Weekend Reading
A new approach to securing USB flash drives
USB Flash drives are great. Securing them, however, is not so great. They are easily lost and the more you use one, the more likely it will contain files you consider sensitive. Corsair recently came out with a product that takes an entirely new approach to securing flash drives.
Take a look HERE.
==================================================================
The Open Source Challenge
How to replace Windows completely with Ubuntu
We all know how far open source software has progressed, but has it come so far to not only challenge Windows, but replace it? Can you really install Linux and open source software in place of Windows, and want for nothing?
Take a look HERE.
==================================================================
Best Free Software to Unlock Your Favorite Hardware
It sucks that your favorite gadgets have more functionality than their default software exposes, but it rules that several software applications are built to unlock that potential for free. Whether it's your iPod, Xbox, router or iPhone, we've covered some incredibly ambitious free software projects that unlock features and enable unauthorized but oh-so-useful applications to run on them. Get our top 5 favorite pieces of software to unlock your hardware.
Take a look HERE.
==================================================================
Six consumer technologies that are destroying traditional IT
Earlier this year, the researchers at the Gartner Group published a series of reports on the invasion of consumer technologies into the enterprise and the challenges that this phenomenon has created for IT departments. Gartner has wrapped all of that research into a special report called Consumerization: The IT Civil War. If this really is a war, I think it’s fair to say that IT is losing.
Take a look HERE.
==================================================================
Disable ldirectord checks
ldirectord is a daemon to monitor and administer real servers in a LVS cluster of load balanced virtual servers. ldirectord is typically used as a resource for heartbeat , but can also run standalone from the command line. ldirectord monitors the health of the real servers by periodically running a service check
Take a look HERE.
==================================================================
Is Pump-and-Dump more lucrative than Identity Theft?
An interesting aspect of the Ameritrade data breach last week was that according to their press release the only information stolen was "contact information" such as name, e-mail, phone number and address. Even though more sensitive data like SSNs and account numbers were in the compromised database, that information was "not taken". While this could be due to strong internal controls that prevented the theft, it is also possible that attackers simply weren't interested in that information.
Take a look HERE.
==================================================================
Internet pipes not ready to burst
Despite the fact that more people are dishing up video and other bandwidth-saturating content, Internet traffic growth rates are actually slowing down. That’s not to say the exabytes of data sitting in databases and other places around the globe couldn’t find its way onto the Internet at some point and create a problem.
Take a look HERE.
==================================================================
Profile: HP's Blackbird 002
The computer is not universally recognized as something that elicits emotion, like a sports car or a tailored suit or even a simple sculpture. Two weeks ago, Hewlett-Packard introduced the most unique PC it has ever built, and that perhaps any major manufacturer has built in decades. It's the product of a merger of vastly differing mindsets - the clinical, practical engineers of HP with the wild, daring, and often over-the-top designers of VoodooPC. The Blackbird 002 may be HP's first real museum piece.
Read the article HERE.
USB Flash drives are great. Securing them, however, is not so great. They are easily lost and the more you use one, the more likely it will contain files you consider sensitive. Corsair recently came out with a product that takes an entirely new approach to securing flash drives.
Take a look HERE.
==================================================================
The Open Source Challenge
How to replace Windows completely with Ubuntu
We all know how far open source software has progressed, but has it come so far to not only challenge Windows, but replace it? Can you really install Linux and open source software in place of Windows, and want for nothing?
Take a look HERE.
==================================================================
Best Free Software to Unlock Your Favorite Hardware
It sucks that your favorite gadgets have more functionality than their default software exposes, but it rules that several software applications are built to unlock that potential for free. Whether it's your iPod, Xbox, router or iPhone, we've covered some incredibly ambitious free software projects that unlock features and enable unauthorized but oh-so-useful applications to run on them. Get our top 5 favorite pieces of software to unlock your hardware.
Take a look HERE.
==================================================================
Six consumer technologies that are destroying traditional IT
Earlier this year, the researchers at the Gartner Group published a series of reports on the invasion of consumer technologies into the enterprise and the challenges that this phenomenon has created for IT departments. Gartner has wrapped all of that research into a special report called Consumerization: The IT Civil War. If this really is a war, I think it’s fair to say that IT is losing.
Take a look HERE.
==================================================================
Disable ldirectord checks
ldirectord is a daemon to monitor and administer real servers in a LVS cluster of load balanced virtual servers. ldirectord is typically used as a resource for heartbeat , but can also run standalone from the command line. ldirectord monitors the health of the real servers by periodically running a service check
Take a look HERE.
==================================================================
Is Pump-and-Dump more lucrative than Identity Theft?
An interesting aspect of the Ameritrade data breach last week was that according to their press release the only information stolen was "contact information" such as name, e-mail, phone number and address. Even though more sensitive data like SSNs and account numbers were in the compromised database, that information was "not taken". While this could be due to strong internal controls that prevented the theft, it is also possible that attackers simply weren't interested in that information.
Take a look HERE.
==================================================================
Internet pipes not ready to burst
Despite the fact that more people are dishing up video and other bandwidth-saturating content, Internet traffic growth rates are actually slowing down. That’s not to say the exabytes of data sitting in databases and other places around the globe couldn’t find its way onto the Internet at some point and create a problem.
Take a look HERE.
==================================================================
Profile: HP's Blackbird 002
The computer is not universally recognized as something that elicits emotion, like a sports car or a tailored suit or even a simple sculpture. Two weeks ago, Hewlett-Packard introduced the most unique PC it has ever built, and that perhaps any major manufacturer has built in decades. It's the product of a merger of vastly differing mindsets - the clinical, practical engineers of HP with the wild, daring, and often over-the-top designers of VoodooPC. The Blackbird 002 may be HP's first real museum piece.
Read the article HERE.
0 Comments:
Post a Comment
<< Home