Issue highlights 1. Geeks and leaks: Top 10 tech whistleblowers of all-time 2. Buyback program intensifies Aryaka/Riverbed rivalry 3. iPad 5 rumor rollup for the week ending July 11 4. India's telegram service is dead
not so the telegram 5. Goodbye NAC, Hello EVAS (Endpoint visibility, access, and security) 6. Microsoft to pay first IE 11 Preview bug bounty to BlueHat security contest finalist 7. Ballmer pushes 'family of devices' as Microsoft's new mantra 8. Authentify xFA provides simple, secure primary authentication using digital certificates and voice biometrics 9. IT Increases Application Outsourcing Despite Disappointing Strategic Value 10. Image gallery: 8 apps to keep your car rolling |
WHITE PAPER: Condusiv Technologies For administrators seeking to increase performance in their virtual environment without investing in more hardware, this white paper outlines how I/O optimization technologies deliver performance at a fraction of the cost of hardware for applications with the heaviest workloads. Read more. Read Now! |
Traitors or patriots? Heroes or villains? These 10 engineers, academics, and scientists became famous for blowing the whistle on dubious practices READ MORE |
WAN optimization-as-a-service provider Aryaka has announced an aggressive buyback program that targets competitor Riverbed's customers, adding a new point of contention to an already heated rivalry. READ MORE |
With real information about iPad 5 and iPad mini 2 almost non-existent, the iOSsphere seized on the dregs, most of them provided by anonymous Asian supply chain sources. READ MORE |
WEBCAST: IBM This session will discuss how Ashurst, a top-tier legal service provider for private and public sector clients worldwide, was able to effectively manage organizational change and improve their profitability using IBM Business Analytics. Learn More. |
No matter how often my press colleagues predict this or that technology will be a "killer" of this or that one, the fact is that technologies as a rule do not die sudden or violent deaths, they fade away, sometimes over a very, very long time. READ MORE |
Around 2004, Cisco introduced a new technology initiative called Network Admission Control (now commonly referred to as Network Access Control or NAC). Back then, NAC was really in response to the recent wave of Internet worms where one compromised user PC could log on to the corporate network and subsequently infect the whole enchilada. NAC was seen as a way to alleviate this threat by authenticating... READ MORE |
Microsoft has already received several vulnerability reports that qualify for monetary rewards as part of the company's bug bounty program launched in June for the preview version of Internet Explorer 11. READ MORE |
WHITE PAPER: FICO (Fair Isaac) Learn the best practices in building applications that can leverage volume, variety and velocity of Big Data for organizations of any size. Learn more. |
If Steve Ballmer's words mean anything, Microsoft is about to dramatically expand the number -- and type -- of devices it makes in-house. READ MORE |
Forget about those highly vulnerable usernames and passwords. Authentify has just announced a new primary authentication method that is built upon a complete digital certificate PKI underpinning, but neither the enterprise nor the end user sees any of the complexity of the solution. READ MORE |
Five out of 10 outsourcing buyers will up their bets on applications outsourcing, according to a joint survey from KPMG and HfS Research, but they continue to be disappointed by providers' analytical capabilities and innovation. READ MORE |
These 8 apps for iPhones, iPads and Android devices can help you maintain your car, save money on gas, avoid accidents and make life on the road easier. READ MORE |
WHITE PAPER: HP Application deployment complexity and an explosion of business reliance on mobile applications are driving demand for targeted, collaborative, and agile application life-cycle management (ALM). Read Now! |
|
No comments:
Post a Comment