Wednesday, September 17, 2014

3 keys to open source success

Apple likely to release iOS 8 at 1 p.m. ET, 10 a.m. PT Wednesday

Use of forced labor 'systemic' in Malaysian IT manufacturing

ITworld Today
September 17, 2014

3 keys to open source success

For open source project success, you want a big, responsive, familiar team, according to a new study of GitHub Archive data.

READ MORE
 

Issue highlights

1. Apple likely to release iOS 8 at 1 p.m. ET, 10 a.m. PT Wednesday

2. Use of forced labor 'systemic' in Malaysian IT manufacturing

3. Hackers accessed Goodwill hosting provider for 18 months before card breach

4. How Boston Children's Hospital hit back at Anonymous

5. Adobe releases previously delayed security updates for Reader and Acrobat

6. Sony slashes value of its mobile business, projects larger loss for fiscal year

7. Amazon deal doesn't stop Twitch.tv from adding Chromecast support

8. Apple turns on iCloud two-step verification after nude selfie scandal

9. BOOK GIVEAWAY: Understanding Big Data Scalability (eBook)

Webcast: Alcatel-Lucent Enterprise

Integrating Mobility with Unified Access

Meeting mobility demands of 4500 students, faculty and staff at a university is no small task. Join this Webcast to hear the Director of Enterprise Infrastructure explain the steps Abilene Christian University took to deliver a new level of student-faculty interaction. Learn More

Apple likely to release iOS 8 at 1 p.m. ET, 10 a.m. PT Wednesday

Apple will probably release iOS 7 at 1 p.m. ET (10 a.m. PT) today, the traditional time of its mobile operating system upgrade launches. READ MORE

Use of forced labor 'systemic' in Malaysian IT manufacturing

The use of forced labor is so prevalent in the Malaysian electronics manufacturing industry that there is hardly a major brand name that isn't touched by the illegal practice, according to a report to be published Wednesday. READ MORE

Hackers accessed Goodwill hosting provider for 18 months before card breach

Hackers evaded security systems for a year-and-a-half at a hosting center that processed payment cards for Goodwill Industries, using the same type of malware that struck Target and other major retailers to steal card data, according to the charity's software vendor. READ MORE

How Boston Children's Hospital hit back at Anonymous

Hackers purportedly representing Anonymous hit Boston Children's Hospital with phishing and DDoS attacks this spring. The hospital fought back with vigilance, internal transparency and some old-fashioned sneakernet. That – and a little bit of luck – kept patient data safe. READ MORE

White Paper: Network Instruments

City Solved Network Mystery – Saves $30K

The City of Jacksonville put their hunch to work and not only solved a mystery, but found a new and innovative use for a popular UC solution that saved them $30,000. Learn More

Adobe releases previously delayed security updates for Reader and Acrobat

After a one-week delay, Adobe Systems has released security updates for its Reader and Acrobat products to patch critical vulnerabilities that could lead to computers being compromised. READ MORE

Sony slashes value of its mobile business, projects larger loss for fiscal year

Sony says its mobile brand is now worth a lot less than before. READ MORE

Amazon deal doesn't stop Twitch.tv from adding Chromecast support

Also, Disney, iHeartRadio and DramaFever get Chromecast support. READ MORE

Apple turns on iCloud two-step verification after nude selfie scandal

Apple on Tuesday began offering an additional security protection for iCloud account users, a move the company made following the theft of nude photos from several celebrities' accounts last month. READ MORE

BOOK GIVEAWAY: Understanding Big Data Scalability (eBook)

Five will win. Enter the drawing today! READ MORE

White Paper: Polycom

2014 Gartner MarketScope for Group Video Systems

In this MarketScope report, Gartner evaluated seven group video conferencing vendors on business model, customer experience, market responsiveness and track record, marketing execution, product strategy, and overall viability. Learn more >>

DON'T MISS...

Why many programmers don't bother joining the ACM

Top 25 free tools for every Windows desktop

10 amazing (and bizarre) drone discoveries

Just their type: 10 keyboards beloved by programmers

11 colorful characters seen at Comic-Con International 2014

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment