Issue highlights 1. Agency destroys $170K worth of IT gear over non-existent malware threat 2. 20 computer terms every Mac user should know 3. BYOD breeds distrust between workers and IT 4. Pirate Bay founder working on spy-proof text messaging app 5. 3 new SSDs to boost your laptop's speed 6. Google was down? You mean the search engine? 7. MSFT to developers: Fix Windows app security flaws in 180 days or be kicked from stores 8. Apple colluded with book publishers on e-book prices, judge rules 9. INSIDER How to keep your new IT hires from jumping ship 10. 7 hot gadgets to make your summer sizzle |
WHITE PAPER: Tripwire Today's attackers vigilantly wait for you to slip up before they strike your information systems and compromise your data. Learn five actions you can take to improve your information risk management and security strategy and stay one step ahead of the information age adversary. Read More |
The U.S. Department of Commerce's Economic Development Administration (EDA) destroyed about $170,000 worth of IT equipment including computers, printers, keyboards and computer mice last year on the mistaken belief that the systems were irreparably compromised by malware. READ MORE |
Throughout the life of Mac 101, we've talked a lot about Apple technologies and terms. But with the gentle persuasion of this column's readers,A I've come to realize that--all too often--terms and acronyms that many of us take for granted leave users new to technology scratching their heads. Let's rectify that now with a meander through some common tech terms. READ MORE |
Nearly a third of U.S. workers distrust company software on their mobile devices READ MORE |
WHITE PAPER: IBM Read this white paper, created in collaboration with Frost & Sullivan, to see how a customer relationship management (CRM) solution can help you respond on the customers' terms. Learn More. |
Peter Sunde, the co-founder of BitTorrent search engine The Pirate Bay, is working on developing a secure mobile messaging app and service that's intended to be safe from government surveillance and be user friendly at the same time. READ MORE |
Seagate, Samsung and OCZ have launched new consumer-class SSDs. We benchmarked all three to find which one has the best performance. READ MORE |
One time I thought I saw a Cape Cod bridge go down but it turned out to be nothing more than an optical illusion, so I have to question the veracity of these reports asserting that Google - the search engine part of Google - was down for a spell this morning. READ MORE |
WHITE PAPER: IBM Today's businesses need simpler more efficient and flexible computing models. The IBM PureSystems family is comprised of platform systems and infrastructure systems that include built-in "patterns of expertise" to address complex business and operational tasks for smarter computing. Learn More |
App developers have no more than 180 days to fix security flaws or Microsoft will kick the vulnerable app from the Windows Store, Windows Phone Store, Office Store, and Azure Marketplace. Microsoft's new security policy for apps states: READ MORE |
Apple violated antitrust laws when it colluded with publishers to set prices of e-books, a U.S. district court judge has ruled. READ MORE |
With IT talent hard to find and expensive to replace, savvy companies use tech-specific onboarding programs to win the hearts and minds of IT employees. Insider (registration required) READ MORE |
Ready for summer? We've tested a fresh batch of tech gear built for the great outdoors. Whether you're going camping, paddling upriver, exploring the backcountry or just lounging by the pool, these gadgets can enhance your alfresco adventures. READ MORE |
WHITE PAPER: Condusiv Technologies In this Technology Spotlight, IDC highlights the unexpected I/O explosion brought about by virtualization and presents new technologies that deliver exceptional application performance without additional hardware by eliminating unnecessary I/O traffic at the source. Read more. Read Now! |
|
No comments:
Post a Comment