Issue highlights 1. Microsoft to feds: Let us explain our dealings with the NSA 2. Faster upgrade plans like AT&T Next could be new frontier in wireless 3. Google Glass in the NFL?
Two words: Jadeveon Clowney 4. IT Resume Makeover: Making the Military-to-Civilian Transition 5. Top picks: The best Windows 8 tablet laptops, convertibles, and Ultrabooks 6. Firefox OS for phones is shipping, and it is impressive 7. With Lenovo partnership, how does Extreme Networks stack up in the Stack Wars? 8. Hacking to rig election earns college student one-year prison sentence 9. Colliding, exploding stars may have created all the gold on Earth 10. Alternative fixes released for Android 'master key' vulnerability 11. Microsoft researcher on 'special class of user/adversary:' children 12. South Korea blames North Korea for cyberattacks 13. Salesforce.com launches Sales Performance Accelerator |
WHITE PAPER: IBM IBM Customer Experience Suite and IBM Intranet Experience Suite help organizations delight customers through a consistently exceptional web experience and empower employees with the social business tools they need to drive better business results. Learn More. |
Frustrated by laws that prevent it from talking about how and when it turns over customer information to the federal government Microsoft is asking Attorney General Eric Holder to clear the way to publicly share more details about that process. READ MORE |
AT&T's Next smartphone and tablet upgrade and no-contract plan, competes with a similar plan called Jump! from T-Mobile and another expected soon from Verizon Wireless. READ MORE |
ESPN the other day did a segment where reporter Katie Linendoll had quarterback Sam Bradford and wide receiver Tavon Austin of the St. Louis Rams throw and catch a pass while wearing Google Glass. "What about the latest tech buzz, Google Glass: Could it work in the NFL?" Linendoll asks introducing the segment. And the answer is why yes, yes it could, at least if you're talking about one NFL player... READ MORE |
Making the move from the military to a corporate IT leadership role can be difficult. Don't make it harder on yourself by showcasing the wrong skills. READ MORE |
WHITE PAPER: Tripwire Today's attackers vigilantly wait for you to slip up before they strike your information systems and compromise your data. Learn five actions you can take to improve your information risk management and security strategy and stay one step ahead of the information age adversary. Read More |
HP and Dell lead Samsung, Lenovo, and Acer in InfoWorld's reviews of both classic clamshell notebooks and innovative touch-driven hybrids READ MORE |
What to know about the Firefox OS for smartphones, so far. READ MORE |
It seems that data centers have been in continual transition now for the past 15 years. In that time, the industry has seen the rise of server virtualization, the growth of on-demand computing, the transition to network fabrics and the introduction of software defined networks. The latest wave is the movement to converged infrastructure, and Extreme Networks is the latest network vendor to ride this... READ MORE |
A college student in San Diego used keylogging software to steal passwords and vote himself into office, and that's not even the worst part. READ MORE |
WEBCAST: Wildpackets Network growth creates hidden complexity for network analysis. To monitor health & performance, your visibility solution must scale as easily as your network. This webcast shows how our solutions scale & push the boundaries in high-speed, distributed network analysis & troubleshooting. View now |
Two dead stars smashing into each other and releasing massive amounts of energy may have created all of the heavy elements such as gold found on Earth. READ MORE |
More fixes are appearing for a pair of highly dangerous vulnerabilities exposed earlier this month in the Android mobile operating system. READ MORE |
Next week at the SOUPS 2013 security and privacy conference in England, Microsoft researcher Stuart Schechter will discuss his latest paper entitled: "The user IS the enemy, and (s)he keeps reaching for that bright shiny power button!" The subtitle reads: "The security and privacy impacts of children and childhood on technology for the home." READ MORE |
South Korean officials say cyberattacks, including DDoS attacks and defacement of government web sites, were the work of its neighbor to the north READ MORE |
Salesforce.com is hoping customers will tap more pieces of its growing cloud software portfolio with a new product, Sales Performance Accelerator, that combines its CRM software with its Work.com performance management application as well as customer lead information from Data.com. READ MORE |
WHITE PAPER: Aerohive Yesterday's de facto standard architecture is commonly referred to as the, "controller-based" model, involving controllers and thin access points. Read Now |
|
No comments:
Post a Comment