Monday, April 07, 2014

7 habits of highly successful Unix admins

5-year-old hacks Xbox, becomes Microsoft 'security researcher'

Apple v. Samsung: a 'holy war' for $2 billion

ITworld Today
April 07, 2014
Share this email

7 habits of highly successful Unix admins

You can spend 50-60 hours a week managing your Unix servers and responding to your users' problems and still feel as if you'e not getting much done or you can adopt some good work habits that will both make you more successful and prepare you for the next round of problems.

READ MORE
 

Issue highlights

1. 5-year-old hacks Xbox, becomes Microsoft 'security researcher'

2. Apple v. Samsung: a 'holy war' for $2 billion

3. Apple designer's court testimony recalls birth of iPhone

4. This Gmail lab is for masochists (or those who really want to get to Inbox Zero)

5. Amazon's Dash is a Star Trek communicator for grocery shopping

6. Fifty years on, mainframer remembers 'a fantastic time to be an engineer'

7. You need this free productivity-boosting app for iOS and Android -- now

8. Patch Tuesday: Final Microsoft support for Windows XP addresses Internet Explorer problems

9. Java SE8 for Programmers, 3rd Edition [BOOK GIVEAWAY]

White Paper: Perforce Software

Continuous Delivery: 5 Habits of Successful Practitioners

Whether it's New York Stock Exchange or Netflix, Samsung or Salesforce.com, companies of all kinds have embraced the design practice known as Continuous Delivery--a discipline in which software can be released to production at any time. In this Best Practices eBook, discover 5 habits that set top practitioners apart. Learn more >>

5-year-old hacks Xbox, becomes Microsoft 'security researcher'

A 5-year-old San Diego boy has been commended by Microsoft for his security skills after finding a vulnerability in the company's Xbox games console. READ MORE

Apple v. Samsung: a 'holy war' for $2 billion

Apple and Samsung were back in San Jose federal court last week arguing over more patents and another set of devices. Apple is demanding more than $2 billion in damages, in the second case between the companies in California. READ MORE

Apple designer's court testimony recalls birth of iPhone

Some of the most recognizable software design features of the phone were born in a dark, dirty, windowless room with special security to keep others out. READ MORE

This Gmail lab is for masochists (or those who really want to get to Inbox Zero)

Depending on your email habits, this setting can be hell or a godsend. READ MORE

White Paper: Dell Inc.

Accelerating Network Convergence

Adopting a converged networking strategy enables organizations to traffic server and storage I/O workloads on consolidated data throughput channels. Intelligent software helps optimize management of separate network architectures in converged network channels. View Now

Amazon's Dash is a Star Trek communicator for grocery shopping

A few lucky customers of the AmazonFresh grocery store will be able to order products just by speaking into the Amazon Dash, a futuristic wand that the company started offering by invitation on Friday. READ MORE

Fifty years on, mainframer remembers 'a fantastic time to be an engineer'

The IBM System/360 revolutionized business computing with the first set of compatible, scalable systems. READ MORE

You need this free productivity-boosting app for iOS and Android -- now

How often does a great tool come along that combines collaboration with cloud access and word processing prowess? Not often. That's why you should consider downloading this great free app now. READ MORE

Patch Tuesday: Final Microsoft support for Windows XP addresses Internet Explorer problems

Microsoft's final patches for Windows XP that come out Tuesday focus on critical problems with older versions of Internet Explorer that can result in malicious code being run remotely on victim machines. READ MORE

Java SE8 for Programmers, 3rd Edition [BOOK GIVEAWAY]

Five will win. Enter the drawing today! READ MORE

White Paper: CA Technologies

Simplifying Data Protection, Reducing Risk of Data Loss

This white paper outlines what IT organizations should look for in a data protection solution, including simplicity and ease of deployment, comprehensive protection, availability and alignment with business goals, as well as cost. Learn more!

BOOK GIVEAWAY:

We've got 5 copies of each of these new books to give to some lucky ITworld readers. Enter today for your chance to win!

Quality Code: Software Testing Principles, Practices, and Patterns
Using real-world code examples, Stephen Vance introduces patterns, principles, and more than two dozen detailed techniques for testing any software system more fully, effectively, and painlessly.

Java SE8 for Programmers, 3rd Edition
Hundreds of complete Java programs with thousands of lines of proven Java code, and hundreds of tips will help you build robust applications.

DON'T MISS...

20 tech brand names you're saying wrong

10 Eclipse projects that have made waves in IT

Your new PC needs these 22 free programs

10 Chrome tab tricks

The clock in the mountain: 10 curious side projects of tech's rich and famous

Follow ITworld

Share this email

You are currently subscribed to itworld_today as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment