2015년 2월 26일 목요일

The U.S. Army may soon have the world's top supercomputer


6 emerging enterprise technologies to watch
Your Morning Countdown
  February 26, 2015 Read about how high performance computing plays into the U.S. Army's plans to maintain a competitive and tactical advantage over its potential foes.
10.6 emerging enterprise technologies to watch

9.Phil Johnson: iOS vs. Android reaches stalemate and 7 other mobile development trends

8.Lenovo website hacked in wake of Superfish debacle

7.Matthew Mombrea: Configuring multiple LACP groups on a TP-LINK switch

6.Facebook fixed 61 high-severity flaws last year through its bug bounty program
WHITE PAPER: Citrix Systems
Android, iOS, Windows Security Architectures
This white paper discusses the security implications and capabilities of the major mobile OS platforms, and presents comprehensive technologies and best practices to ensure control and security without impairing productivity.
View Now
5.Peter Smith: Strange bedfellows: Vimeo makes a deal with Machinima

4.Jim Lynch: Tails 1.3 released

3.Apple ordered to pay Texas company $532.9 million after losing patent case

2.Melanie Pinola: Google Inbox is finally coming to Google Apps users

1.Andy Patrizio: U.S. Army plans for a 100 petaflop supercomputer
: Citrix Systems
Security Leadership Series: Security Strategies for Success
Today’s highly mobile employees and line-of-business groups are front-line participants in the struggle to secure the enterprise. This exclusive CSO Magazine eBook shares best practices for leading meaningful security discussions, engaging users to protect business information, and meeting security-related compliance requirements.
Learn more
  Most Popular
Apple's most obvious product placement in movies and TV

The best Google Cardboard VR apps

7 dwarfs of desktop virtualization – whistle while you migrate

Motorola's new Moto E is a more powerful LTE smartphone

If you could go back in time...
WHITE PAPER: Citrix Systems
10 Reasons to Strengthen Security
Data security has become an increasingly critical concern for all organizations. In this paper, we explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security.
Learn More

댓글 없음:

댓글 쓰기