Seriously, we need to get one of these ASAP for testing:
FAQ: How to get an iPhone 3G S on Friday
http://cwflyris.computerworld.com/t/5274688/6339517/197392/0/
----------
The future of online identity?
Twitter power players get shiny 'verified' badges
Under legal pressure, the microblogging site has started rolling out a background-checking system so that prominent users can prove that accounts belong to them.
Fri, Jun 12 10:29:00 PDT 2009 | Read full story
----------
After plenty of coverage about how its Bing search engine makes it all too easy for kids to find and view porn, Microsoft has made some changes that will make it easier for parents to block or monitor what their kids are viewing on the site.
In a blog post, Microsoft announced that it is making two changes the company thinks will help address the issue.
According to the post, "explicit images and video content will now be coming from a separate single domain, explicit.bing.net. This is invisible to the end customer, but allows for filtering of that content by domain, which makes it much easier for customers at all levels to block this content regardless of what the SafeSearch settings might be."
TECH FOR THE PEOPLE
The U.K. integrates citizen databases
According to Melissa Hathaway, the U.S. National Security Council's cybersecurity chief, the government needs to improve its relationships with private companies if it wants them to share information about potential threats to national security. As of now, she says, many companies are wary of sharing confidential information with the government due to fears that the information may be mishandled. CIO.com/IDG News Service (6/12)
The U.S. General Services Administration has been tasked with spearheading a government-wide push for cloud computing, according to agency CIO Casey Coleman, and has partnered with private industry to streamline the process. Part of the GSA's role, she says, is to standardize systems and vendors so that other government agencies can easily transition their own operations to the cloud. InformationWeek
A rundown of the range of freebie and low-cost security information management options for the cash-strapped -- or still-shopping -- organization
Enterprises that assume botnets use a single form of malware are the ones being bitten, researcher says
No comments:
Post a Comment