Saturday, June 15, 2013

Prism Spotlights Thumb Drive Dangers | Should Programming Become School Requirement?

If you have trouble viewing this email, read the online version.

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Saturday, June 15, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist Should All High School Students Learn Programming?
By Michael Fitzgerald
Google, Microsoft, Oracle: computer science should be required in Mass. public schools to help address tech labor shortage. Critics call this a kludgy solution.

Thumb Drive Security: Snowden 1, NSA 0
Thumb drives helped NSA whistle-blower Edward Snowden transport top-secret data from the agency. If the NSA can't keep a lid on thumb drives, can you?

Britain Launches National 'Information Economy' Strategy
Working with industry and academia, the plan sets out objectives designed to nurture small enterprises and prepare students for IT careers.

MOOCs: Interesting Legal Territory Ahead
Massive open online courses have the potential to change higher education, but people and schools implementing MOOCs face some emerging legal questions.

Big Data Pioneers Get Big For Their Britches
DataStax and Cloudera say NoSQL databases and Hadoop are the future, but don't count out Oracle and company just yet.

YouVisit: Virtual College Tours Get Real
Unlike other sites with "virtual campus tours" that piece together bits of video and resource links, YouVisit offers virtual walking tours with speaking guides.

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Research: Data Center Decision Time
Does managing your own data center help or hinder? We'll explore this question while analyzing results of our'State of the Data Center Survey' of 216 business technology professionals involved with management or decision-making at organizations with data centers 1,000 sq. ft. or larger.
Download Now (Registration Required)

Featured Report
Building and Enforcing an Endpoint Security Strategy
In this report, we examine the challenges of endpoint security and recommend the steps -organizations should take toward developing a security strategy that is both effective and practical.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Information Security Via a Certificate-based Network Authentication
Find out how to invest in certificate-based network authentication. Download this whitepaper to craft a best practices-based information security strategy.DOWNLOAD NOW (Registration Required)
Download Now (Registration Required)


Secrets Revealed: Brilliant Simplicity and Lower TCO
This white paper discusses the benefits of researching the total cost of ownership for a UC system and how businesses can lower their total cost of ownership (TCO) by selecting a simple yet sophisticated solution.DOWNLOAD NOW (Registration Required)
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
Apple iOS 7's Dramatic Design: Visual Tour
With iOS 7, Apple wants to shore up doubts about its ability to innovate in design. Take a closer look.

8 Free, Must-Have Windows 8 Apps
These free Windows 8 apps will help you and your business bootstrap your way to using Microsoft's new OS productively.

Big Data Analytics Master's Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

7 Tips To Avoid NSA Digital Dragnet
These apps will keep your cell phone calls under wraps -- if the NSA hasn't already found a way to break them.

 

SLIDESHOWS
Windows 8.1: 10 Surprise Benefits
Windows 8.1 does a lot more than bring back the Start button. These 10 features may give it a much-needed popularity boost with enterprise users.   View Now

ALSO SEE
Apple iOS 7's Dramatic Design: Visual Tour
Apple WWDC 2013: 8 Things To Expect

MORE SLIDESHOWS
spacer spacer spacer
VIDEOS

Bob Metcalfe Plans Ethernet's 40th
The 'Father of Ethernet' comes back to PARC, the scene of the crime, to talk about Ethernet's future -- including a 40th birthday bash in May.   Watch

ALSO WATCH
CES 2013: It's A Wrap!
CES; the car show

MORE VIDEOS
spacer
 
WEBCASTS
Secure Cloud: Taking Advantage of the Intelligent WAN
Join us to hear top industry experts discuss the private data network technologies that are best suited for enterprise cloud access requirements. You won't want to miss this opportunity to learn how your organization can best mitigate risk while reaping the full potential benefits of the cloud. It happens Wednesday, June 12, 2013. More Information & Registration

Click here
 
RESOURCES AND EVENTS
Don't Miss Mobile Commerce World
Attend Mobile Commerce World, June 24-26 in San Francisco, to learn how to develop and deploy your company's mobile commerce strategy. Spend three days learning from key players at Walmart, Amazon, Zappos, 1-800-FLOWERS, Advance Auto Parts, Alex and Ani, Groupon, REI, Vegas.com and more who are harnessing the power of mobile commerce. Use code MP_BTMEDIWKAXE to register and save $200 on an All Access pass.
Get More Details and Register Today



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment