Tuesday, October 29, 2013

6 IT dirty secrets. Plus: How compilers compromise app security

How your compiler may be compromising application security

Seagate Kinetic - Cloud storage on a disk, no server required

ITworld Today
October 29, 2013
Share this email

6 dirty secrets of the IT industry

IT pros blow the whistle on the less-than-white lies and dark sides of the tech business.

READ MORE
 

Issue highlights

1. How your compiler may be compromising application security

2. Seagate Kinetic - Cloud storage on a disk, no server required

3. Executive shakeups hit Qualcomm, Intel

4. Microsoft goes big data with new Hadoop Azure service

5. Zuckerberg said what about privacy? Researchers create archive to find out

6. 5 free iWork alternatives that let you get real work done on a Mac

7. How 4 companies use mobile apps to court customers

8. Masters of disasters: IT survivors of Katrina, Sandy and other natural disasters share their DR tips and tricks

9. BOOK GIVEAWAY: The Practice of Network Security Monitoring

Resource compliments of: IT Roadmap 2013

IT Roadmap Washington, D.C. - Dates Announced

IT Roadmap will be returning to the Walter E. Washington Convention Center on Thursday, December 12, 2013. 8am - 4:30pm. Register now for this free one day, technical conference and expo! Click to continue

How your compiler may be compromising application security

Researchers at MIT develop a tool to identify code that your compiler may inadvertently remove, creating vulnerabilities. READ MORE

Seagate Kinetic - Cloud storage on a disk, no server required

Building your own storage area network (SAN) involves many layers, not the least of which is the server layer communicating with the storage devices. Seagate has recently announced a new storage architecture called Kinetic that builds server-like functionality and ethernet right on the drive itself. READ MORE

Executive shakeups hit Qualcomm, Intel

A top Intel executive retires, and along with him his group seems to be vanishing. Meanwhile, a former Intel executive now at Qualcomm gets scolded for speaking out of turn. READ MORE

Microsoft goes big data with new Hadoop Azure service

In much the same way that Microsoft brought spreadsheet crunching to the business world through its now-ubiquitous Excel, the company is hoping to make a similar impact with big data analysis with its new Windows Azure HDInsight service. READ MORE

Resource compliments of: Google

IT Professionals

Deploy Chrome browser for your company and customize 100+ policies. Manage updates, compatibility with older apps and more. www.google.com/chrome

Zuckerberg said what about privacy? Researchers create archive to find out

Facebook CEO Mark Zuckerberg sometimes speaks quickly and his statements on Internet privacy are not always clear, so researchers have created an archive to collect everything the executive has said publicly. READ MORE

5 free iWork alternatives that let you get real work done on a Mac

If you're one of the many people angry that Apple took away many features of iWork in its new upgrade, here's good news for you: I've got five free iWork alternatives that let you get real work done on your Mac. READ MORE

How 4 companies use mobile apps to court customers

IT is on the hot seat to step up its mobile game as businesses strive to get closer to their customers. Here's how four tech departments are meeting that challenge. READ MORE

Masters of disasters: IT survivors of Katrina, Sandy and other natural disasters share their DR tips and tricks

Natural and manmade disasters are facts of life. Smart IT managers prepare for the worst before trouble hits, so that the businesses and government institutions that rely on IT can resume normal operations as soon as possible. READ MORE

BOOK GIVEAWAY: The Practice of Network Security Monitoring

We've got 5 copies to give to some lucky ITworld readers. Enter now for your chance to win! But hurry. The drawing ends October 31. READ MORE

White Paper: VMware

The Clear Path to Cloud Security, Compliance, & Cost Control

Both customers and IT decision makers are concerned about cloud security, according to recent research. How can you negotiate this barrier to realize the benefits of cloud computing? Read this paper to learn about the techniques, tools, and technologies that will enable you to capitalize on the cloud safely and cost-effectively. Read Now

BOOK GIVEAWAY:

The drawings end October 31. Enter now for your chance to win one of these two new books!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

Arg! The 9 hardest things programmers have to do

7 tools that help protect you against the NSA and Google

Obsolete! Careers that are being automated into oblivion

15 geeky places to visit before you die

13 unsung women of technology

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.