Search This Blog

Tuesday, May 20, 2014

25 years of Microsoft Office roadkill

Chinese state-owned enterprises 'hired' military hacking unit

Report: The NSA records all cellphone calls in the Bahamas

ITworld Today
May 20, 2014
Share this email

25 years of Microsoft Office roadkill

Love it or hate it, Microsoft Office has torn up the competition, leaving all manner of software carrion in its wake.

READ MORE
 

Issue highlights

1. Chinese state-owned enterprises 'hired' military hacking unit

2. Report: The NSA records all cellphone calls in the Bahamas

3. BOOK GIVEAWAY: Penetration Testing: A Hands-On Introduction to Hacking

4. Apple Mavericks: The good, the bad, the upgrade

5. NASA uses solar power to get crippled Kepler back to work

6. Windows XP's U.S. farewell tour to last most of '14

7. A project staffing worst practice

8. Why are the bees disappearing? Too many computer science PhDs

9. Alienware: Steam Machine will "be the least profitable system we ever sell"

Resource compliments of: BlackBerry

BlackBerry's EZ Pass Offers Free EMM Licenses for BES10

BlackBerry has launched a free EMM license offer to persuade enterprises to upgrade their existing BlackBerry MDM platform, or migrate from any other MDM vendor*. Switch to BES10 and get perpetual Silver level EMM licenses for each existing BlackBerry license or other active MDM licenses, 1 for 1. Good, AirWatch and MobileIron licenses count too. Find out how your BlackBerry, iOS and Android management can be consolidated onto a single, highly secure EMM platform. If you've been waiting for the right time to switch to BES10, this is it.

Chinese state-owned enterprises 'hired' military hacking unit

A U.S. criminal indictment against Chinese Army personnel over alleged hacking describes how stolen intellectual property was funneled to Chinese companies, an unresolved question for analysts. READ MORE

Report: The NSA records all cellphone calls in the Bahamas

The U.S. National Security Agency has been recording and archiving "virtually every" cellphone call in the Bahamas without knowledge and permission from the island nation's government, according to a report from The Intercept. READ MORE

BOOK GIVEAWAY: Penetration Testing: A Hands-On Introduction to Hacking

Five will win. Enter the drawing today! READ MORE

Apple Mavericks: The good, the bad, the upgrade

Minor upgrade does little to change Apple's second-class standing in the enterprise. READ MORE

White Paper: AVST

Hybrid Cloud: The Enterprise Cloud of the Future

The hybrid cloud, once thought of as the bridge to the public cloud, has in fact become the final destination for many medium and large enterprises' unified communications (UC) solution set. Find out how the hybrid cloud can help your company today. Learn More>>

NASA uses solar power to get crippled Kepler back to work

Planet-hunting space telescope is back on the job thanks to clever engineering. READ MORE

Windows XP's U.S. farewell tour to last most of '14

Last-minute moves by businesses to scrap Windows XP may have offset the continued free fall in consumer spending, but that gift from XP won't help the PC industry for long. READ MORE

A project staffing worst practice

Don't disregard the value of expertise and experience. READ MORE

Why are the bees disappearing? Too many computer science PhDs

A new website reveals relationships between seemingly unrelated variables and reminds us that correlation does not imply causation. READ MORE

Alienware: Steam Machine will "be the least profitable system we ever sell"

Steam Machines are back in the news and Valve's hardware partners are taking a very cautious tone. READ MORE

White Paper: Windstream

Cloud Computing eGuide

In this eGuide, CIO, Computerworld, and InfoWorld offer advice, tips, news, and predictions regarding cloud implementations in the coming year and beyond. Read on to learn how to make cloud work for your organization. Read more

BOOK GIVEAWAY:

We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter today for your chance to win!

Penetration Testing: A Hands-On Introduction to Hacking
In "Penetration Testing," security researcher Georgia Weidman provides a survey of important skills that any aspiring pentester needs. Enter now!

jQuery and JavaScript Phrasebook
Get more done faster with jQuery and JavaScript! Brad Dayley's jQuery and JavaScript Phrasebook brings together 100+ instantly useful code snippets and idioms for performing a wide spectrum of common web application tasks. Enter now!

DON'T MISS...

10 tech products that are built to last

16 terrible computer pranks that could get you fired

Your new PC needs these 22 free programs

Pants on fire: 9 lies that programmers tell themselves

History's 15 most popular computer scientists

Follow ITworld

Share this email

You are currently subscribed to itworld_today as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments: