| ITworld Today | | | | The Kerberos vulnerability is only in Windows Server, but Windows PCs are getting extra security fixes. READ MORE | | | Issue highlights 1. Traces of Regin malware may date back to 2006 2. BOOK GIVEAWAY: Effective Ruby: 48 Specific Ways to Write Better Ruby 3. Intel and Micron are going to kill the hard disk drive 4. Getting started with power-line networking 5. Webcam snooper now looking for a job 6. Why it sometimes makes sense to go slow with mobile development 7. Contain yourself: The layman's guide to Docker 8. Molecular flash memory could store massive data | | WHITE PAPER: CommVault Application Owners need to know that they'll be able to recover their data at the application level when disaster strikes, and yesterday's solutions are simply not up to this job. It's time for modern, application-aware data protection - and here's how to get there. Learn more about how to create application-aware protection. Learn More>> | | Regin was known about for some time by the security industry, according to Symantec. READ MORE | | Learn how to harness Ruby's full power to write more robust, efficient, maintainable, and well-performing code. We've got 5 copies to give to some lucky readers. Enter now for your chance to win! READ MORE | | Intel, Micron breakthrough will yield much greater SSD capacity. READ MORE | | Power-line networking gives you the range of a wired network without any of the mess or the need to run cable behind the walls. Here's what you need to know to get started. READ MORE | | WHITE PAPER: Kaseya Cybercrime is on the rise. In fact, the risks and costs of cybercrime continue to increase each year. Don't be one of the many organizations naively clinging to the belief that a breach won't happen to them. As an IT professional, you need to take active steps to reduce the risk of cybercrime to your business. Reduce your risk today. Learn more | | Insecam's creator, possibly based in Moldova, is looking for remote programming work. READ MORE | | At Westinghouse, developers work slowly and steadily to avoid bugs in mobile apps used for testing the nuclear power plants that the company builds for electricity providers around the world. READ MORE | | As Docker grows in popularity, a question burns: What is it, and why do you need to care about containers? READ MORE | | Researchers focus on metal-oxide molecule clusters that can retain electrical charge and act as RAM. READ MORE | | WHITE PAPER: ForgeRock Identity and Access Management (IAM) services were traditionally built for a company's internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. View Now>> | | NOVEMBER GIVEAWAYS Now, here's something to be thankful for... We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!
Effective Ruby: 48 Specific Ways to Write Better Ruby If you're an experienced Ruby programmer, Effective Ruby will help you harness Ruby's full power to write more robust, efficient, maintainable, and well-performing code. Enter now!
Responsive Mobile Design: Designing for Every Device Learn principles, techniques, and best practices for delivering a successful experience to all users on all devices. Enter now! INSIDER Get exclusive access to premium articles, product guides, reviews and more.
- 8 tech buzzwords that you need to know - Free and cheap ways to learn about network administration - IT resumes: Lies, half-truths and embellishments SALARY SURVEY What's your earning power? How does it compare with your peers'?
With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now! | | | | | |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.