Issue highlights 1. 10 mistakes companies make after a data breach 2. Verizon: LTE service didn't keep up with demand 3. MacRumors forums breach exposes 860,000 accounts 4. IBM to offer Watson supercomputer as cloud development platform 5. Cisco issues grim forecast after falling short on revenue 6. INSIDER Strategic guide to backup and recovery 7. AWS: Our virtual desktop will succeed where others have stumbled 8. IBM acquires Fiberlink as mobile-security strategy keystone 9. New Juniper CEO: Meet the real Shaygan Kheradpir 10. Cruise line plans 11ac network upgrades for stem-to-stern Wi-Fi 11. Microsoft Patch Tuesday advisories urge ditching old, weak crypto algorithms 12. iPhone 5, Galaxy S4 zero-day exploits revealed at HP Pwn2Own contest 13. Greenpeace tips hat to Facebook, Google for renewable energy use 14. The waiting ends for EMC's XtremIO all-flash storage array 15. 18 must-have Android productivity apps |
RESOURCE COMPLIMENTS OF: BlackBerry The BlackBerry® Smartphone Trade Up Program makes it easy for you to empower your employees with BlackBerry® 10. Trade in your used BlackBerry® smartphones or other mobile devices to receive cash back to use towards a new BlackBerry 10 device. Plus, you'll feel confident that your old devices will be securely wiped and responsibly recycled. Learn more about the BlackBerry Smartphone Trade Up Program and request a quote. |
Michael Bruemmer, vice president of Experian Data Breach Resolution, outlines some the common mistakes his firm has seen as organizations deal with the aftermath of a breach during a presentation for The International Association of Privacy Professionals (IAPP) Privacy Academy. READ MORE |
Verizon's network wasn't ready for the flood of new traffic that it had to deal with after the company rolled out LTE service, admitted CFO Fran Shammo. READ MORE |
A popular Mac news website, MacRumors, reported that their forums were compromised on Tuesday. The attack led to the exposure of some 860,000 accounts, and is said to be similar to the one that took place on the Ubuntu forums earlier this summer. READ MORE |
IBM is preparing to give third parties access to its Watson supercomputer with the aim of spurring the growth of applications that take advantage of the system's artificial intelligence capabilities. READ MORE |
Cisco Systems stunned Wall Street on Wednesday with a gloomy financial forecast it blamed on falling demand in developing countries and transitions in some of its product lines. READ MORE |
WEBCAST: Internap Most cloud servers run in a virtualized environment and come with a hypervisor - meaning that the physical server is shared between many users who may be slamming the server and causing resource contention. Watch this video to learn how to benefit from the cloud without virtualization or a hypervisor. View now |
Your company is increasingly reliant on IT to drive business, so the need for a sound backup and disaster recovery plan has taken on increased significance. At the same time, technologies such as the cloud are giving IT new options for how to deal with backup and DR. READ MORE |
With the launch of a new hosted virtual desktop infrastructure (VDI) service called WorkSpaces, Amazon Web Services (AWS) is hoping to convert more enterprises to virtual work environments, something other IT companies have enjoyed only modest success in doing. READ MORE |
Goal is unified mobile-security framework to protect transactions READ MORE |
From FiOS to the CIO Hall of Fame to Twitter: Kheradpir makes for an interesting choice by Juniper. READ MORE |
People sign up for cruise ships to get away from it all. But not quite all: Passengers still want Wi-Fi access for the growing number of mobile devices they lug with them on vacation for staying in touch, web surfing, music, photos and video. Cruise line Royal Caribbean is turning to 802.11ac to optimize their Wi-Fi connectivity for this mobile data deluge. READ MORE |
WEBCAST: Novell Mobile Employees in the workplace. Watch this webcast. Click Here>> Learn More>> |
Microsoft patched serious vulnerabilities Tuesday in Windows, Internet Explorer and Office, but also urged customers to stop using the aging RC4 cipher and SHA-1 hashing function in their systems and services. READ MORE |
Two teams of Japanese and Chinese "white hat" hackers have been declared victors at HP's Pwn2Own 2013 contest in Tokyo today for finding zero-day exploits that allowed them to compromise the Apple iPhone 5 and the Samsung Galaxy S4. READ MORE |
Greenpeace has often been critical of big data-center operators like Facebook for their impact on the environment, but on Wednesday it said some online firms are improving their practices and may even be the vanguard for renewable energy use. READ MORE |
EMC's long-awaited entry into all-flash storage arrays will finally get a full-fledged rollout next week, possibly setting the terms for mastery of the fledgling product category along the way. READ MORE |
From basic business tasks to advanced automation, these 18 apps will make your Android device more useful than ever READ MORE |
WHITE PAPER: Stratacache In this whitepaper, we examine how on-premise caching technology can take the guesswork out of mobile retailing with staggering results. Learn More. |
|
No comments:
Post a Comment