Issue highlights 1. 10 Cloud Predictions for 2013 2. Cisco declares war on Microsoft unified communications system 3. The beginning of the end of BYOD as we know it 4. 13 IT security myths debunked 5. 3 Open Source Trends that May Affect Your Development Team in the Near Future 6. Petition to legalize cell-phone unlocking tops 100,000 signatures 7. Watch a Chinese military hacker launch a successful attack 8. IT Deal Book of 2013 9. US students get cracking on Chinese malware code |
WHITE PAPER: Moovweb In the new Moovweb white paper, "Creating the Right Mobile Strategy: What You Need to Know Before You Get Started", get the insight you need to make an educated decision on the move to mobile. Read Now! |
READ MORE |
Cisco chose the eve of Microsoft's first Lync conference to attack the Microsoft unified communications platform as incomplete when compared to Cisco's enterprise UC offerings. READ MORE |
WHITE PAPER: Ixia Anue Network monitoring has become more complex over the last few years, due in large part to virtualization and convergence. Learn how a state-of-the-art monitoring system that maximizes your existing monitoring tool investment can help you attain greater visibility into your network without adding complexity. Say goodbye to virtual blind spots. Learn More |
Earlier this week, the market leader in application delivery controllers (ADCs), F5 Networks, added to its security portfolio by announcing its own BYOD solution, know as Mobile Application Manager. Mobile App Manager is designed to remove many of the challenges associated with BYOD by taking the burden off the device and pushing the functions into the network. READ MORE |
WEBCAST: CDW Corporation Cloud computing is here to stay. Software-as-a-Service (SaaS) is particularly popular because it can lower cost while enabling business agility. But not all applications are suited to SaaS. In this Webcast you will learn the best applications for SaaS deployment and how to avoid SaaS pitfalls and cost overruns. Learn More. |
They're security myths, oft-repeated and generally accepted notions about IT security that...simply aren't true. As we did a year ago, we've asked security professionals to share their favorite "security myths" with us. Here are 13 of them (if you'd prefer to zip through a slideshow version of this, click here) READ MORE |
WHITE PAPER: HP The software industry has learned that putting fancy boxes on the network doesn't fix bad software, cloud converts must focus on the risks they bring along with the software they deploy. This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk. Learn more. |
As a professional web developer, staying on top of the latest trends in technology and software is of utmost importance. The top open source tools and packages used by engineers and developers rarely stay on top for long. Keeping track of what is current in the ecosystem can sometimes be a moving target. Following are developments in the development world that are perhaps too large for your... READ MORE |
The White House will now have to explain why it believes unlocking your cell phone is a crime. I just received a press alert from Derek Khanna, a former House Republican staffer who is leading an effort to get the government to reverse its interpretation of the Digital Millennium Copyright Act that criminalizes the unlocking of a cell phone. READ MORE |
Thanks to cybersecurity firm Mandiant, we now have a video of a hacker believed to be linked to the Chinese military infiltrating and stealing files from unidentified English language targets. The video comes as part of Mandiant's 60-page report, first reported by the New York Times, that claims China's military is responsible for cyberattacks on more than 140 foreign businesses, many of which are... READ MORE |
Our running list of mergers and acquisitions READ MORE |
Wesley McGrew, a research assistant at Mississippi State University, may be among the few people thrilled with the latest grim report into a years-long hacking campaign against dozens of U.S. companies and organizations. READ MORE |
|
No comments:
Post a Comment