Thursday, April 2, 2015

Inside the rickety, vulnerable systems that run just about every power plant

Wisdom to code by, an illustrated guide to programmer proverbs.

Backing up a Windows Hyper-V Cluster.

ITworld Today
April 02, 2015

Inside the rickety, vulnerable systems that run just about every power plant

A security expert's warning: We're using Windows XP for a lot of awfully important things and hoping for the best. READ MORE

 

Issue highlights

1. Wisdom to code by, an illustrated guide to programmer proverbs

2. Backing up a Windows Hyper-V Cluster

3. Wider use of HTTPS could have prevented attack against GitHub

4. Like Google, Mozilla set to punish Chinese agency for certificate debacle

5. How to prepare for Google's next major search update (via CIO.com)

6. N.C. primed for mega tech backlash over Indiana-like bill

7. Windows 7 momentum shows no sign of slowing

8. Health care industry receives first mobile apps from Apple, IBM

9. Three ways a CSO can stop being the bad guy (via CSOonline.com)

10. INSIDER Building IT for worst-case scenarios

11. Reader Survey: $250 for your thoughts

WHITE PAPER: Dell Software

12 Questions to Ask When Choosing an AD Bridge Solution

Learn key questions to ask when evaluating Active Directory bridge solutions, and explore how Dell offers ideal solutions to meet your challenging needs. Learn more.

Wisdom to code by, an illustrated guide to programmer proverbs

Behold age-old truths that software developers have learned over the years. READ MORE

Backing up a Windows Hyper-V Cluster

Microsoft was nice enough to provide Hyper-V backup capability for individual Hyper-V hosts that worked great and was free with the OS. Once you move to a Hyper-V cluster however, the free ride is over. READ MORE

Wider use of HTTPS could have prevented attack against GitHub

EFF said the GitHub attack reinforces the case for using HTTPS. READ MORE

Like Google, Mozilla set to punish Chinese agency for certificate debacle

The organization's current proposal is to reject future CNNIC-issued certificates, but to trust existing ones. READ MORE

How to prepare for Google's next major search update (via CIO.com)

The April rollout of Google's new, mobile-friendly algorithm is expected to significantly impact website rankings in mobile search results. Here's how to prepare for the biggest Google search algorithm update in years. READ MORE

RESOURCE COMPLIMENTS OF: IT Roadmap Boston

IT Roadmap Boston Conference is all new for 2015

The content-rich agenda has been redesigned and reenergized to include increased IDG content from editors you know and trust and five focused pillars of technology learning that are the most critical for the year ahead. Register Now!

N.C. primed for mega tech backlash over Indiana-like bill

North Carolina is considering "religious objection" legislation similar to the recently signed law in Indiana, a move that could raise the stakes for the tech industry firms battling these laws. READ MORE

Windows 7 momentum shows no sign of slowing

Windows 7 last month powered nearly two-thirds of all personal computers running a version of Microsoft's OS, according to an analytics company. READ MORE

Health care industry receives first mobile apps from Apple, IBM

The travel and insurance industries receive additional apps, bringing the total offered to 22. READ MORE

Three ways a CSO can stop being the bad guy (via CSOonline.com)

Some executives are learning to say yes, instead of no. READ MORE

INSIDER

Building IT for worst-case scenarios

The World Bank overhauls IT so it's better prepared to do business in global hotspots where war, disease and poverty may be among the challenges of everyday life. READ MORE

Reader Survey: $250 for your thoughts

ITworld is conducting a short survey about unified communications and collaboration, and we value your feedback. This confidential survey should take no more than 10 minutes of your time, and as a thank-you for participating you may enter a sweepstakes to win a $250 cash prize. READ MORE

WHITE PAPER: Dell Software

Access Management (IAM) for Unix-based Systems

Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency. Read now!

SURVEY SAYS...

Got 10 minutes? Take ITworld's unified communications and collaboration survey and enter for a chance to win $250. Take the survey now!

BECOME AN ITWORLD INSIDER

Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

- R programming beginner's guide
- IT Resume Makeover: Emphasize your 'X factor'
- 4 open source monitoring tools that deserve a look
- Free and cheap ways to learn about IT security
- PowerShell for beginners: Scripts and loops
- Six Ted talks that can change your career

What are you waiting for? Sign up today!

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.