2015년 2월 17일 화요일

5 technologies that outed Silk Road founder Ross Ulbricht

ITworld
ITworld Today
February 17, 2015

5 technologies that outed Silk Road founder Ross Ulbricht

Even technologies designed to preserve privacy can reveal identities when not used thoughtfully. READ MORE
 

Issue highlights

WHITE PAPER: Citrix Systems

Comprehensive Enterprise Mobile Management for iOS 8

This white paper provides an overview of the new iOS 8 capabilities in comparison to iOS 7 and how Citrix XenMobile makes it easier to manage iOS 8 devices without compromising the user experience. LEARN MORE

Java vs. Node.js: An epic battle for developer mind share

Here’s how the enterprise stalwart and onetime script-kiddie toy stack up in a battle for the server room. READ MORE
INSIDER

5 tricks to improve poor TCP performance

If your system back-up is to a remote site that is a considerable distance away, you might be using only a small percentage of the bandwidth that you’re paying for.READ MORE

Experimental networking tech beams data across the room with light

Oxford University researchers develop a way to transmit data across a room at 100-gigabit speeds using a beam of light. The Flash would be impressed. READ MORE

Equation cyberspies use unrivaled, NSA-style techniques to hit Iran, Russia

A cyberespionage group with a toolset similar to ones used by U.S. intelligence agencies has infiltrated key institutions in countries including Iran and Russia.READ MORE
WHITE PAPER: Citrix Systems

10 Essentials for Secure EMM

This white paper highlights 10 key points encompassing security, user experience, IT operations and BYOD to help your organization realize the full benefits of mobility.LEARN MORE

Beware of hot foreign spies who want to steal your data (via CSOonline.com)

It’s no exaggeration that sex buys intellectual property, trade secrets, customer data, and any information or network access of value. READ MORE

Microsoft adopts international standard for cloud privacy

Microsoft has adopted a new standard for cloud privacy that commits the company to protect the privacy of customers’ data, not to use it for advertisement purposes, and to inform the customer of legal requests for personal data. READ MORE

Why venture capitalists don’t fund women-led startups (via CIO.com)

Silicon Valley is the land of entrepreneurial spirit and the home of the startup – unless you’re a women-led business looking for venture capital. READ MORE

Pebble hopes to keep up momentum with Android Wear app integration

The company has also added the ability to set up pre-defined replies to notifications.READ MORE

WIN THIS BOOK: Core Java for the Impatient

We've got 5 copies to give to some lucky readers. Enter for your chance to win!READ MORE
WHITE PAPER: DomainTools

Mapping Domain Ownership in Cybersecurity Investigations

As the Internet has matured, the tactics and networks of cybercrime have grown in sophistication. Using DNS Intelligence and Whois data, cybersecurity teams and threat investigators can establish verifiable connections and build a Forensic Domain Map, allowing for proactive measures to be taken. LEARN MORE >>
FOR INSIDERS ONLY
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

Review: The big 4 Java IDEs compared

15 ways to screw up a job interview

12 tips to tune your Wi-Fi network

Container wars: Interesting times ahead for Docker and its competitors

6 things every IT person should know

IT Resume Makeover: How (and when) to break the rules

What are you waiting for? Sign up today!

댓글 없음:

댓글 쓰기