Issue highlights 1. Kim Dotcom's wacky antics through the years 2. 10 ways to prep for -- and ace -- a security job interview 3. Hospital exec explains decision to lease hardware 4. These key phrases will help your Kickstarter get funded 5. How to make 96,000lbs of WWII machinery into high-tech research platform 6. New Blackphone promises secure communications and privacy 7. Chrome feature cuts mobile data used by up to half, Google says 8. Try Amazon's cloud for free, using Red Hat tools 9. Six tips for BYOD Security from IBM 10. Net neutrality ruling unlikely to immediately impact broadband market 11. Apple will pay out $32.5M to settle FTC iTunes complaints 12. The 8 Most In-Demand Big Data Roles |
WHITE PAPER: SAP This ebook introduces the SAP HANA in-memory computing platform and describes how it can transform your business. SAP HANA provides standard offerings to help with a range of business issues and can be incorporated into your current infrastructure, with preconfigured software, content and business-user enablement. Learn more |
The new leader of a political party, Dotcom is no stranger to controversy. READ MORE |
IT security pros with the right skills are in big demand. Last year, the employment rate for information security managers averaged .9%, as we reported in High CISO employment rates means shortage for security industry. That's as close to actual full employment as one can get. READ MORE |
Last fall, after mulling the buy-vs.-lease question, St. Francis Hospital and Medical Center, based in Hartford, Conn., determined that leasing computers would save it 10% based on a three-year timetable. READ MORE |
Words are powerful, particularly on the Internet, and a pair of researchers from Georgia Tech say that they've identified the ones that can either push a Kickstarter campaign over the top or doom it to unsuccessful obscurity. READ MORE |
WEBCAST: IBM Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both the commercial and public sector space. Learn More. |
The US Naval Research Laboratory is taking a 96,000-pound piece of World War II-era machinery and turning it into a test-bed for leading edge communications and radar applications. READ MORE |
Playing on mobile users' fears of commercial and government surveillance, two companies are building a phone they say is designed to protect privacy. The joint venture between smartphone manufacturer Geeksphone and encrypted communications provider Silent Circle will unveil the new device called Blackphone at the Mobile World Congress show in Barcelona next month. READ MORE |
Google is adding a feature to its Chrome mobile browser that can reduce data usage by up to 50 percent, which could avoid extra data charges from carriers. READ MORE |
Red Hat, which is the largest single contributor to the OpenStack project, is now offering an opportunity to take a "test drive" on the biggest competitor to the OpenStack project: Amazon Web Services's cloud. READ MORE |
WEBCAST: Egnyte Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with short videos, white papers and demos. View Now! |
Big, small or in between, every company can use these. READ MORE |
Despite a big win in a federal appeals court, Internet service providers are unlikely to make dramatic changes in the network access given to content providers such as ESPN, Facebook and Netflix, experts say. READ MORE |
Apple today agreed to pay $32.5 million to settle complaints the Federal Trade Commission said the company billed consumers for millions of dollars of charges incurred by children in kids' mobile apps without their parents' consent. READ MORE |
As more organizations begin to get on the big data bandwagon, demand for IT professionals with the skills to collect, organize, analyze and architect disparate sources of data is on the rise. READ MORE |
WEBCAST: Silver Peak Systems, Inc. Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication strategies and technologies. View now >> |
|
No comments:
Post a Comment