Issue highlights 1. Hacking evolution: From good to evil to good 2. Job well done? Better ways to assess tech employees 3. Unix commands and tools you just can't live without 4. Dell SEC filing highlights bleak outlook that led to buyout plan 5. Facebook phone rumors explode after Android event announced 6. Critical denial-of-service flaw in BIND software puts DNS servers at risk 7. Mobile and personalization technologies drive fast food chains to the future 8. China slams U.S. for discriminating against nation's tech vendors 9. BOOK GIVEAWAY: Win a copy of 'The Java Tutorial' |
White Paper: APC by Schneider Electric This whitepaper shares real-world trials and tribulations from data center managers in the trenches who deal with the unique challenges of running a data center in constrained space - as well as solutions. Vendor neutral. Learn More. |
Video outlines the background of how hacking when from enthusiasts to criminals, and how good hackers are trying to take back the term. READ MORE |
No more counting lines of code: Managers look for new ways to assess IT employee performance. READ MORE |
Are you someone who never met a Unix command you didn't like? OK, maybe not. But are there commands you just can't imagine living without? Let's look at some that have made a big difference on my busiest days and those that people I've worked with over the years have said are their most important essentials. READ MORE |
In a filing to the U.S. Securities and Exchange Commission on Friday, Dell highlighted the dismal financial straits that led to its plan to take the company private, a move that now has some major shareholders in an uproar. READ MORE |
White Paper: Phoenix NAP This whitepaper will explore the hard realities of cloud computing and will seek to provide insight into what large and small enterprises should look to as they begin their quest for increased cost savings and reduced capital expenditures. Learn more. |
Talk that Facebook is developing its own smartphone is spreading again. READ MORE |
A flaw in the widely used BIND DNS (Domain Name System) software can be exploited by remote attackers to crash DNS servers and affect the operation of other programs running on the same machines. READ MORE |
The future of burger joints and smoothie bars involves customer-friendly technologies that will make fast food more of a service and less of a destination. READ MORE |
A U.S. funding law calls for increased scrutiny on IT purchases for select federal agencies. READ MORE |
We've got 5 to give to some lucky readers. Enter now for your chance to win! READ MORE |
Webcast: Oracle and Intel Business users increasingly demand 24x7 availability of their data while IT departments face the challenge of ensuring maximum availability while operating with limited budgets. Learn More |
|
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.