Issue highlights 1. INSIDER How to connect to enterprise Wi-Fi security on Android devices 2. Study finds that refactoring doesn't improve code quality 3. IT certification hot list 2015: 11 that deliver higher pay (via CIO.com) 4. Why computers still struggle to tell the time 5. Who 'owns' an investigation into a security breach? (via CSOonline.com) 6. Iran to weed 'moral' crimes from social networks, starting with Facebook 7. Is data on your new Lollipop Android device encrypted? Maybe not 8. D-Link patches router, says more fixes are on the way 9. WIN THIS BOOK: Effective Python: 59 Specific Ways to Write Better Python |
| RESOURCE COMPLIMENTS OF: The College of St. Scholastica The College of St. Scholastica's online program is designed for working adults who require the flexibility to complete coursework when it's convenient for them. Gain the skills necessary to identify and analyze IT and organizational problems and implement innovative solutions. Learn to manage multi-disciplinary teams and lead effective change. Our courses are offered online in accelerated 8-week terms, allowing you to earn your degree in as little as two years. Apply by May 2 for our summer start. Learn more at go.css.edu/leader or contact us today at (877) 287-8751. |
| Connecting to wireless networks using the enterprise or 802.1X mode of Wi-Fi security is a bit different compared to using the personal or pre-shared key (PSK) mode. Here's what you need to know. READ MORE |
| New research finds that, contrary to popular belief, restructuring software code to be more maintainable and efficient may not be worth the time and effort. READ MORE |
| Not all certifications are created equal. READ MORE |
| As more industries demand sub-second accuracy, computers struggle to maintain precise time. READ MORE |
| : HP The IT Security threat landscape has changed quickly - and now businesses themselves are changing quickly as well. As mobile and cloud computing continue to remake enterprise IT, how can security keep up? In this FierceITSecurity eBook, IT and networking professionals will find practical, real-world advice on how to handle network security now. Learn more >> |
| Experts agree that ownership of an investigation depends on what happened, but an advisory council says no matter who owns it, it needs 'Unified Risk Oversight' to be effective. READ MORE |
| Iran has said it is willing to cooperate with Google and other Internet companies provided they play by its rules. READ MORE |
| Google has relaxed a requirement for manufacturers to turn on encryption by default in Lollipop. READ MORE |
| The vulnerabilities affect eight router models. READ MORE |
| We've got 5 copies to give to some lucky readers. Enter for your chance to win! READ MORE |
| WHITE PAPER: HP This SlashGuide looks at the most important factors IT should keep top of mind as they plan their move to 802.11ac, higher bandwidth wired infrastructure or upgrading to switches and routers with enhanced capabilities. Learn More |
| |
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.