Issue highlights 1. 10 things we love about Ubuntu 13/5 things we hate 2. Geek-themed meme of the week: No. 2 3. VMware brain drain: Former sales chief moves on to Amazon's cloud biz 4. Microsoft to appeal European court's trademark decision over SkyDrive brand 5. Apple seeks 'iWatch' trademark in Japan 6. US senators demand to know from Clapper extent and benefits of spy program 7. Why Healthcare Providers Aren't Happy With EHR Systems 8. Modified online children's privacy rules take effect in US 9. Vulnerabilities found in code library used by encrypted phone call apps 10. Former CIA, NSA director says give public more info on NSA surveillance programs 11. Big Data Security Analytics: It Takes a Village |
WHITE PAPER: IBM This article discusses the urgent need for firms to successfully engage with customers, including handling issues such as social media and mobility, and at accomplishing this goal with smarter IBM collaboration and CRM solutions. Learn More. |
READ MORE |
They're everywhere on the Internet. And since my job takes me everywhere on the Internet, I have started publishing here on Buzzblog a selection of memes that amuse me. Here's No. 2. READ MORE |
The exodus of executives at VMware has hastened in the past few weeks, with the latest departure being one of its top sales executives jumping ship and heading to the biggest cloud computing provider in the industry. READ MORE |
WHITE PAPER: Tripwire Today's attackers vigilantly wait for you to slip up before they strike your information systems and compromise your data. Learn five actions you can take to improve your information risk management and security strategy and stay one step ahead of the information age adversary. Read More |
Microsoft on Monday said it will appeal a trademark lawsuit over its SkyDrive cloud storage service it lost to the British Sky Broadcasting (BSkyB) Group. READ MORE |
Apple has filed to trademark the phrase "iWatch" in Japan, amid rumors the company will soon launch a smart watch device globally. READ MORE |
A group of 26 U.S. senators, cutting across party lines, are seeking "public answers" on whether the National Security Agency collected in bulk other data such as credit card purchases and financial information in the U.S. besides phone records. READ MORE |
WHITE PAPER: A10 Networks Secured traffic exchange is becoming the standard for web sites and applications. When upgrading from 1024-bit to 2048-bit keys, CPU usage can increase 4-7 times. A10's AX Series ADCs provide near-parity performance for the upgrade to 2048-bit keys, with extreme power to handle 4096-bit keys. Read Now |
The U.S. government is giving the healthcare industry billions of dollars in incentives to use electronic health records. Most organizations have EHR software in place, but as many as 35 percent wish they could switch systems. Are EHR vendors to blame, or are deeper forces at work? READ MORE |
Some websites and mobile app developers are confused about how to comply with revised rules governing the online collection of personal information from children that took effect in the U.S. Monday, critics said. READ MORE |
ZRTPCPP, an open-source library that's used by several applications offering end-to-end encrypted phone calls, contained three vulnerabilities that could have enabled arbitrary code execution and denial-of-service attacks, according to researchers from security firm Azimuth Security. READ MORE |
The Snowden leaks have "launched a national debate about the balance between privacy and security," according to General Michael Hayden, former CIA and NSA director. READ MORE |
As I've written many times, the age of big data security analytics is already upon us. In fact, 44% of large organizations characterize their security data collection, processing and storage activities "big data" today, while another 44% believe that their security data collection, processing, and storage activities will become "big data" within the next 2 years. READ MORE |
WHITE PAPER: IBM This paper shows how IT organizations can use patterns of expertise provided by virtual application patterns to speed deployments, reduce the risk of error, and help simplify and automate tasks across the management and maintenance lifecycle. Learn More. |
|
No comments:
Post a Comment