Tuesday, March 3, 2015

6 Linux-y announcements from Mobile World Congress

How to connect to enterprise Wi-Fi security on Android devices.

Study finds that refactoring doesn't improve code quality.

ITworld Today
March 03, 2015

6 Linux-y announcements from Mobile World Congress

Linux is enabling hardware and software vendors to create new markets. Here are some of the major announcements from MWC. READ MORE

 

Issue highlights

1. INSIDER How to connect to enterprise Wi-Fi security on Android devices

2. Study finds that refactoring doesn't improve code quality

3. IT certification hot list 2015: 11 that deliver higher pay (via CIO.com)

4. Why computers still struggle to tell the time

5. Who 'owns' an investigation into a security breach? (via CSOonline.com)

6. Iran to weed 'moral' crimes from social networks, starting with Facebook

7. Is data on your new Lollipop Android device encrypted? Maybe not

8. D-Link patches router, says more fixes are on the way

9. WIN THIS BOOK: Effective Python: 59 Specific Ways to Write Better Python

RESOURCE COMPLIMENTS OF: The College of St. Scholastica

Earn your Master's in IT Leadership online in two years.

The College of St. Scholastica's online program is designed for working adults who require the flexibility to complete coursework when it's convenient for them. Gain the skills necessary to identify and analyze IT and organizational problems and implement innovative solutions. Learn to manage multi-disciplinary teams and lead effective change. Our courses are offered online in accelerated 8-week terms, allowing you to earn your degree in as little as two years. Apply by May 2 for our summer start. Learn more at go.css.edu/leader or contact us today at (877) 287-8751.

INSIDER

How to connect to enterprise Wi-Fi security on Android devices

Connecting to wireless networks using the enterprise or 802.1X mode of Wi-Fi security is a bit different compared to using the personal or pre-shared key (PSK) mode. Here's what you need to know. READ MORE

Study finds that refactoring doesn't improve code quality

New research finds that, contrary to popular belief, restructuring software code to be more maintainable and efficient may not be worth the time and effort. READ MORE

IT certification hot list 2015: 11 that deliver higher pay (via CIO.com)

Not all certifications are created equal. READ MORE

Why computers still struggle to tell the time

As more industries demand sub-second accuracy, computers struggle to maintain precise time. READ MORE

: HP

Fierce IT Security eBook

The IT Security threat landscape has changed quickly - and now businesses themselves are changing quickly as well. As mobile and cloud computing continue to remake enterprise IT, how can security keep up? In this FierceITSecurity eBook, IT and networking professionals will find practical, real-world advice on how to handle network security now. Learn more >>

Who 'owns' an investigation into a security breach? (via CSOonline.com)

Experts agree that ownership of an investigation depends on what happened, but an advisory council says no matter who owns it, it needs 'Unified Risk Oversight' to be effective. READ MORE

Iran to weed 'moral' crimes from social networks, starting with Facebook

Iran has said it is willing to cooperate with Google and other Internet companies provided they play by its rules. READ MORE

Is data on your new Lollipop Android device encrypted? Maybe not

Google has relaxed a requirement for manufacturers to turn on encryption by default in Lollipop. READ MORE

D-Link patches router, says more fixes are on the way

The vulnerabilities affect eight router models. READ MORE

WIN THIS BOOK: Effective Python: 59 Specific Ways to Write Better Python

We've got 5 copies to give to some lucky readers. Enter for your chance to win! READ MORE

WHITE PAPER: HP

Security Considerations When Undergoing a Network Refresh

This SlashGuide looks at the most important factors IT should keep top of mind as they plan their move to 802.11ac, higher bandwidth wired infrastructure or upgrading to switches and routers with enhanced capabilities. Learn More

BECOME AN ITWORLD INSIDER

Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

- R programming beginner's guide
- IT Resume Makeover: Emphasize your 'X factor'
- 4 open source monitoring tools that deserve a look
  - Free and cheap ways to learn about IT security
- PowerShell for beginners: Scripts and loops
- Six Ted talks that can change your career

What are you waiting for? Sign up today!

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.