Issue highlights 1. Chrome 32: First look 2. IBM pumps $1.2 billion into global cloud data centers 3. Researchers aim to revolutionize 3D printing, global manufacturing 4. INSIDER CIOs and CMOs: Power couple or strange bedfellows? 5. New China-developed OS takes aim at Android, Windows 6. Innovation lives and dies with Net Neutrality 7. Relive the 1990s with these ancient, still-functioning websites 8. Security nightmare worsens for Windows XP's end of days 9. 100 American Eagle stores, hungry for data, will ping shoppers' phones 10. California court dismisses Google Glass traffic ticket 11. Facebook hijacks Trending feature from rival Twitter 12. Hackathon geared toward the 'liberation' of data from public PDF documents 13. HealthCare.gov still has major security problems, experts say 14. Products of the week 1.13.14 |
WEBCAST: Dell Inc. Join us to see why PC Pro named Dell PowerEdge VRTX the "2013 Server of the Year." PowerEdge VRTX may be just what you need in your remote and branch offices to redefine your IT operations. Take advantage of the onboard shared storage, then scale over time as needed. Learn more |
Some of the coolest new features of the latest Chrome version READ MORE |
Dispelling any lingering doubt that IBM sees cloud computing as the way of the future, the company announced that it will invest US$1.2 billion this year in expanding its global cloud infrastructure. READ MORE |
Researchers at the Lawrence Livermore National Laboratory are working to revolutionize 3D printing, as well as the way that companies build products ranging from jet engines and satellites to football helmets. READ MORE |
Marketing departments are shifting significant amounts of their own budgets toward IT-related products and services, independent of what the IT department spends, to the extent that Gartner predicts that by 2017 chief marketing officers (CMO) will spend more money on IT than chief information officers (CIO). READ MORE |
RESOURCE COMPLIMENTS OF: CSO40 Security Confab + Awards Conference Meet CSO40 Award winners and learn from the best about security challenges and solutions across areas including: Advanced Threats and Cybersecurity, Identity and Access Management, Security Intelligence/Leveraging Big Data for Security, Mobile and BYOD Risks, Privacy, and more. Register now. |
Concern about secret U.S. surveillance programs is fueling the development of another homegrown operating system in China, one that promises to offer a more secure alternative to rival OSes such as Android and Windows. READ MORE |
Routers have the built in capability to segregate traffic. With this court decision, there is nothing stopping network operators from doing the same with internet service, charging more for certain types of internet traffic. READ MORE |
READ MORE |
You all know (or better know) by now that Microsoft will end all support for Windows XP on April 8. Now the company is doubling down, saying it will end support for the XP version of Microsoft Security Essentials, the company's free security and antivirus application. That means no more updates, no more additions to the antivirus signatures, nothing. If a virus appears on April 9, you better have someone... READ MORE |
WHITE PAPER: Sophos, Inc. Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you determine your requirements and identify the vendor that best meets your needs. Learn More |
Some 100 American Eagle clothing stores may not need greeters anymore: Soon they'll be saying a different kind of hello on your smartphone, advertising the latest deals. READ MORE |
A court in Southern California has dismissed what was apparently the first-ever traffic citation issued for wearing Google Glass while driving. READ MORE |
Taking another page from social rival Twitter, Facebook launched a new Trending feature that will show users the most popular topics being discussed on the social network. READ MORE |
Massive amounts of unstructured data are held in the form of PDF documents, but extracting key figures and words out of PDFs in a programmatic manner can be difficult and costly. This poses a challenge to public-interest groups, journalists and others who are interested in running large-scale analyses on PDF documents in order to uncover valuable insights. READ MORE |
HealthCare.gov remains riddled with security vulnerabilities and is ripe for ID theft three and a half months after its launch, two cybersecurity experts told U.S. lawmakers Thursday. READ MORE |
Our roundup of intriguing new products from companies such as Cortado and NCP READ MORE |
WHITE PAPER: HP and Intel® Misinformation may be the most daunting obstacle when building an IT infrastructure. To help you separate the facts from the hype, experts from HP Technology Consulting have created this informative guide to provide you with the insight you need to make decisions about successful cloud strategies. Read Now>> |
|
No comments:
Post a Comment