Monday, February 2, 2015

5 team-building tips for IT. Plus: Office Online vs. Office 365

Office Online vs. Office 365: What's free, what's not, and what you really need.

BMW cars found vulnerable in Connected Drive hack.

ITworld Today
February 02, 2015
INSIDER

5 team-building tips for IT

Team dynamics can mean the difference between a healthy work environment and a toxic one. READ MORE

 

Issue highlights

1. Office Online vs. Office 365: What's free, what's not, and what you really need

2. BMW cars found vulnerable in Connected Drive hack

3. WIN THIS BOOK: Core Java for the Impatient

4. Verizon to allow opt-out from mobile 'supercookies'

5. MIT randomizes tasks to speed massive multicore processors

6. West Africa turns into dumping ground for e-waste

7. Uber will fight to keep its Boston ride data private

8. Social engineering attacks from the front lines (via CSOonline.com)

9. Google will motivate bug hunters to keep probing its products with research grants

10. Raspberry Pi 2 is six times faster than Pi 1, supports Windows 10

11. How digital ecosystems are creating the 'we economy' (via CIO.com)

WHITE PAPER: BMC Software

An Insightful Approach to Optimize Mainframe MLC Spend

This paper, "An Insightful Approach to Optimizing Mainframe MLC Costs," discusses how you can penetrate the complexity of IBM mainframe MLC products and the MLC price model to gain insight into the MLC cost drivers and leverage that insight to optimize MLC spend. Learn More

Office Online vs. Office 365: What's free, what's not, and what you really need

Free Office Online is a great deal, but paying for an Office 365 subscription gives you some hard-to-beat perks. We'll help you decide which way to go. READ MORE

BMW cars found vulnerable in Connected Drive hack

An attacker could mimic a BMW server and remotely unlock a car. READ MORE

WIN THIS BOOK: Core Java for the Impatient

We've got 5 copies to give to some lucky readers. Enter for your chance to win! READ MORE

Verizon to allow opt-out from mobile 'supercookies'

Verizon will soon allow customers to opt out of having an identifier placed on their phones that had alarmed privacy advocates due to its ability to let third parties persistently track customers. READ MORE

MIT randomizes tasks to speed massive multicore processors

Researchers at the Massachusetts Institute of Technology have created a data structure that they claim can help large multicore processors churn through their workloads more effectively. READ MORE

: IBM

Enterprise Collaboration eGuide

In this eGuide, IDG News Service, Computerworld and CIO look at some recent trends in enterprise collaboration and the advantages it's bringing to organizations. Read on to learn about how enterprise collaboration could improve communication, efficiency and productivity in your organization. Learn More

West Africa turns into dumping ground for e-waste

Problem compounded by the fact that most West African countries do not have e-waste recycling facilities. READ MORE

Uber will fight to keep its Boston ride data private

Uber's data is a trade secret doesn't have to be publicly disclosed under Massachusetts law. READ MORE

Social engineering attacks from the front lines (via CSOonline.com)

Professional penetration testers share their real-world stories on how they hack the hearts and minds of enterprise employees. READ MORE

Google will motivate bug hunters to keep probing its products with research grants

The company seeks new ways to incentivize researchers as bugs become harder to find. READ MORE

Raspberry Pi 2 is six times faster than Pi 1, supports Windows 10

Raspberry Pi 2 will support a custom edition of Windows 10 for the development of robots, smart devices and Internet-connected appliances. READ MORE

How digital ecosystems are creating the 'we economy' (via CIO.com)

Organizations are building digital ecosystems that tap an array of other digital businesses, digital customers and digital devices at the edge of their networks. READ MORE

WHITE PAPER: Onapsis

Building an Enterprise Application Security Program

In this research paper, Building an Enterprise Application Security program, we will take a focused look at the major facets in an enterprise application security program, and make practical suggestions on how to improve efficiency and effectiveness of your security program. Learn More

FOR INSIDERS ONLY

Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

- Review: The big 4 Java IDEs compared

- 15 ways to screw up a job interview

- 12 tips to tune your Wi-Fi network

- Container wars: Interesting times ahead for Docker and its competitors

- 6 things every IT person should know

- IT Resume Makeover: How (and when) to break the rules

What are you waiting for? Sign up today!

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.