Wednesday, December 24, 2014

CentOS: The perfect gift for the Linux do-it-yourselfer

Old-school tricks to protect your passwords | 6 simple tricks for protecting your passwords

Network World Linux and Open Source

CentOS 7: The perfect gift for the Linux do-it-yourselfer
Although differentiation is tough in Linux distributions today, CentOS 7 has carved out a niche as the free and open alter ego to Red Hat Enterprise Linux (RHEL). We found that CentOS, which is mandated to be binary-compatible with Red Hat 7, shares about 95% of the features of its commercial enterprise-class sibling. Read More


WHITE PAPER: IBM

IBM is a Leader in The Forrester Wave
"The Forrester Wave™ for Enterprise Social Platforms offers in depth vendor evaluation based on 65 criteria to help your organization choose an enterprise social platform. The full report evaluates 13 social software vendors, with specific information on their core functionality and strategy. Learn More

WHITE PAPER: IBM

ROI of IBM's Exceptional Digital Experience Solutions
Infographic highlights a recent IDC Study to assess the economic impact of moving away from a homegrown solution or custom integration of components from multiple vendors to IBM's integrated Exceptional Digital Experience suites. This white paper reports the findings. Learn More>>

Old-school tricks to protect your passwords
Can't remember all of your passwords? Have them written down on a sticky note or on a piece of paper in your wallet? Do you use the same password for every site, even though you know it's a bad idea? If you're caught in password purgatory, try these 6 old-school password tricks. (Read the story version.)To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: IBM

Improving Collaboration by Adding Social to Email
This paper looks at why email remains the primary mode of communication in business today and the fact that more and more organizations are looking at social software and other real-time communication methods to add to the email experience. Read Now

INSIDER
6 simple tricks for protecting your passwords
We all know that the current username-and-password system is broken. With Russian hackers reportedly sitting on over a billion passwords, and new breaches hitting the news on a regular basis, it's fair to assume that if hackers don't have your password already, they're about to.To read this article in full or to leave a comment, please click here(Insider Story) Read More


WHITE PAPER: IBM

IBM Omni-Channel Digital Experiences
Learn how IBM's portfolio enables leading organizations to provide a framework to build and maintain multichannel digital experiences that put them ahead of the competition. Learn More

Google Cloud offers streamlined Ubuntu for Docker use
Google has adopted for use in its cloud a streamlined version of the Canonical Ubuntu Linux distribution tweaked to run Docker and other containers.Ubuntu Core was designed to provide only the essential components for running Linux workloads in the cloud. An early preview edition was released last week. The new edition jettisoned many of the libraries and programs usually found in general use Linux distributions that were unnecessary for cloud use.The Google Compute Engine (GCE) joins Microsoft Azure in supporting the fresh distribution.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

The Onion's 10 greatest gags about Google

Here are 10 of what we believe are its better efforts.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. CentOS 7: The perfect gift for the Linux do-it-yourselfer

2. 6 aging protocols that could cripple the Internet

3. 10 predictions for IT in 2015

4. Sky's the limit for Cisco Intercloud

5. Worst security breaches of the year 2014: Sony tops the list

6. 6 simple tricks for protecting your passwords

7. Peeping into 73,000 unsecured security cameras thanks to default passwords

8. Cyberattack on German steel factory causes 'massive damage'

9. 10 IT roles to target when poaching talent

10. Full speed ahead for 802.11ac Gigabit Wi-Fi


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_linux_open_source_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment