Thursday, October 16, 2014

How-to: Get started with MariaDB

Can the iPhone 6 really defeat the NSA? | 5 techniques for securing your enterprise data
October 16, 2014
INSIDER Alert
Your guide to the top content posted this week for Insider members
Network World

How-to: Get started with MariaDB

MariaDB is a fork of the wildly popular open source database MySQL. Although MariaDB is very similar to MySQL, it is not necessarily the same. One of the primary goals behind the MariaDB project is to serve as a drop-in replacement for MySQL, but MariaDB also offers features beyond those available in MySQL.For example, MariaDB 5.5 is intended to be a replacement for MySQL 5.5. However, MariaDB 10 is a departure from the version 5.x tree and represents a new direction for MariaDB. If you are replacing MySQL, you're probably better off using a 5.x version. Otherwise, start fresh with version 10.x.To read this article in full or to leave a comment, please click here(Insider Story)

READ MORE
Computerworld

Can the iPhone 6 really defeat the NSA?

People who prize their privacy may be eyeing the iPhone 6, which both Apple and various law-enforcement officials say can defeat attempts by government agencies to get people’s text messages, emails, photos, contacts, and more. But if you’re thinking of buying an iPhone 6 because you want assurance that the government can’t spy on you, you should be aware that claims of nearly impregnable data have to be taken with a grain of salt.What is true is that the iPhone 6 has better privacy protection because encryption is turned on by default. Similar encryption is available on Android phones, but it’s not turned on by default. Google is expected to change that in an upcoming Android release.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

Computerworld

5 techniques for securing your enterprise data

When it comes to securing enterprise data, picture an IT leader with one foot on a dock and the other on a boat. Now watch the boat slowly drift away. Mobile, cloud and big data technologies are dragging businesses into uncharted waters, and data endpoints are moving further and further from the IT department’s control. Meanwhile infrastructure is barely able to handle existing threats — let alone new ones. IT departments are obviously stretched, often without the manpower or skills to handle growing security needs. A string of enterprise security breaches shows the obvious strain. In 2013, Verizon reported more than 63,000 security incidents and 1,367 confirmed data breaches worldwide in its annual security breach investigations report. In the first half of this year, some 395 data breaches were reported to regulators in the U.S., according to the Identity Theft Resource Center.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

Network World

Women in IT: No longer a nice-to-have

If you’re in IT -- and reading this article about women in IT – the odds are that you’re male. After all, just 24% of the U.S. IT workforce is female, according to the U.S. Bureau of Labor Statistics, quite a fall from its high point of 36% in 1991, according to the National Center for Women & Information Technology. This is at a time when women make up more than half (57%) of the professional U.S. workforce.But odds are that you’ll keep reading, as male IT executives increasingly seem to care about encouraging women to join the profession. In a recent study by Harvey Nash, nearly three-quarters (71%) of CIOs globally said they recognized the gender imbalance in their organizations.To read this article in full or to leave a comment, please click here(Insider Story) READ MORE

Get more Insider content from these brands:

CIO | CITEworld | Computerworld | CSO | InfoWorld | JavaWorld | Network World

You are currently subscribed to idge_insider_newsletter as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@idgenterprise.com

To contact us, please send an e-mail to online@idgenterprise.com

Copyright (C) 2014 IDG Enterprise
492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@idgenterprise.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.