Saturday, September 7, 2013

How the NSA snoop-proofs its Macs

10 defining moments in tech-labor history

Fragging wonderful: The truth about defragging your SSD

ITworld Today
September 07, 2013
Share this email

How the NSA snoop-proofs its Macs

Although the agency has been in hot water because of who it has been spying on, snooping isn't the agency's only job. The NSA also plays an important role in helping the rest of the government secure its computers from outside attackers.

READ MORE
 

Issue highlights

1. 10 defining moments in tech-labor history

2. Fragging wonderful: The truth about defragging your SSD

3. Report: NSA defeats many encryption efforts

4. Why a Chromebook should be your next notebook

5. Getting around Google+: 25 tips and tricks for power users

6. Robocop reboot trailer hits the InterWeb

7. Why professionals backstab their colleagues

Webcast: IBM and Intel

IBM Delivers Innovation On New x86 Systems and Solutions

Live Webcast: Tuesday, September 10, 2013 3:00 PM EDT You need an IT infrastructure that provides scalability, performance and efficiency tailored to the specific goals of your business. Join us on September 10 to learn more about IBM's new innovation designed to provide the performance and efficiency required for today's workloads. Register Now

10 defining moments in tech-labor history

Contract labor abuse, offshoring, H-1B misuse -- the events, innovations, lawsuits, and layoffs that shaped today's tech-labor tensions READ MORE

Fragging wonderful: The truth about defragging your SSD

We analyze the tech reasoning and put four defraggers through their paces on both kinds of drives. The results may surprise you. READ MORE

Report: NSA defeats many encryption efforts

The U.S. National Security Agency has been circumventing many online encryption efforts through a combination of supercomputers, back doors built into technology products, court orders and other efforts, according to a new report from The New York Times and ProPublica. READ MORE

White Paper: Dell VMware

CIO Strategies: Modernize Data Protection Practices

Traditional approaches to data protection are no longer enough. A strategy that thoughtfully augments your legacy infrastructure with modern data protection approaches can help reduce complexity, slash costs, and minimize risk of loss - while accelerating your organization's time to value. Read Now!

Why a Chromebook should be your next notebook

Google has just announced a new generation of Chrome OS apps, and for the first time, Chromebooks may be able to compete against their more expensive Windows and Mac OS X competitors. In a BYOD world where companies increasingly ask you to buy your own portable devices, it may be time to opt for a Chromebook. READ MORE

Getting around Google+: 25 tips and tricks for power users

The last of JR Raphael's three-part how-to series includes advanced tips and tricks to help you take your Google+ experience to the next level. READ MORE

Robocop reboot trailer hits the InterWeb

If you're angry about the remake of this classic film, you're officially old. READ MORE

Why professionals backstab their colleagues

The top 5 career-killing moves that cause irreversible damage to your reputation. READ MORE

White Paper: Peak Hosting

Operations as a Service: Outsource Everything but Your Code

When you are able to outsource ALL of your operations to experienced engineers, architects and support staff, your company can focus on what sets you apart: your intellectual property, customers or sales and marketing. Read more >>

SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.
 

DON'T MISS...

Famous firsts: The earliest days of your favorite social networks

Jealous much? 8 techy things that can spark office envy

Hey Gen Y'er, want a promotion? Communicate like an old guy

10 overhyped tech products that crashed and burned

Up all night: How the tech elite pushes a crazy workaholic culture
 

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.