Monday, June 24, 2013

California 'falsely' accuses Bitcoin Foundation

  Video Brew: The Cloud? I prefer the clouds... | Michael Horowitz: Perfect Forward Secrecy can block the NSA from secure web pages, but no one uses it
 
  Computerworld Blogs

Forward this to a Friend >>>


Richi Jennings: California 'falsely' accuses Bitcoin Foundation
Safety and Soundness: That's the DFI's motto. The California Department of Financial Institutions (DFI) has warned the Bitcoin Foundation to stop exchanging money without a license. Thing is, the Foundation doesn't do that, at least according to its Secretary, who would know about these things, you'd think. The DFI's C&D letter is also said to have given the Foundation an impossible deadline to respond. In IT Blogwatch, bloggers accuse the DFI of a dirty turf war. Read More


WEBCAST: SAP

Bring Mobile Innovation to your Enterprise.
With the mobility revolution well underway, CIO's and Line of Business owners are faced with the struggle to develop a winning mobile strategy. In this exclusive SAP KnowledgeVault Exchange, find out how to give your company an edge by developing a secure, future-proof mobile strategy. Learn More

RESOURCE COMPLIMENTS OF: Cisco

Cloud Evaluation Guide
Learn the keys to choosing the best cloud solution for your company. Before you explore alternatives to an on-premises communications system, get a thorough background in the issues and options with this practical guide. Follow this three step process to cut through the hype and make an informed decision. Read Now

Video Brew: The Cloud? I prefer the clouds...
Before The Cloud, there were clouds. And pretty cool ones, too. This video features strange clouds including lenticular, mammatus, and other bizarre formations, set to some pleasant new age music. Enjoy during your next coffee break. Read More

Michael Horowitz: Perfect Forward Secrecy can block the NSA from secure web pages, but no one uses it
Perfect Forward Privacy is an obscure SSL configuration option that increases security. Until a few days ago, I had never heard of it. Almost no one uses it. Without it, HTTPS encrypted web pages are vulnerable to the theft of a single piece of data. No need to break through the wall, if you have the key to the lock. In this fairly long and technical blog, I speculate on how the NSA might, perhaps, be able to see through SSL, TLS and HTTPS as if they were glass. Read More


WEBCAST: Comcast

The Success Network: Driving Business Forward
The communications and connectivity infrastructure of your organization is the focus of this KnowledgeVault Exchange, sponsored by Comcast Business. Click here for exclusive videos, white papers, cases studies and an exclusive, interactive forum all aimed at optimizing your network for success in today's fast-paced marketplace. Read now

JR Raphael: Galaxy S4 revisited: 7 weeks later, does the phone still impress?
Time to dive back into the Galaxy S4 to see how it's held up -- and how my impressions of the phone have evolved. Read More

Barbara Krasnoff: Kobo's Aura HD e-reader: High quality and high priced
I recently had a chance to try out Kobo's new e-reader, the Aura HD. It's an interesting device -- but can it compete against Kindle, the Nook and a marketplace full of tablets? Read More

Sharky: At least he really did like the idea
Pilot fish works for a company that requires every printout to have a cover page to prevent casual snooping of documents left on printers. But when the budget gets tight, a co-worker gets an idea for saving money. Read More

 

DIGITAL SPOTLIGHT: CLOUD COMPUTING

In our in-depth report on cloud computing, we take a closer look at platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing the benefits and challenges of each service and sharing tips from early adopters.

This free, 12-page magazine-style report is available now [Registration required]

To read the report, click here.

CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS

Now's your chance to get a worthy CIO or other top IT executive nominated for next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.

To make a nomination, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Although the National Security Agency's secretly collecting phone records of millions of Verizon customers may be nothing new, the current scope of the data collection is "breathtaking." Do you think the U.S. government be allowed to collect phone records and mine Internet data on citizens?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.

 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_blogs as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:56 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive