Wednesday, March 7, 2012

Anonymous takes down security firm's website, vows to fight on after arrests

  Big Bird Tweets: How corporations use social media to gauge public persona | Dell: U.S. job growth is in services, not manufacturing
 
  Computerworld First Look

Forward this to a Friend >>>


Anonymous takes down security firm's website, vows to fight on after arrests
Hackers claiming to belong to the Anonymous hacking collective early Wednesday defaced Panda Security's PandaLabs website in apparent response to the arrests of five hackers in the U.K. and the U.S. Read More


WHITE PAPER: Citrix Systems

8 Reasons Why Citrix NetScaler Beats F5
Is your network ready for the Cloud? Not with F5. Shift to Citrix NetScaler. Shift up to the Cloud. Download 8 Reasons Citrix NetScaler beats F5. Learn More

RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
Companies like Foursquare, StrongMail, and ExoIS are taking charge of cloud server security using Halo from CloudPassage, which ensures easy, scalable, and automated security for dynamic cloud environments. Register today to Secure 25 Cloud Servers for Free with Halo Basic.

Big Bird Tweets: How corporations use social media to gauge public persona
Corporations are learning social media can be a valuable tool in not only monitoring their public persona, but in collaborating within a company. Read More

Dell: U.S. job growth is in services, not manufacturing
Michael Dell, the chairman of the company that bears his name, does not see manufacturing as a big job creator for the U.S. To him, job growth will be in services and adoption of new technologies. Read More

Coming at 1 p.m.: Apple iPad event liveblog
Apple is expected to take the wraps off its next iPad at a special event beginning at 1 p.m. ET (10 a.m. PT). Macworld will be liveblogging the event, and you can bookmark this link to view the news as it unfolds. Read More

Social media takes on Rush Limbaugh
Social networking sites like Facebook and Twitter lit up this week and conservative commentator Rush Limbaugh is feeling the effects. Read More

LulzSec bust a blow to Anonymous? Not so fast
Security experts say it's too early to tell how much damage has been done to the hacking groups that operate under the loose affiliation of Anonymous. Read More

JR Raphael: Google Play and Android: What the change means for you
Google is retiring the Android Market and replacing it with a new catch-all destination called Google Play. So what does the change really mean for Android users? Read More


WHITE PAPER: Oracle

Why Projects Fail: Avoiding the Classic Pitfalls
Executing critical projects successfully is a key business requirement. This whitepaper discusses key strategies to avoid common project pitfalls, helping your enterprise successfully navigate challenges and better position projects for success. Learn More Today!

From CIO.com: How to choose your cloud service provider
Selecting the right cloud service provider to trust with your infrastructure, critical applications and sensitive data can be a difficult process. These guidelines can help you make the right choice. Read More

Google drops the price of Cloud Storage service
Google has cut the price of its Cloud Storage, a hosted service designed for enterprise developers who want to store their applications' data in the cloud, as opposed to in their own servers. Read More

U.S. lawmakers ask if federal workers have email privacy
Two Republican lawmakers have asked President Obama's administration to investigate whether agencies are regularly monitoring federal workers' private email accounts after reports of the U.S. Food and Drug Administration's firing employees over comments made in personal email messages. Read More

Study: Salaries poised to rise for workers with mobile, cloud, UI skills
IT workers who have experience with five popular technologies may see significant salary increases this year, according to a study from IT staffing firm Bluewolf. Read More

U.S. lawmaker opens up ACTA to online comments
A U.S. lawmaker has posted the controversial Anti-Counterfeiting Trade Agreement online and is asking the public to comment and make changes to the copyright enforcement treaty. Read More

Darragh Delaney: BitTorrent protocol primer, part 2: Operation
In my previous post on the BitTorrent protocol, I took a look at the main parts of what makes up its infrastructure. For this post I am going to focus on how data is uploaded and downloaded. Read More

IT Blogwatch: Intel Xeon E5-2600 'Jaketown' chips break cover
Intel unveiled its latest server CPUs. The 8-core Intel Xeon E5-2600 series -- codenamed Jaketown -- are the ultimate Sandy Bridge parts. In IT Blogwatch, bloggers crunch the numbers. Not to mention: Disturbing wedding dress imagery... Read More

 
 
 

SHARK TANK OF THE DAY

Yeah, that would be pretty big

This pilot fish, who works with two cohorts to support seven auto dealerships group, gets an email from a parts manager: "Good morning. The new online parts catalog was started this morning and none of our PCs are compliant to use it."

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

Mobile World Congress 2012 revealed many emerging trends for smartphones. Which will be the most significant?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:08 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive