Issue highlights 1. Hackers could start abusing electric car chargers to cripple the grid, researcher says 2. Two-factor authentication ready to roll out at Microsoft 3. INSIDER Why Diversity Matters in IT Hiring 4. 7 things you need to know about Bitcoin 5. iPhone 5S and new iPad Mini may be delayed until November 6. Widely used wireless IP cameras open to hijacking over the Internet, researchers say 7. Linux users don't buy software, but it's still worth selling 8. Microsoft Who? Top 4 Highlights of Microsoft Management Summit 2013 9. NAB show roundup: Cool gear for videophiles 10. How to Use BPM to Improve Customer Experience 11. 15 of the App Store's most bizarre offerings |
WHITE PAPER: HP, Microsoft & Intel This paper describes a hardware and software reference architecture for using HP hardware to deploy very large and highly transactional Microsoft® SQL Server 2008 R2 OLTP database systems in tier 1 enterprise application environments. Learn More! |
Hackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilities to cripple parts of the electricity grid, a security researcher said during the Hack in the Box conference in Amsterdam on Thursday. READ MORE |
When Microsoft acquired PhoneFactor last fall, the handwriting was on the wall for the future of two-factor authentication for the company's consumer cloud offerings. Now it appears that handwriting is about to become a reality. READ MORE |
Building a network of diverse IT talent--people who will be ready for your next job opening--is a year-round task with a big payoff, says a former divisional CIO at GE READ MORE |
WHITE PAPER: ADTRAN Is it time to bring the power and benefits of virtualization to your wireless network? Check out this side-by-side comparison of a traditional WLAN with physical hardware controllers and a virtual WLAN which runs in the Cloud on a hypervisor (VMware). Learn More |
Bitcoins are all the buzz. The virtual currency is riding a rollercoaster of speculation, rising exponentially in value and reaching a high of $260 this Wednesday before plummeting to $130. What's more, the largest bitcoin exchange in the world just survived a coordinated hack attack, and bitcoin-generating malware is spreading across Europe like wildfire via Skype. READ MORE |
I have some bad news for all you folks eager to get your hands on Apple's next generation lineup of iOS devices. According to KGI Securities analyst Ming-Chi Kuo - who has a pretty spot on track record when it comes to Apple rumors - technical and production challenges may force Apple to delay the release of the iPhone 5S, the new iPad Mini, and the rumored low-cost iPhone. While Kuo initially anticipated... READ MORE |
Thousands of wireless IP cameras connected to the Internet have serious security weaknesses that allow attackers to hijack them and alter their firmware, according to two researchers from security firm Qualys. READ MORE |
WHITE PAPER: Kaspersky This white paper looks at the real challenges faced by organizations, and what new IT security threats and issues have arisen as a result. Increasingly, anti-malware alone is not enough, so this white paper investigates what new IT security approach is required to effectively respond to the changing threat landscape and new ways of working. Learn more. |
A few days ago, Canonical posted a list of the top 10 paid software downloads from the Ubuntu Software Center, which makes now a pretty good time to talk about how sales of software are doing in the software store that is included in the world's most popular version of Linux. READ MORE |
It's challenging to absorb everything Microsoft at the cadence they would like IT pros to keep pace with, but here are four areas to pay close attention to: READ MORE |
I've spent the past few days at the annual show for the National Association of Broadcasters, also known as NAB. The trade show, held in Las Vegas, features events and products geared toward television and radio stations, as well as filmmakers and other video creators. READ MORE |
A Gartner analyst speaking at the firm's business process management summit explains how BPM technologies can be used to bring more success to your enterprise by improving customer experience. READ MORE |
READ MORE |
WHITE PAPER: F5 DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. This paper helps organizations confronting these growth and security challenges understand how a new, full-proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing. Learn More. |
|
No comments:
Post a Comment