Wednesday, February 4, 2015

Keyboard for one: 9 of the most impressive solo programming efforts

How corporate spies access your company's secrets.

Malicious advertisements on major sites compromised many computers.

ITworld Today
February 04, 2015

Keyboard for one: 9 of the most impressive solo programming efforts

Notable examples of coding brilliance that came from the mind (and hands) of one programmer. READ MORE

 

Issue highlights

1. INSIDER How corporate spies access your company's secrets

2. Malicious advertisements on major sites compromised many computers

3. What is a Windows Hyper-V High Availability Cluster?

4. EMC's all-in-one compute appliance comes with an app store

5. The worst of the worst phishing scams (via CSOonline.com)

6. Pilot's selfies could have caused deadly air crash

7. Quick and dirty is a sure way to fail at social CRM (via CIO.com)

8. Sony hack cost $15 million, but earnings unaffected

9. INSIDER Test your Android phone's performance with these free benchmarking tools

WHITE PAPER: Attachmate

The Need for Enterprise-Grade File Transfer

From email to Dropbox and FTP, the status quo of file transfer in most organizations is UFT—or Unmanaged File Transfer. That's the troubling finding of a 2013 survey conducted by Osterman Research. Read this paper to learn how enterprise-grade Managed File Transfer (MFT) can help. View Now

INSIDER

How corporate spies access your company's secrets

Lower-level employees can infiltrate corporate assets and remain undetected for months, or even years. How can you safeguard your sensitive data from prying eyes? READ MORE

Malicious advertisements on major sites compromised many computers

New vulnerabilities in Flash combined with malicious ads are helping attackers. READ MORE

What is a Windows Hyper-V High Availability Cluster?

Windows Hyper-V has come a long way since Server 2008. Today it has some of the best features going for high availability and shared storage. READ MORE

EMC's all-in-one compute appliance comes with an app store

Users will be able to download third-party tools to the converged appliance for midsized enterprises. READ MORE

RESOURCE COMPLIMENTS OF: CIO Perspectives Conference

Reserve your seat today for CIO Perspectives Dallas

Some of our agenda highlights include these sessions and topics: Tapping into the Innovative Minds of Millennials, Clearing Away the FUD Factors in Cybersecurity Decision-Making, Charting the Future of the Digital Enterprise, and Straight Talk About SMAC. Click to continue

The worst of the worst phishing scams (via CSOonline.com)

The depths a scammer will stoop to in order to gain a buck are remarkable. Here are some of the bottom feeders to guard against in your inbox. READ MORE

Pilot's selfies could have caused deadly air crash

A GoPro camera captured the pilot and passengers taking pictures with flash during nighttime flight. READ MORE

Quick and dirty is a sure way to fail at social CRM (via CIO.com)

Too many firms go on a social media binge without making the necessary investments in process, policy, and products – you know: the boring, expensive, hard stuff that will actually make it work well. READ MORE

Sony hack cost $15 million, but earnings unaffected

Demand for image sensors and the PS4 has narrowed Sony's expected net loss for the year. READ MORE

INSIDER

Test your Android phone's performance with these free benchmarking tools

These 8 apps tell you everything you need to know about your Android device, and they don't cost a dime. READ MORE

WHITE PAPER: Akamai

Overcoming the Big Disconnect in Web Security

According to a new CSO survey, companies know hackers are targeting them, but too few have plans in place for fighting back. Here are the steps you need to take to eliminate the disconnect. Learn More

FOR INSIDERS ONLY

Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

- Review: The big 4 Java IDEs compared

- 15 ways to screw up a job interview

- 12 tips to tune your Wi-Fi network

- Container wars: Interesting times ahead for Docker and its competitors

- 6 things every IT person should know

- IT Resume Makeover: How (and when) to break the rules

What are you waiting for? Sign up today!

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.