Friday, October 25, 2013

It's criminal: Why data sharing lags among law enforcement agencies

5 free downloads to fix Facebook annoyances and privacy invasions

Scientists create a data storage material with a million year lifespan

ITworld Today
October 25, 2013
Share this email

It's criminal: Why data sharing lags among law enforcement agencies

In 2008 the FBI's Criminal Justice Information Services division (CJIS) embarked on an ambitious effort to enable information sharing among every federal, state, tribal and local law enforcement agency in the United States. It launched the National Data Exchange (N-DEx), an $85 million data warehouse project, and waited for the data to roll in.

READ MORE
 

Issue highlights

1. 5 free downloads to fix Facebook annoyances and privacy invasions

2. Scientists create a data storage material with a million year lifespan

3. NSA spied on 35 world leaders according to leaked document

4. How to make smooth scrolling ListViews in Android

5. SteamOS could really help desktop Linux adoption, says Torvalds

6. Specs showdown: iPad mini vs. Nexus 7 vs. Kindle Fire HDX

7. 8.1 features Microsoft removed from Windows 8.1

8. Security tool delivers surprise insights to Domino's Pizza

9. BOOK GIVEAWAY: The Practice of Network Security Monitoring

Resource compliments of: IT Roadmap 2013

IT Roadmap Washington, D.C. - Dates Announced

IT Roadmap will be returning to the Walter E. Washington Convention Center on Thursday, December 12, 2013. 8am - 4:30pm. Register now for this free one day, technical conference and expo! Click to continue

5 free downloads to fix Facebook annoyances and privacy invasions

Facebook can be one of the biggest productivity-sappers there is. But it needn't be. Here are five free downloads to fix some of Facebook's worst annoyances, and to help protect your privacy. READ MORE

Scientists create a data storage material with a million year lifespan

Optical media and magnetic media are only good for a few decades. This will last long enough to send throughout the galaxy, assuming whoever finds it can read it. READ MORE

NSA spied on 35 world leaders according to leaked document

The U.S. monitored the phone conversations of 35 world leaders, according to a National Security Agency document provided by its former contractor, Edward Snowden, according to The Guardian newspaper. READ MORE

How to make smooth scrolling ListViews in Android

In mobile development today, the user interface and user experience (UI/UX) are king. It's important to optimize the performance of your application to provide the best experience. Here's how to optimize the ListView in Android for smooth scrolling. READ MORE

Resource compliments of: Google

Chrome at Work

Deploy Chrome browser for your company and customize 100+ policies. Manage updates, compatibility with older apps and more. www.google.com/chrome

SteamOS could really help desktop Linux adoption, says Torvalds

The Linux desktop revolution is just around the corner! READ MORE

Specs showdown: iPad mini vs. Nexus 7 vs. Kindle Fire HDX

Apple's little tablet costs a lot more, but its thriving ecosystem makes it hard to beat. READ MORE

8.1 features Microsoft removed from Windows 8.1

Good-bye, Messaging. Farewell, My Computer. These and some other features were left behind. READ MORE

Security tool delivers surprise insights to Domino's Pizza

Marketers at Domino's Pizza are gaining new and more immediate insights into online coupon usage from an unexpected source: a security management tool used by the national chain's IT department. READ MORE

BOOK GIVEAWAY: The Practice of Network Security Monitoring

We've got 5 copies to give to some lucky ITworld readers. Enter now for your chance to win! READ MORE

White Paper: BlackBerry

Five answers to top BYOD Challenges

Mobility has revolutionized how we do business. Managing mobility and BYOD means knowing how to navigate changing operating systems, changing platforms and changing hardware to reap benefits like improved productivity, agility, growth and better customer service. Here are five steps for choosing an MDM solution for today -- and tomorrow. Learn More

BOOK GIVEAWAY:

We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

Arg! The 9 hardest things programmers have to do

7 tools that help protect you against the NSA and Google

Obsolete! Careers that are being automated into oblivion

15 geeky places to visit before you die

13 unsung women of technology

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.