Tuesday, May 20, 2014

DoJ indicts Chinese Army hackers of Unit 61398

  Jonny Evans: OS X Mavericks: Using Apple's hidden Wi-Fi Diagnostics tool | JR Raphael: Hands on: What the Moto E is actually like to use (and who should buy it)

 
  Computerworld Blogs

Forward this to a Friend >>>


Richi Jennings: DoJ indicts Chinese Army hackers of Unit 61398
  Center Building 208 Datong [city8.com, via Mandiant]. The U.S. Department of Justice (DoJ) yesterday indicted five Chinese People's Liberation Army (PLA) officers. The allegation is that they were hacking U.S. companies, to steal secrets. Wang Dong (UglyGorilla), Sun Kailiang, Wen Xinyu (WinXYHappy), Huang Zhenyu and Gu Chunhui, are all said to be officers in Unit 61398 of the Third Department of the PLA. In IT Blogwatch, bloggers break out the popcorn. Read More
 


WHITE PAPER: SAS

A Non-Geek's Big Data Playbook
This white paper is designed to be a visual playbook for the non-geek yet technically savvy business professional who is still trying to understand how big data, specifically Hadoop, impacts the enterprise data game we've all been playing for years. Learn more

WHITE PAPER: SAS

How Dell Optimizes Marketing Decision Making
Using fictional data, two analysts from Dell's corporate marketing group explained how data and marketing analytics helped them examine the question: "Was the campaign successful?" in depth. Download this whitepaper to learn more. Read Now

Jonny Evans: OS X Mavericks: Using Apple's hidden Wi-Fi Diagnostics tool
Wi-Fi is essential to most Mac users, but what happens when your network gets sketchy? Apple's hidden Wi-Fi Diagnostics tool should help you improve Wi-Fi performance. Read More
 

JR Raphael: Hands on: What the Moto E is actually like to use (and who should buy it)
Just when you thought unlocked smartphones couldn't get any cheaper, Motorola came along and -- oops! -- they did it again. Time to go hands on with the $129 Moto E. Read More
 

Darlene Storm: Face recognition pioneer now worried tech will be used for mass surveillance
Irony alert: After making millions upon millions of dollars, a pioneer of the face recognition industry is now worried the technology will be used for mass surveillance and to rob people of their anonymity in public. Read More
 


WHITE PAPER: Alert Logic
 
Alert Logic PCI DSS compliance solutions
Alert logic's cloud-powered solutions help organizations that process, store or transmit credit card data eliminate the burden of PCI compliance. This product brief outlines Alert Logic's solutions and the unique benefits offered. Learn More

Preston Gralla: Does the world really need a Surface Mini Pro?
Tomorrow Microsoft will likely introduce a 7- or 8-inch Surface Mini running Windows RT. Some rumors also point to a Surface Mini Pro as well, running full-blown Windows 8. Does the world really need a full-bore small Windows 8 tablet? Read More
 

Nicholas D. Evans: The importance of zero-trust and an adaptive perimeter in cyber fortifications
The cybersecurity world is at a crossroads in its evolution. In the same way that concentric castles, with inner and outer walls, were built in response to advances in siege technology, a new approach is required for cybersecurity due to the evolving nature of today's threats. This new approach should combine the existing tenets of "converged security" and "defense-in-depth" with the new tenets of "zero trust" and "adaptive perimeter". Read More
 

Sharky: That'll get HR's attention, all right
This government agency is responsible for running payroll and other financial systems for a big city, and everyone is careful to make sure each financial file is verified. But subject lines for notifications? Not so much. Read More
 

 

FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

YOUR STRATEGIC GUIDE TO BIG DATA CHALLENGES & OPPORTUNITIES
 

In this special issue, we examine the biggest challenges with big data projects, including the immaturity of the tools, a lack of people with expertise in big data technologies, the challenge of making the right investments and hardware that can't handle big data projects.

This free, 17-page magazine-style report is available now. [Registration required]

To read the report, click here.

DIGITAL SPOTLIGHT: YOUR STRATEGIC PLAN FOR THE CLOUD
 

In our in-depth report, we look at the lessons learned from early adopters about ramping up, scaling back and avoiding disasters in the cloud. We'll also tell you why IT pros with cloud chops have seen their fortunes rise and offer tips on how to hammer out an iron-clad cloud service agreement.

This free, 28-page magazine-style report is available now. [Registration required]

To read the report, click here.

INTERNET OF THINGS: GET THE LATEST!
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
As the Internet of Things continues to take shape, what about it worries you most?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 
 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_blogs as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:15 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive