Wednesday, August 06, 2014

This week's Linux desktop review: MATE

The Linux desktop-a-week review: MATE | Android vulnerability still a threat to many devices nearly two years later

Network World Linux and Open Source

Forward this to a Friend >>>


INSIDER
5 Big Data projects that could change your life
Most over-hyped technology trends wear out their welcome pretty quickly, which should make skeptics among us wary about Big Data. However, while Big Data is being touted as the latest trend that will change the world, the skeptics aren't as, well, skeptical as they were about cloud and social.To read this article in full or to leave a comment, please click here(Insider Story) Read More


WHITE PAPER: Juniper Networks

Security in the Next-Generation Data Center
This white paper examines these trends, and it reveals the key capabilities that today's security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency. View Now

WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

The Linux desktop-a-week review: MATE
I started out my `use every Linux Desktop Environment for a week at a time' endeavor with Enlightenment and Awesome, two profoundly different environments that I didn't previously have a huge amount of hands-on experience using.For the third one, I selected a Desktop Environment that I have given a rather hard time recently - MATE.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Computer Sciences Corporation (CSC)

An Evolution in Enterprise Cloud Security
Private cloud techniques extend the protection of corporate governance and policies to the elasticity of a cloud platform— but that doesn't automatically make it secure. Just because you adopted a cloud environment does not make you immune to targeted Cyber attacks. Learn more

Android vulnerability still a threat to many devices nearly two years later
Security researchers have recently found a vulnerability that could be used to hijack Android apps and devices, but an older issue that can have the same effect remains a significant threat nearly two years after its discovery, according to security firm Bromium.The issue was reported in December 2012 and concerns an Android API (application programming interface) called addJavascriptInterface that allows applications to expose their native code to Web code running inside a WebView, an instance of Android's Web browser engine.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Dell

Achieve Deeper Network Security and Application Control
Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet to safeguard an organization from today's ever-evolving threats, NGFWs must be able to deliver an even deeper level of network security. View Now

Linux will not become a gaming platform, it already is one
The true measure of any great gaming platform is not the number of games available. Nor is it the need to have the same games as other competing platforms (the Playstation 4 doesn't need Mario games to be considered successful). And it really isn't even about how many total games are sold, though that certainly helps. No sir. It is far more nebulous and subjective than any of that. The measure of a great gaming platform is if people want to use it to play games on... rather than another platform. At least on occasion. For example: The SEGA Genesis. That beautiful console sold substantially less than the Super Nintendo. But it was still an excellent console that people enjoyed playing on. Thus, a success.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. iPhone 6 rumor rollup for the week ending Aug. 1

2. 10 things you need to know about Microsoft's Surface Pro 3

3. Why TCP/IP is on the way out

4. Black Hat 2014: How to steal security codes from home alarm systems

5. PayPal's two-factor authentication is easily beaten, researcher says

6. 10 disturbing attacks at Black Hat USA 2014

7. 11 Big Data Certifications That Will Pay Off

8. Top 20 colleges for computer science majors, based on earning potential

9. The Linux desktop-a-week review: MATE

10. New products of the week 08.04.2014


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_linux_open_source_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: