Thursday, October 10, 2013

10 killer tech exec Halloween costumes, Plus: Google's new bug bounty

Would Linux survive if Ubuntu died?

Google to pay rewards for open-source code security fixes

ITworld Today
October 10, 2013
Share this email

Shudder! 10 killer tech exec costumes

Throw a fright into your trick-or-treaters this year by dressing - and acting - like one of these titans of technology.

READ MORE
 

Issue highlights

1. Would Linux survive if Ubuntu died?

2. Google to pay rewards for open-source code security fixes

3. In a room with no cell service, Verizon works on the future of mobile

4. Syria's largest city comes back online

5. Lenovo shows Android laptop in leaked user manuals

6. Sony admits it originally planned to include a camera with the Playstation 4

7. Intel changes mind, ships Haswell-based Pentium, Celeron processors

8. Large screen iPhones and retina display for Macbook Air coming in 2014

9. BOOK GIVEAWAY: The Official Ubuntu Server Book, 3rd Ed.

Resource compliments of: BlackBerry

Trade up your licenses for free

There is an easy, no-cost way for you to leverage your existing BlackBerry® investment and make the move to BlackBerry® Enterprise Service 10. Trade up your licenses for free to receive new licenses and server software that allows you to secure and manage BlackBerry® 10 smartphones. Learn more about the free license trade up offer.

Would Linux survive if Ubuntu died?

In today's open source roundup: Would Linux survive if Ubuntu suddenly died? Plus: How you can create your own Linux distro, and a first look at Semplice Linux 5 (a Debian-based distro). READ MORE

Google to pay rewards for open-source code security fixes

Google said Wednesday it plans to reward developers for developing proactive security improvements for some of the most widely used open-source software programs. READ MORE

In a room with no cell service, Verizon works on the future of mobile

If you think your house has bad cellular coverage, Verizon Wireless has you beat: A small, windowless room high up in a San Francisco office building gets no service at all. READ MORE

Syria's largest city comes back online

Internet service has been restored to Aleppo, Syria's largest city, with a renewed connection to Turkey's largest telecommunications provider, according to Internet monitoring company Renesys. READ MORE

White Paper: PC Connection

Backup and Recovery for VMware Environments with Avamar 7

This white paper provides an overview of the features implemented in EMC Avamar for fast, efficient, and secure backups of VMware virtual environments. With these features, EMC Avamar is enabling the repaid continued expansion of cloud environments, required by the demand for IT-as-a-Service (ITaaS). Learn More

Lenovo shows Android laptop in leaked user manuals

Accidentally leaked user manuals from PC maker Lenovo show that the company is preparing a new laptop that runs Android instead of Windows. READ MORE

Sony admits it originally planned to include a camera with the Playstation 4

Confirming what we all already suspected...but was it the right move? READ MORE

Intel changes mind, ships Haswell-based Pentium, Celeron processors

Aiming at budget laptops, Intel has started shipping new Pentium and Celeron processors based on the Haswell microarchitecture. READ MORE

Large screen iPhones and retina display for Macbook Air coming in 2014

In today's Apple news roundup: Big screen iPhones and retina displays for the Macbook Air are coming in 2014. Plus: Apple iPad event may happen on October 22. And Qualcomm backs away from its attack on Apple's 64-bit A7 processor. READ MORE

BOOK GIVEAWAY: The Official Ubuntu Server Book, 3rd Ed.

We've got 5 copies to give to some lucky ITworld readers. Enter now for your chance to win! READ MORE

White Paper: PC Connection

5 Steps for Building a Secure Cloud

The cloud promises impressive gains in infrastructure agility, efficiency, and cost reduction, but the greatest barrier to cloud adoption continues to be security. Read this white paper to learn best practices for keeping your data and your organization safe. Learn More

SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.

BOOK GIVEAWAY:

We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

The 10 programming languages most likely to drive developers insane

11 foods you'll be eating in 2050

15 geeky places to visit before you die

I'll cry if I want to: Ten tech titans and their temper tantrums

7 ways to beat fingerprint biometrics

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.