Issue highlights 1. Head-spinning history of the propeller beanie 2. Is it a bird? Is it a plane? No, it's a huge ******* meteor! 3. Controls keep NSA spy programs legal, director tells Black Hat audience 4. NetApp and Cisco Expand FlexPod Portfolio 5. Isis mobile wallet to roll out nationwide this year 6. IBM says SEC is investigating how it reports cloud revenues 7. Microsoft plunks Office on Android phones 8. Vulnerabilities in D-Link network video recorders enable remote spying, researcher says 9. 3D printers can pay for themselves in under a year 10. CIOs Say Mobilizing Enterprise Apps Is Not That Easy 11. Researchers demo how apps, chargers can circumvent Apple iPhone, iPad security 12. Aaron Swartz supporters label MIT report a "whitewash" 13. INSIDER Enterprise Social Network Moves Ad Agency Into the Future 14. 10 apps to save you from yourself behind the wheel |
WHITE PAPER: Cisco Systems Nearly everything in data centers is changing, from cabling and network design, to more sophisticated, faster compact builds. Network security has to adapt, and IT must drive new security approaches--installing technologies and policies that can protect today's and tomorrow's data centers. Read more >> |
Nothing quite says geek (or propeller-head), like a good old propeller beanie. Though twirly beanies can also say chic. Here's a short spin through the colorful history of propeller beanies. READ MORE |
As seems to be my want at the moment, today I have another disaster-oriented column for you. Remember the recent meteor event in Russia? On February 15 this year a rock estimated to be 50 meters wide and weighing an estimated 10,000 tons entered the atmosphere over the city of Chelyabinsk at a speed of around 40,000 mph and exploded. READ MORE |
A skeptical but mostly respectful crowd of Black Hat security attendees Wednesday listened intently as National Security Agency Director Keith Alexander defended controversial U.S. surveillance programs in a keynote address. READ MORE |
Keeping pace with the rapid rate of change in integrated computing platforms (ICPs), NetApp and Cisco aren't wasting any time aligning innovation with the demands of its 2,400 customers. The days of do-it-yourself (DIY) builds are waning as more and more ICP vendors aim to make IT infrastructure easier to procure, manage, and maintain. Full details of this shift are described in ESG's Market Landscape... READ MORE |
WEBCAST: IBM Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both the commercial and public sector space. Learn More. |
Isis will roll out its mobile wallet application nationwide later this year following successful pilots that launched last fall in Austin, Texas, and Salt Lake City, Utah. READ MORE |
IBM is the subject of a probe by the U.S. Securities and Exchange Commission into how it reports revenue related to its cloud computing business, the vendor revealed Wednesday. READ MORE |
Microsoft today released a stripped-down version of Office for Android smartphones, continuing its strategy of tying its mobile suite to the Office 365 rent-not-buy subscription plans. READ MORE |
Some D-Link devices that enable remote access to surveillance camera feeds or other potentially sensitive data contain critical vulnerabilities that enable hackers to bypass authentication and access them from the Internet. READ MORE |
WHITE PAPER: Netscout Systems Inc. According to NetForecast's survey, enterprises with application performance management (APM) best practices benchmark scores above six on a ten-point scale experience 75% better results in critical areas. This research paper reveals the survey results as well as discusses the best practices for APM. Learn More. |
The average person could save big money with a 3D printer by printing just 20 products a year instead of buying them at a store, according to a Michigan Tech University study. READ MORE |
Employees want their go-to business apps available on their mobile devices. IT wants to deliver enterprise apps to help mobile workers become more productive. So what's keeping CIOs from bringing those critical apps to iPhones and Android phones? READ MORE |
Georgia Tech researchers have developed a proof-of-concept attack called Jekyll that involves using Trojan Horse-style apps to sneak malware past Apple's app review process and onto iOS devices such as the iPhone and iPad. READ MORE |
Supporters of Aaron Swartz have slammed a lengthy report issued yesterday by the Massachusetts Institute of Technology (MIT) about its legal stance of remaining "neutral" in the federal government's computer crimes case against the young man, who killed himself in January. READ MORE |
Olgivy and Mather builds its own social collaboration system with open-source tools and many, many user interviews. READ MORE |
If you can't leave your phone alone while driving, these solutions might help READ MORE |
WEBCAST: VCE IDC suggests IT organizations deploy converged infrastructure systems that manage server, storage and network as unified IT assets. Learn about the significant business benefits 5 companies experienced when doing so. Learn More. |
|
No comments:
Post a Comment