Thursday, October 3, 2013

US demanded access to encryption keys of email provider Lavabit

Faded satellite star LightSquared headed for auction block in November | Google buys Flutter, a gesture recognition startup

ITworld Enterprise Networking

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


US demanded access to encryption keys of email provider Lavabit
The U.S. government demanded from email service provider Lavabit access to all user communications and a copy of the encryption keys used to secure web, instant message and email traffic for its investigation into several Lavabit user accounts, according to a post on the Facebook page of founder Ladar Levison. Read More


WEBCAST: Dell VMware

Key Data Protection Challenges Facing Today's Enterprises
The data avalanche is accelerating. IDC estimates that the "digital universe" -- which is the total of all digital data created (and replicated) -- will reach 4 zettabytes this year. That's almost 50% more than 2012 volumes, and nearly four times the amount created and replicated in 2010. View Now

WEBCAST: IBM

Dispelling the Top 3 Myths for Utilizing Business Analytics
Many organizations are focusing on their Operations to reduce costs. Operations aligns processes to ensure customer expectations are met. In order to excel in Operations, organizations must go beyond what they've been doing with process improvement – and create and sustain smarter processes. Register Now

Faded satellite star LightSquared headed for auction block in November
The long saga of satellite operator LightSquared's quest to become a cellular carrier may come to an end soon with an auction for the company's assets scheduled for late November. Read More

Google buys Flutter, a gesture recognition startup
Google has acquired Flutter, a gesture recognition company whose technology lets people control music and movies on their desktop by waving their hands. Read More


WEBCAST: APC by Schneider Electric

Make your data center available, efficient and safe
We will discuss what you should expect from a world class service provider and the scope of services needed to make your data center the best it can be. Learn More. Learn More.

Bluetooth Smart going into wireless device chargers
Mobile devices will be able to talk to wireless charging platforms through a partnership between the Alliance for Wireless Power and the backers of Bluetooth. Read More

New 'white spaces' research from Microsoft and China makes it easier to find vacant spectrum
Identifying and using vacant "white space" spectrum for Wi-Fi may get simpler, more efficient, and cheaper thanks to a new project by Microsoft and a team of Chinese researchers. Read More

US DOJ opposes company requests to publish surveillance statistics
The U.S. Department of Justice has opposed requests by Facebook, Google, Microsoft and other companies to publish the number of surveillance requests they receive from the U.S. National Security Agency and other agencies. Read More


SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.

BOOK GIVEAWAY:

We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

The 10 programming languages most likely to drive developers insane

11 foods you'll be eating in 2050

15 geeky places to visit before you die

I'll cry if I want to: Ten tech titans and their temper tantrums

7 ways to beat fingerprint biometrics


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_enterprise_networking as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.