Friday, October 11, 2013

9 museums that want your legacy tech - and what they're looking for

Ubuntu 13.10 review: Is it a worthy upgrade?

Android isn't 'more secure than the iPhone,' but Google's security woes are overblown

ITworld Today
October 11, 2013
Share this email

9 museums that want your legacy tech - and what they're looking for

Is there a computer in your basement that qualifies?

READ MORE
 

Issue highlights

1. Ubuntu 13.10 review: Is it a worthy upgrade?

2. Android isn't 'more secure than the iPhone,' but Google's security woes are overblown

3. Adobe's source code was parked on hackers' unprotected server

4. How to find out what's taking up space on your hard drive

5. So much data, so little security -- what happens if your city gets hacked?

6. Soon, everyone will be searchable on Facebook

7. The PC makers' battle against Microsoft's Surface, in their own words

8. People flock to anonymizing services after NSA snooping reports

9. U.S. Army evaluates self-driving, machine gun-toting robots

White Paper: Lumension Security

Best Practice Guide to Addressing Web 2.0 Risks

With the rise of user-generated content, social networks and readily available information offered by the Web 2.0-enabled workplace, users are more connected to people and ideas than ever before. This new level of connectivity also introduces significant risk. Read now!

Ubuntu 13.10 review: Is it a worthy upgrade?

In today's open source roundup: ZDNet has an early review of Ubuntu 13.10. Plus: Firefox OS gets speed improvements and wider distribution, and check out six keyboard apps for Android. READ MORE

Android isn't 'more secure than the iPhone,' but Google's security woes are overblown

Eric Schmidt is saying crazy things again, but this time, his zaniness highlights a key point. READ MORE

Adobe's source code was parked on hackers' unprotected server

Hackers capitalize on other people's mistakes. But they make their own as well. READ MORE

How to find out what's taking up space on your hard drive

If you find yourself low on disk space and are seeking a clue as to where your free space has gone, here's how to find out. READ MORE

White Paper: PC Connection

EMC Avamar Integration with EMC Data Domain Systems

This white paper highlights new integration features implemented in EMC Avamar with EMC Data Domain deduplication storage systems to allow high-speed data backup directly to Data Domain systems from the Avamar management interface. Learn More

So much data, so little security -- what happens if your city gets hacked?

Microsoft's Craig Mundie offers security suggestions to MIT Emtech conference; other experts tout smart cities technology. READ MORE

Soon, everyone will be searchable on Facebook

In a matter of weeks, everyone on Facebook will be searchable by name. But you'll still have ways to control who sees your content, as long as you can navigate Facebook's web of privacy controls. READ MORE

The PC makers' battle against Microsoft's Surface, in their own words

HP CEO Meg Whitman is just the latest to publicly lament Microsoft's decision to compete against its partners with the Surface tablet. READ MORE

People flock to anonymizing services after NSA snooping reports

However, even vendors offering those services can't guarantee 100 percent success in shielding data from government surveillance. READ MORE

U.S. Army evaluates self-driving, machine gun-toting robots

The U.S. Army, looking to use more robots on the battlefield, this week is getting a peek at just how ready robots are to become trusted parts of the military. READ MORE

White Paper: PC Connection

5 Steps for Building a Secure Cloud

The cloud promises impressive gains in infrastructure agility, efficiency, and cost reduction, but the greatest barrier to cloud adoption continues to be security. Read this white paper to learn best practices for keeping your data and your organization safe. Learn More

SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.

BOOK GIVEAWAY:

We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

The 10 programming languages most likely to drive developers insane

11 foods you'll be eating in 2050

15 geeky places to visit before you die

I'll cry if I want to: Ten tech titans and their temper tantrums

7 ways to beat fingerprint biometrics

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.