to know how our businesses are working: how much we’re selling, how much we’re buying, how our customers are feeling, and every one of a thousand little markers that show the pulse of business.And that leaves us with the ever-present question: How do we show that information? That’s where business intelligence tools come in, to let us ask questions and get answers, exploring the ever-growing pool of business data we’re storing in our myriad business systems.[ Explore the power of the graph—the Microsoft and Office Graph, that is—in your apps: Microsoft Graph: The APIs to Office 365’s hidden riches • Microsoft Graph and Microsoft Teams reshape Office • Cortana moves way beyond being a personal assistant. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ] Microsoft’s tool for that business data exploration is Power BI, even if you didn’t realize that.To read this article in full or to leave a comment, please click here [post_excerpt] => Come microservice, come cloud, the line-of-business application is always going to be with us. We need to know how our businesses are working: how much we’re selling, how much we’re buying, how our customers are feeling, and every one of a thousand little markers that show the pulse of business.And that leaves us with the ever-present question: How do we show that information? That’s where business intelligence tools come in, to let us ask questions and get answers, exploring the ever-growing pool of business data we’re storing in our myriad business systems.[ Explore the power of the graph—the Microsoft and Office Graph, that is—in your apps: Microsoft Graph: The APIs to Office 365’s hidden riches • Microsoft Graph and Microsoft Teams reshape Office • Cortana moves way beyond being a personal assistant. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ]Microsoft’s tool for that business data exploration is Power BI, even if you didn’t realize that.To read this article in full or to leave a comment, please click here [post_date_gmt] => 2017-06-20 10:00:00 [post_date] => 2017-06-20 11:00:00 [post_modified_gmt] => 2017-06-20 10:00:00 [post_modified] => 2017-06-20 11:00:00 [post_status] => publish [comment_status] => open [ping_status] => open [guid] => tag:www.infoworld.com://c8840f8ca95dca6f3594363da938f895 [meta] => Array ( [enclosure] => Array ( [0] => http://zapt4.staticworld.net/images/article/2017/05/artificial_intelligence_machine_learning_thinkstock_533903294-100724410-large.3x2.jpg ) [syndication_source] => InfoWorld [syndication_source_uri] => http://www.infoworld.com [syndication_source_id] => http://www.infoworld.com/index.rss [syndication_feed] => http://www.infoworld.com/index.rss [syndication_feed_id] => 74 [syndication_permalink] => http://www.infoworld.com/article/3201824/analytics/what-you-need-to-know-about-power-bi-now.html#tk.rss_all [syndication_item_hash] => 01d237acc7895f9f710603ed7db8bd66 [faf_process_image] => ) [post_type] => post [post_author] => 6 [tax_input] => Array ( [category] => Array ( [0] => 10 ) [post_tag] => Array ( [0] => 681 [1] => 683 [2] => 682 ) [post_format] => Array ( ) ) )

1

Attach Id ( 959790 ) not integer for post_thumbnail 835201

1

Attach Id ( 856794 ) not integer for post_thumbnail 761607

1

Attach Id ( 856801 ) not integer for post_thumbnail 734000

1

Attach Id ( 856800 ) not integer for post_thumbnail 734000

1

Attach Id ( 856806 ) not integer for post_thumbnail 725032

1

Attach Id ( 1035932 ) not integer for post_thumbnail 1030349

1

Attach Id ( 1097605 ) not integer for post_thumbnail 1021772

1

Attach Id ( 1070445 ) not integer for post_thumbnail 1031592

1

Attach Id ( 1088817 ) not integer for post_thumbnail 1084937

1

Attach Id ( 1097146 ) not integer for post_thumbnail 1034023

1

Attach Id ( 1097756 ) not integer for post_thumbnail 1081891

1

Attach Id ( 1366067 ) not integer for post_thumbnail 1064018

1

Attach Id ( 1114278 ) not integer for post_thumbnail 1112807

1

Attach Id ( 1120202 ) not integer for post_thumbnail 1110638

1

Attach Id ( 1130484 ) not integer for post_thumbnail 1128829

1

Attach Id ( 1130811 ) not integer for post_thumbnail 1070037

1

Attach Id ( 1131627 ) not integer for post_thumbnail 1037929

1

Attach Id ( 1138547 ) not integer for post_thumbnail 1066943

1

Attach Id ( 1155230 ) not integer for post_thumbnail 1037716

1

Attach Id ( 1298248 ) not integer for post_thumbnail 1046394

1

Attach Id ( 1164146 ) not integer for post_thumbnail 1054729

1

Attach Id ( 1188679 ) not integer for post_thumbnail 1062534

1

Attach Id ( 1204758 ) not integer for post_thumbnail 1042440

1

Attach Id ( 1246234 ) not integer for post_thumbnail 1037938

1

Attach Id ( 1247909 ) not integer for post_thumbnail 1063879

1

Attach Id ( 1248171 ) not integer for post_thumbnail 1229545

1

Attach Id ( 1249414 ) not integer for post_thumbnail 1188979

1

Attach Id ( 1257328 ) not integer for post_thumbnail 1120206

1

Attach Id ( 1297465 ) not integer for post_thumbnail 1157604

1

Attach Id ( 1301705 ) not integer for post_thumbnail 1060130

1

Attach Id ( 1323365 ) not integer for post_thumbnail 1204453

1

Attach Id ( 1334069 ) not integer for post_thumbnail 1050182

1

Attach Id ( 1380562 ) not integer for post_thumbnail 1380580

1

Attach Id ( 1380844 ) not integer for post_thumbnail 1380845

1

Attach Id ( 1380847 ) not integer for post_thumbnail 1380848

1

Attach Id ( 1380852 ) not integer for post_thumbnail 1380853

1

Attach Id ( 1380864 ) not integer for post_thumbnail 1380865

1

Attach Id ( 1381072 ) not integer for post_thumbnail 1381073

1

Attach Id ( 1381074 ) not integer for post_thumbnail 1381075

1

Attach Id ( 1381084 ) not integer for post_thumbnail 1381085

1

Attach Id ( 1381087 ) not integer for post_thumbnail 1381088

1

Attach Id ( 1381134 ) not integer for post_thumbnail 1381135

1

Attach Id ( 1381142 ) not integer for post_thumbnail 1381145

1

Attach Id ( 1381138 ) not integer for post_thumbnail 1381144

1

Attach Id ( 1381518 ) not integer for post_thumbnail 1381519

1

Attach Id ( 1381520 ) not integer for post_thumbnail 1381521

1

Attach Id ( 1381539 ) not integer for post_thumbnail 1381541

1

Attach Id ( 1381750 ) not integer for post_thumbnail 1381751

1

Attach Id ( 1381767 ) not integer for post_thumbnail 1381774

1

Attach Id ( 1381796 ) not integer for post_thumbnail 1381797

1

Attach Id ( 1381851 ) not integer for post_thumbnail 1381853

1

Attach Id ( 1381855 ) not integer for post_thumbnail 1381856

1

Attach Id ( 1381869 ) not integer for post_thumbnail 1381873

1

Attach Id ( 1381875 ) not integer for post_thumbnail 1381879

1

Attach Id ( 1381889 ) not integer for post_thumbnail 1381890

1

Attach Id ( 1381894 ) not integer for post_thumbnail 1381896

1

Attach Id ( 1381925 ) not integer for post_thumbnail 1381926

1

Attach Id ( 1382019 ) not integer for post_thumbnail 1382020

1

Attach Id ( 1382151 ) not integer for post_thumbnail 1382152

1

Attach Id ( 1382161 ) not integer for post_thumbnail 1382162

1

Attach Id ( 1382169 ) not integer for post_thumbnail 1382170

1

Attach Id ( 1382222 ) not integer for post_thumbnail 1382223

1

Attach Id ( 1382240 ) not integer for post_thumbnail 1382241

1

Attach Id ( 1382418 ) not integer for post_thumbnail 1382419

1

Attach Id ( 1382504 ) not integer for post_thumbnail 1382505