2015년 3월 13일 금요일

Google error leaks website owners' personal information

ITworld
ITworld Today
March 13, 2015

Google error leaks website owners' personal information

A Google software problem inadvertently exposed the names, addresses, email addresses and phone numbers used to register websites after people had chosen to keep the information private. READ MORE
 

Issue highlights

WHITE PAPER: Spanning

5 Essential Restore Capabilities for Google Apps Data

If you lose data in Google Apps, how quickly can you get it back? Many admins are surprised to find it’s harder than they think. In this whitepaper learn: -Difference between restore and recovery -Benefits of rapid, easy-to-use data restoration in Google Apps -What to look for in a backup solution LEARN MORE

Cord cutting is changing everything, and the head of CBS knows it

As more homes rely solely on broadcast TV and streaming video, networks are starting to admit that the big cable bundle isn't sustainable. READ MORE

Take free programming courses taught by Microsoft experts at EdX

Microsoft is teaming up with EdX to offer free online computer courses, most of them in programming and professional development. READ MORE

Hillary Clinton is now the face of shadow IT

Even if the former secretary of state set up a private mail server purely for the convenience of using a single phone for both government work and personal use, Hillary Clinton is now the poster child for the dangers of rogue IT. READ MORE

Senate panel secretly approves cyberthreat sharing bill

One senator called the legislation a 'surveillance bill by another name'. READ MORE

Why you still need to care about software licensing (via CIO.com)

The cloud hasn't done away with software licensing problems. Here’s what you need to know. READ MORE
WHITE PAPER: CDW

5 Things Your Organization Can Do to Improve Security

One of the great things about being on the security assessment team is the ability to work with companies to truly improve their overall security posture. Sure, it's interesting to talk about zero-days and exotic exploits against systems they don't have, but in most cases, it doesn't hold particular relevance. VIEW NOW

Fujitsu's thin heat pipe could let smartphone chips run cooler

While it won't eliminate heat, this heat pipe could spread it out better and reduce extremes of temperature on the surface of smartphones. READ MORE

Qualcomm's Raspberry Pi-like computer has wireless capabilities

Qualcomm's DragonBoard 410c brings 64-bit ARM processors to enthusiasts, but no price or shipment date available yet. READ MORE

New ransomware program targets gamers

The program encrypts game saves, mods, maps and other user-generated content for a large number of popular games. READ MORE

Six entry-level cybersecurity job seeker failings (CSOonline.com)

Here's how many cybersecurity entry-level job seekers fail to make a great first impression. READ MORE

Yahoo is coming to Good Morning America

Yahoo and Disney/ABC Television Group are expanding their relationship and that means more Disney and ABC on Yahoo, and more Yahoo on ABC. READ MORE

WIN THIS BOOK: Effective Python: 59 Specific Ways to Write Better Python

We've got 5 copies to give to some lucky readers. Enter for your chance to win! READ MORE
WEBCAST: CDW

Achieving Complete Security: Endpoint, Mobile, and NAC

Is sensitive data leaking out of your business? For many enterprises, mobility is the enemy of security. As more devices and platforms enter the workplace, security strategy must be constantly refined to ensure the safety of data and users. VIEW NOW
BECOME AN ITWORLD INSIDER
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

R programming beginner's guide
IT Resume Makeover: Emphasize your 'X factor'
4 open source monitoring tools that deserve a look
Free and cheap ways to learn about IT security
PowerShell for beginners: Scripts and loops
Six Ted talks that can change your career

What are you waiting for? Sign up today!
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

댓글 없음:

댓글 쓰기