Wednesday, October 30, 2013

Zuckerberg said what about privacy? Researchers create archive to find out

Zuckerberg said what about privacy? Researchers create archive to find out | Human rights commission questions NSA surveillance

ITworld Unified Communications

Forward this to a Friend >>>

Google Plus LinkedIn Facebook Twitter


FCC lays down spectrum rules for national first-responder network
The U.S. moved one step closer to having a unified public safety network on Monday when the Federal Communications Commission approved the rules for using spectrum set aside for the system. Read More


WEBCAST: BMC Software

Be Ready for Big Data
Big Data Analytics has become synonymous with Hadoop. As with any new technology, there is many times a lack of expertise – and at a minimum a learning curve. Learn about the choices you have for implementing a Big Data environment. Metascale, a Big Data service provider, manages all of Sears Big Data processing along with other companies. View Now

WHITE PAPER: VMware

The Clear Path to Cloud Security, Compliance, & Cost Control
Both customers and IT decision makers are concerned about cloud security, according to recent research. How can you negotiate this barrier to realize the benefits of cloud computing? Read this paper to learn about the techniques, tools, and technologies that will enable you to capitalize on the cloud safely and cost-effectively. Read Now

Zuckerberg said what about privacy? Researchers create archive to find out
Facebook CEO Mark Zuckerberg sometimes speaks quickly and his statements on Internet privacy are not always clear, so researchers have created an archive to collect everything the executive has said publicly, aimed at gaining a better understanding of where the company stands on privacy. Read More

Human rights commission questions NSA surveillance
The U.S. government needs to answer for human rights abuses related to the National Security Agency's massive worldwide surveillance of Internet communications and telephone records, privacy advocates told an international human rights board Monday. Read More

Buffer encrypts access tokens after spammer hack
Buffer, a service for scheduling social media posts, said Sunday it has strengthened its security after spammers gained access to its network. Read More


WHITE PAPER: Zetta

451 Research Report: Zetta Hybrid Cloud Backup & Recovery
The hybrid cloud backup/recovery market is crowded with vendors making it difficult for organizations to determine the best solution for their business. This independent report by 451 Research explores the offerings by Zetta highlighting its differentiation particularly in the areas of high performance and a plug-in for backing up NetApp systems. Read now!

Protesters call for an end to NSA mass surveillance
A crowd of about 5,000 people, chanting "stop spying, stop lying" and "hey, ho, mass surveillance has got to go," marched through Washington, D.C., Saturday to protest the U.S. National Security Agency's mass surveillance programs unveiled in press reports this year. Read More

Human rights commission questions NSA surveillance
The U.S. government needs to answer for human rights abuses related to the National Security Agency's massive worldwide surveillance of Internet communications and telephone records, privacy advocates told an international human rights board Monday. Read More

WebEx vs. GoToMeeting vs. MyTrueCloud
These higher-end products are expected to simultaneously deliver desktop shares, video, and audio; to provide high reliability and high quality; to integrate with common desktop software; and to work with mobile devices. But there's a bit of variation among the business-grade products we are considering in all of these areas. Read More


BOOK GIVEAWAY:

The drawings end October 31. Enter now for your chance to win one of these two new books!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

Arg! The 9 hardest things programmers have to do

7 tools that help protect you against the NSA and Google

Obsolete! Careers that are being automated into oblivion

15 geeky places to visit before you die

13 unsung women of technology


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_unified_communications as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.