Issue highlights 1. Ubuntu 13.10 review: Is it a worthy upgrade? 2. Android isn't 'more secure than the iPhone,' but Google's security woes are overblown 3. Adobe's source code was parked on hackers' unprotected server 4. How to find out what's taking up space on your hard drive 5. So much data, so little security -- what happens if your city gets hacked? 6. Soon, everyone will be searchable on Facebook 7. The PC makers' battle against Microsoft's Surface, in their own words 8. People flock to anonymizing services after NSA snooping reports 9. U.S. Army evaluates self-driving, machine gun-toting robots |
| White Paper: Lumension Security With the rise of user-generated content, social networks and readily available information offered by the Web 2.0-enabled workplace, users are more connected to people and ideas than ever before. This new level of connectivity also introduces significant risk. Read now! |
| In today's open source roundup: ZDNet has an early review of Ubuntu 13.10. Plus: Firefox OS gets speed improvements and wider distribution, and check out six keyboard apps for Android. READ MORE |
| Eric Schmidt is saying crazy things again, but this time, his zaniness highlights a key point. READ MORE |
| Hackers capitalize on other people's mistakes. But they make their own as well. READ MORE |
| If you find yourself low on disk space and are seeking a clue as to where your free space has gone, here's how to find out. READ MORE |
| White Paper: PC Connection This white paper highlights new integration features implemented in EMC Avamar with EMC Data Domain deduplication storage systems to allow high-speed data backup directly to Data Domain systems from the Avamar management interface. Learn More |
| Microsoft's Craig Mundie offers security suggestions to MIT Emtech conference; other experts tout smart cities technology. READ MORE |
| In a matter of weeks, everyone on Facebook will be searchable by name. But you'll still have ways to control who sees your content, as long as you can navigate Facebook's web of privacy controls. READ MORE |
| HP CEO Meg Whitman is just the latest to publicly lament Microsoft's decision to compete against its partners with the Surface tablet. READ MORE |
| However, even vendors offering those services can't guarantee 100 percent success in shielding data from government surveillance. READ MORE |
| The U.S. Army, looking to use more robots on the battlefield, this week is getting a peek at just how ready robots are to become trusted parts of the military. READ MORE |
| White Paper: PC Connection The cloud promises impressive gains in infrastructure agility, efficiency, and cost reduction, but the greatest barrier to cloud adoption continues to be security. Read this white paper to learn best practices for keeping your data and your organization safe. Learn More |
| SPECIAL REPORT: Tools and strategies to keep the BYOD chaos under control One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.
BOOK GIVEAWAY: We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win! The Official Ubuntu Server Book, 3rd Ed. Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator. The Practice of Network Security Monitoring Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.
DON'T MISS... The 10 programming languages most likely to drive developers insane 11 foods you'll be eating in 2050 15 geeky places to visit before you die I'll cry if I want to: Ten tech titans and their temper tantrums 7 ways to beat fingerprint biometrics
| |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.