Tuesday, November 29, 2011

The cloud security checklist

  Google protects HTTPS-enabled services against future attacks | Ruckus tackles channel-changing in Wi-Fi
 
  Computerworld Networking

Forward this to a Friend >>>


The cloud security checklist
To choose the cloud service provider that best matches your company's risk tolerance, you should first develop a checklist of security mandates and required features. Experts explain how. Insider (registration required) Read More


WHITE PAPER: Adobe Government at Carahsoft

Adobe ColdFusion 9 Server Lockdown Guide
This guide describes how server administrators can improve the security of their ColdFusion server. Learn more

WHITE PAPER: IBM

Business Analytics: Pushing Toward Relevance
Although business analytics and business intelligence tools are becoming ubiquitous, they frequently remain underutilized. Part of the challenge is the disconnect between the IT teams deploying these tools and the business users who are supposed to be using them. Learn More

Google protects HTTPS-enabled services against future attacks
Google has modified the encryption method used by its HTTPS-enabled services including Gmail, Docs and Google+, in order to prevent current traffic from being decrypted in the future when technological advances make this possible. Read More

Ruckus tackles channel-changing in Wi-Fi
Ruckus Wireless took another shot at optimizing Wi-Fi capacity on Monday, introducing a technology called ChannelFly that is designed to place network clients on the best possible channel based on the actual capacity of that channel. Read More

Rohm builds chip that will send data at 30Gbps
Japanese component maker Rohm said it has developed an experimental chip that can send and receive signals at terahertz-range frequencies, which can carry data at speeds of up to 30Gbps and penetrate clothing and paper. Read More


WEBCAST: SAP

Empowerment with Mobile Real-Time Analytics
IT managers are gearing up to rapidly deploy mobile business intelligence and empower their front-line workers. In this webcast, we'll hear from experts on the challenges and driving forces behind creating BI reports in the field, and how to successfully deploy mobile analytic tools to increase productivity with minimal operational disruptions. Learn More

Father of RFID, Charles Walton, dies at 89
Charles Walton, inventor of the RFID technology now common everywhere from warehouses to retail stores to public libraries, has died at the age of 89 in California. Read More

CIO Q&A: How Citrix supports more workers with lower IT budget
Citrix CIO Paul Martine is the poster child for everything that Citrix markets to other CIOs. Read More

Leigh Jasper: Beyond cool: The cold, hard facts on collaboration
If you aren't collaborating effectively with your business partners, then you aren't getting the most from your processes and supply chain. And if you aren't using the right collaboration tools, then you aren't collaborating effectively. It's time to get hardcore about this. Read More

 
 
 

TAKE OUR ANNUAL SALARY SURVEY TODAY!

Computerworld's 2012 Salary Survey: What's your earning power? How does your salary compare with your peers? Computerworld's 26th Annual Salary Survey will feature the latest IT salary trends and advice on where to find the best-paying jobs. This year's survey participants can enter a drawing to win 1 of 3 new 16GB Apple iPad 2s with Wi-Fi! The sweepstakes is open to legal U.S. residents, age 18 or older.

BEST PLACES TO WORK IT

Is your IT department a great place to work? Our 18th annual "Best Places to Work in IT" special report and listing will honor 100 organizations that offer great benefits, salaries and opportunities for training and advancement, as well as interesting projects and a flexible and diverse work environment. Nominate a company now through Dec. 15, 2011.

SHARK TANK OF THE DAY

Because you just never know, right?

This organization is moving forward on a project to replace its legacy production system, and one IT pilot fish is sifting through help-desk requests that never did get closed -- including some that may or may not still be necessary.

VIDEO: STEVE JOBS ONE-ON-ONE, THE '95 INTERVIEW

Steve Jobs was in the middle of his career -- 40 years old, still at NeXT, and two years from returning to Apple — when he was interviewed by the Computerworld Honors program in this exclusive video.

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_networking as jonsan3511@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 8:29 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive