2015년 3월 3일 화요일

6 Linux-y announcements from Mobile World Congress

ITworld
ITworld Today
March 03, 2015

6 Linux-y announcements from Mobile World Congress

Linux is enabling hardware and software vendors to create new markets. Here are some of the major announcements from MWC.READ MORE
 

Issue highlights

RESOURCE COMPLIMENTS OF: The College of St. Scholastica

Earn your Master’s in IT Leadership online in two years.

The College of St. Scholastica’s online program is designed for working adults who require the flexibility to complete coursework when it’s convenient for them. Gain the skills necessary to identify and analyze IT and organizational problems and implement innovative solutions. Learn to manage multi-disciplinary teams and lead effective change. OUR COURSES ARE OFFERED ONLINE IN ACCELERATED 8-WEEK TERMS, ALLOWING YOU TO EARN YOUR DEGREE IN AS LITTLE AS TWO YEARS. APPLY BY MAY 2 FOR OUR SUMMER START. LEARN MORE AT GO.CSS.EDU/LEADER OR CONTACT US TODAY AT (877) 287-8751.
INSIDER

How to connect to enterprise Wi-Fi security on Android devices

Connecting to wireless networks using the enterprise or 802.1X mode of Wi-Fi security is a bit different compared to using the personal or pre-shared key (PSK) mode. Here's what you need to know. READ MORE

Study finds that refactoring doesn’t improve code quality

New research finds that, contrary to popular belief, restructuring software code to be more maintainable and efficient may not be worth the time and effort. READ MORE

IT certification hot list 2015: 11 that deliver higher pay (via CIO.com)

Not all certifications are created equal. READ MORE

Why computers still struggle to tell the time

As more industries demand sub-second accuracy, computers struggle to maintain precise time. READ MORE
: HP

Fierce IT Security eBook

The IT Security threat landscape has changed quickly - and now businesses themselves are changing quickly as well. As mobile and cloud computing continue to remake enterprise IT, how can security keep up? In this FierceITSecurity eBook, IT and networking professionals will find practical, real-world advice on how to handle network security now. LEARN MORE >>

Who 'owns' an investigation into a security breach? (via CSOonline.com)

Experts agree that ownership of an investigation depends on what happened, but an advisory council says no matter who owns it, it needs ‘Unified Risk Oversight’ to be effective. READ MORE

Iran to weed 'moral' crimes from social networks, starting with Facebook

Iran has said it is willing to cooperate with Google and other Internet companies provided they play by its rules. READ MORE

Is data on your new Lollipop Android device encrypted? Maybe not

Google has relaxed a requirement for manufacturers to turn on encryption by default in Lollipop. READ MORE

D-Link patches router, says more fixes are on the way

The vulnerabilities affect eight router models. READ MORE

WIN THIS BOOK: Effective Python: 59 Specific Ways to Write Better Python

We've got 5 copies to give to some lucky readers. Enter for your chance to win!READ MORE
WHITE PAPER: HP

Security Considerations When Undergoing a Network Refresh

This SlashGuide looks at the most important factors IT should keep top of mind as they plan their move to 802.11ac, higher bandwidth wired infrastructure or upgrading to switches and routers with enhanced capabilities. LEARN MORE
BECOME AN ITWORLD INSIDER
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

R programming beginner's guide
IT Resume Makeover: Emphasize your 'X factor'
4 open source monitoring tools that deserve a look
  - Free and cheap ways to learn about IT security
PowerShell for beginners: Scripts and loops
Six Ted talks that can change your career

What are you waiting for? Sign up today!
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

댓글 없음:

댓글 쓰기