Friday, February 6, 2015

Three fights Big Telecom is losing – and what that might mean for IT

It's a bird, it's a plane, it's the rebirth of satellite Internet.

Skype fails: 5 of the worst problems and how to fix them.

ITworld Today
February 06, 2015
INSIDER

Three fights Big Telecom is losing – and what that might mean for IT

It's been an unusually tough few months for Big Telecom. READ MORE

 

Issue highlights

1. It's a bird, it's a plane, it's the rebirth of satellite Internet

2. INSIDER Skype fails: 5 of the worst problems and how to fix them

3. WIN THIS BOOK: Security in Computing, 5th Edition

4. State-sponsored Chinese hackers reportedly suspected in Anthem breach

5. With employee help, ID theft ring allegedly stole $700,000 in Apple gift cards

6. 7 critical things to cover in your disaster-recovery plan (via CSOonline.com)

7. Microsoft backs Java for cross-platform mobile apps

8. White House picks VMware's Tony Scott as CIO

9. Twitter says it lost 4 million users because of Apple iOS 8

10. Verizon blames net neutrality plans as it sells off wireline operations

11. 10 social media accounts sports fans should follow (via CIO.com)

WHITE PAPER: Attachmate

Enterprise File Sharing and Management

Dynamic file sharing across multiple platforms is the new normal in the world of work, creating an urgent need for large and highly-regulated enterprises to explore file sharing solutions that do not compromise data security. Learn More

It's a bird, it's a plane, it's the rebirth of satellite Internet

The Internet, coming to a sky near you. READ MORE

INSIDER

Skype fails: 5 of the worst problems and how to fix them

Admit it: You've cursed at Skype. We all have. These tips will save your breath--and maybe save your meeting. READ MORE

WIN THIS BOOK: Security in Computing, 5th Edition

We've got 5 copies to give to some lucky readers. Enter for your chance to win! READ MORE

State-sponsored Chinese hackers reportedly suspected in Anthem breach

The hackers are said to have used techniques deployed in the past by China-based attackers. READ MORE

With employee help, ID theft ring allegedly stole $700,000 in Apple gift cards

Five people have been indicted in scheme that took advantage of Apple 'instant credit'. READ MORE

RESOURCE COMPLIMENTS OF: IT Roadmap Denver

IT Roadmap Returns to Denver – April 7

Join hundreds of IT professionals to discover new ideas and proven strategies that are shaping IT and business. Free registration is available to select executives – Learn more visit http://www.itroadmap.net/denver2015/NLP today. April 7, 2015 – Colorado Convention Center

7 critical things to cover in your disaster-recovery plan (via CSOonline.com)

You never know when a disaster will strike, so better to have a checklist on hand. READ MORE

Microsoft backs Java for cross-platform mobile apps

Developers can write in their favorite Java IDE, and JUniversal will translate it to the appropriate language for the platform. READ MORE

White House picks VMware's Tony Scott as CIO

Scott will replace Lisa Schlosser, who was filling the role temporarily. READ MORE

Twitter says it lost 4 million users because of Apple iOS 8

A company exec partly blamed the Shared Links function in Apple's Safari browser. READ MORE

Verizon blames net neutrality plans as it sells off wireline operations

The company is selling phone and Internet businesses in California, Florida and Texas. READ MORE

10 social media accounts sports fans should follow (via CIO.com)

These sports celebrities are especially open and entertaining on Twitter, Facebook, Instagram and YouTube. They're also using social media to create powerful personal brands that go well beyond the playing field. READ MORE

WHITE PAPER: Kaspersky Lab, Inc.

The Threat Landscape

Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks? Thankfully, Kaspersky Lab security experts have got you covered. Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence View Now

FOR INSIDERS ONLY

Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

- Review: The big 4 Java IDEs compared

- 15 ways to screw up a job interview

- 12 tips to tune your Wi-Fi network

- Container wars: Interesting times ahead for Docker and its competitors

- 6 things every IT person should know

- IT Resume Makeover: How (and when) to break the rules

What are you waiting for? Sign up today!

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.