Issue highlights
|
WHITE PAPER: Rackspace
Choosing a partner with deep cloud expertise, a track record of leadership, an understanding of your industry, and insight into your business' unique requirements is the clear path for migrating your operations into a scalable, highly available cloud solution. LEARN MORE
|
IT professionals are more reliant on public key encryption than ever before. They’re also more doubtful than ever before that the technology will keep their critical data and assets safe, according to a Ponemon survey of more than 2,000 IT pros. READ MORE
|
A secret CIA-sponsored conference reportedly hosted talks on stealing encryption keys from Apple devices and infecting them with malware. READ MORE
|
The open source functional language created by Microsoft is showing some signs of becoming more popular among developers. READ MORE
|
Paul D. Ceglia was arrested in 2012 for allegedly defrauding Facebook. READ MORE
|
Security vendor Blue Coat Systems being sold by one private equity firm to another as it is prepped to go public again. READ MORE
|
WHITE PAPER: CDW
One of the great things about being on the security assessment team is the ability to work with companies to truly improve their overall security posture. Sure, it's interesting to talk about zero-days and exotic exploits against systems they don't have, but in most cases, it doesn't hold particular relevance. VIEW NOW
|
Google adopting Microsoft's TypeScript language for its upcoming version of Angular is a big win for the platform. READ MORE
|
The platform featured games from indie developers as well as PS classics. READ MORE
|
Program expands the bare metal offerings from just x86 to its RISC line of servers. READ MORE
|
The new port in the 12-inch MacBook is backward compatible with USB 3.0 and USB 2.0. READ MORE
|
We've got 5 copies to give to some lucky readers. Enter for your chance to win! READ MORE
|
WEBCAST: CDW
Is sensitive data leaking out of your business? For many enterprises, mobility is the enemy of security. As more devices and platforms enter the workplace, security strategy must be constantly refined to ensure the safety of data and users. VIEW NOW
|
BECOME AN ITWORLD INSIDER
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.
|
|
댓글 없음:
댓글 쓰기