×
Handhelds

Businesses Now Driving "Bring Your Own Device" Trend 232

snydeq writes "Companies are no longer waiting for users to bring in their own smartphones and tablets into business environments, they're encouraging it, InfoWorld reports. 'Two of the most highly regulated industries — financial services and health care (including life sciences) — are most likely to support BYOD. So are professional services and consulting, which are "well" regulated. ... The reason is devilishly simple, Herrema says: These businesses are very much based on using information, both as the service itself and to facilitate the delivery of their products and services. Mobile devices make it easier to work with information during more hours and at more locations. That means employees are more productive, which helps the company's bottom line.' Even those companies who haven't yet embraced bring your own device policies yet already have one in place, but don't know it, according to recent surveys."
Businesses

Ask Slashdot: Transitioning From Developer To Executive? 229

First time accepted submitter fivevibe writes "I'm about to switch from a position where I did hands on development to one where I will be building and managing technical team. I will be responsible for designing and implementing the company's overall tech strategy. I am excited about this move but also nervous. It will require a different focus than I had up to this point, different skills, and different orientation. What should I be learning, reading, thinking about in order to make this transition successfully and avoid growing pointy hair?"
Cellphones

How To Thwart the High Priests In IT 417

GMGruman writes "You know the type: They want to control and restrict any technology in your office, maybe for job security, maybe as a power trip. As the 'consumerization of IT' phenomenon grows, such IT people are increasingly clashing with users, who bring in their own smartphones, use cloud apps, and work at home on their own equipment. These 'enemies' in IT are easy to identify, but there are subtler enemies within IT that also aim to prevent users from being self-sufficient in their technology use. That's bad for both users and IT, as it gets in the way of useful work for everyone. Here's what to look for in such hidden IT 'enemies,' and how to thwart their efforts to contain you."
Government

How Does the CIA Keep Its IT Staff Honest? 238

Tootech points out this story for anyone who's been curious about getting that top-secret clearance and the promise of a cushy pension from the CIA, as a reward for decades of blood-curdling, heart-pounding, knuckle-whitening IT service: "Be prepared to go through a lot of scrutiny if you want to work in the Central Intelligence Agency's IT department, says chief information officer Al Tarasiuk. And it doesn't stop after you get your top secret clearance. 'Once you're in, there are frequent reinvestigations, but it's just part of process here,' says Tarasiuk, who also gets polygraphed regularly, though he won't be more specific. For those senior IT managers who are the 'privileged users,' meaning system administrators, 'there is certainly more scrutiny on you,' Tarasiuk says. 'It's interesting: there's so much scrutiny that a normal person might not want to put up with that. But it's part of the mission.'"
Security

Rare Earth Magnets Pose Threat To Children 284

Hugh Pickens writes writes "Many of today's toys contain rare-earth magnets which are much more powerful than the magnets of yesteryear and the magnets pose a serious threat to children when more than one is ingested because as the magnets attract one another they can cause a range of serious injuries, including holes through internal organs, blood poisoning and death (PDF). Braden Eberle, 4, swallowed two tiny magnets from his older brother's construction kit on two successive days last spring and his mother's first reaction was that the magnet would pass through her son's system without a problem. "People swallow pennies of the same size every day," said Jill Eberle. "They're smaller than an eraser." But next morning, with Braden still in pain, the family's doctor told them to go straight to the emergency room where an X-ray revealed two magnets were stuck together. "They were attracted to each other with the wall of each segment they were in stuck together," said Dr. Sanjeev Dutta, the pediatric surgeon at Good Samaritan Hospital who would operate on Braden later that day. "Because they were so powerful, the wall of the intestine was getting squeezed, squeezed, squeezed, and then it just necrosed, or kind of rotted away, and created a hole between the two." The US Consumer Product Safety Commission (CPSC) says at least 33 children have been injured from ingesting magnets (PDF) with a 20 month-old dying, and at least 19 other children requiring surgery."
Intel

Self-Contained PC Liquid Coolers Explored 86

MojoKid writes "Over the last few years an increasing number of liquid coolers have been positioned as high-end alternatives to traditional heatsink and fan combinations. This has been particularly true in the boutique and high-end PC market, where a number of manufacturers now offer liquid coolers in one form or another. These kits are a far cry from the water coolers enthusiasts have been building for years. DIY water coolers typically involve separate reservoirs and external pumps. The systems tested here, including Intel's OEM cooler that was released with their Sandy Bridge-E CPU, contain significantly less fluid and use small pumps directly integrated into the cooling block as a self-contained solution. Integrated all-in-one kits may not offer the theoretical performance of a high-end home-built system, but they're vastly easier to install and require virtually no maintenance. The tradeoffs are more than fair, provided that the coolers perform as advertised."
Android

Google Rolls Out Official Android 4.0 ICS Update 92

dell623 writes "Google is rolling out an OTA upgrade to Ice Cream Sandwich for the Nexus S. GSM versions can already be updated manually. An early review is largely positive and comments on the significant visual and performance improvements. The Nexus S upgrade allows for a direct comparison against Gingerbread on the same hardware, and the likely improvement in current phones that will receive the upgrade."
Network

New Standard For Issuance of SSL/TLS Certificates 62

wiredmikey writes "In light of the many security breaches and incidents that have undermined the faith the IT industry has in Certificate Authorities (CAs) and their wares, the CA/Browser Forum, an organization of leading CAs and other software vendors, has released the 'Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates,' an industry-wide baseline standard for the operation of CAs issuing SSL/TLS digital certificates natively trusted by the browser. The CA/Browser Forum is requesting Web browser and operating system vendors adopt the requirements (PDF) as part of their conditions to distribute CA root certificates in their software. According to the forum, the Baseline Requirements are based on best practices from across the SSL/TLS sector and touch on a number of subjects, such as the verification of identity, certificate content and profiles, CA security and revocation mechanisms. The requirements become effective July 1, 2012, and will continue to evolve to address new risks and threats."
Businesses

Challenges of Setting Up a Security Conference 29

Orome1 writes "The founder of the SecurityByte conference talks about his motivations for organizing such an event in his native country and what he hopes it will achieve. He shares knowledge regarding the differences between the organization processes involved when setting up this type of event in India as opposed to North America, which he says have a lot to do with the fact that there is lack of awareness about security in India, and that the majority of such events held there are mostly vendor-driven and free for visitors."
Android

Google Wallet Stores Card Data In Plain Text 213

nut writes "The much-hyped payment application from Google on Android has been examined by viaForensics and appears to store some cardholder data in plaintext. Google wallet is the first real payment system to use NFC on Android. Version 2 of the PCI DSS (the current standard) mandates the encryption of transmitted cardholder data encourages strong encryption for its storage. viaForensics suggest that the data stored in plain text might be sufficient to allow social engineering to obtain a credit card number."
Businesses

Ask Slashdot: Good Metrics For a Small IT Team? 315

First time accepted submitter shibbyj writes "I'm a member of a small 3 person IT team for a medium sized business (approximately 300-350 employees) that has multiple locations internationally. I have been tasked with logging our performance using the statistics from our ticket management system. I've also been tasked with comparing these stats and determining if we are performing above or below what is considered optimal. I'm wondering what people opinions are on what good metrics should be in regards to mttr mtbf etc. I have had trouble finding information on this."
Encryption

Running Tor On Your TV 80

jaromil writes "TorTV is an early effort to embed Tor in household computing: run it on your TV at home. So far only WDTV installed with the homebrew WDLXTV firmware is supported. What other platforms do you think are viable for it?"
Internet Explorer

Microsoft Upgrading Windows Users To Latest Version of MSIE 476

helix2301 writes "Microsoft will be upgrading all Windows XP, Vista and 7 users to the latest IE silently. They are doing this because they have found a large number of non-patched systems. Microsoft pointed out that Chrome and Firefox do this regularly. They will start with Australia and Brazil in January, then go world-wide after they have assured there are no issues."
Democrats

Meet the Strange Bedfellows Who Could Stop SOPA 231

jfruhlinger writes "In a political environment that's become very strongly defined by partisan lines, the SOPA debate has offered an unexpected ray of hope: the two main Congressional opponents of the bill are Ron Wyden, an Oregon Senator deemed a 'hardcore liberal' and Darrell Issa, a California Representative who is one of the Obama Administration's fiercest critics. (There are both Ds and Rs in favor of the bill, too.)" (Read more below.)
China

Hotel ISP iBahn Denies Breach By Chinese Hackers 30

alphadogg writes "iBahn, a provider of internet services to some 3,000 hotels worldwide, denied on Thursday a news report that its network was breached by hackers. Bloomberg wrote that a highly skilled group of hackers based in China, which U.S. investigators have called 'Byzantine Foothold,' attacked iBahn, citing unnamed sources, including one U.S intelligence official. In a written statement, iBahn said it was aware of the allegations in the news report but it had 'not found proof of any breach on the iBahn network.'"
Oracle

Oracle Sued For 'Extortion, Lies' By Montclair State University 359

angry tapir writes "Montclair State University is suing Oracle in connection with a troubled ERP (enterprise resource planning) project. Montclair's complaint, filed Tuesday in U.S. District Court for the District of New Jersey, states that Oracle made an array of 'intentionally false statements' regarding the functionality of its base ERP system, the amount of customization that would be required, and the amount of 'time, resources, and personnel that the University would have to devote.' 'Ultimately, after missing a critical go-live deadline for the University's finance system, Oracle sought to extort millions of dollars from the University by advising the University that it would not complete the implementation of the ... project unless the University agreed to pay millions of dollars more than the fixed fee the University and Oracle had previously agreed to,' it adds."
IT

The Four Fallacies of IT Metrics 223

snydeq writes "Advice Line's Bob Lewis discusses an all-too-familiar IT mistake: the use of incidents resolved per analyst per week as a metric for assessing help-desk performance. 'If you managed the help desk in question or worked on it as an analyst, would you resist the temptation to ask every friend you had in the business to call in on a regular basis with easy-to-fix problems? Maybe you would. I'm guessing that if you resisted the temptation, not only would you be the exception, but you'd be the exception most likely to be included in the next round of layoffs,' Lewis writes. 'The fact of the matter is it's a lot easier to get metrics wrong than right, and the damage done from getting them wrong usually exceeds the potential benefit from getting them right.' In other words, when it comes to IT metrics, you get what you measure — that's the risk you take."
Crime

Feds Arrest GeneSimmons.Com Attacker 180

gManZboy writes "Federal authorities have arrested an alleged member of Anonymous in connection with an "Operation Payback" attack against the website of Kiss bassist Gene Simmons. The charges stem from a distributed denial-of-service (DDoS) attack against Simmons' website over a five-day period in 2010. Simmons apparently drew the ire of the Anonymous set after he lambasted their peer-to-peer (P2P) downloading proclivities during a 2010 MIPCOM entertainment content media conference panel discussion, where he lamented the failure of the music industry 'to sue every fresh-faced, freckle-faced college kid who downloaded material.'"
China

The Undeclared "Cyber Cold War" With China 260

First time accepted submitter lacaprup writes "Chinese-based hacking of 760 different corporations reflects a growing, undeclared cyber war. From giants like Intel and Google to unknowns like iBahn, the Chinese hackers are accused of stealing everything isn't nailed down. Simply put, it is easier and cheaper to steal rather than develop the legal way. China has consistently denied it has any responsibility for hacking that originated from servers on its soil, but — based on what is known of attacks from China, Russia and other countries — a declassified estimate of the value of the blueprints, chemical formulas and other material stolen from U.S. corporate computers in the last year reached almost $500 billion"
KDE

KDE Releases Plasma Active Two 49

jrepin writes with a snippet from the release announcement of Plasma Active Two: "Mobile devices that adapt to who you are, reflecting what you are doing when you are doing it. This concept is at the heart of the Plasma Active user experience. Plasma Active One was released in October 2011, providing early adopters the first opportunity to experience Activities on a tablet. Since then, the design and development team behind this open source touch interface has been hard at work on an update. ... information about real-world usage enabled the team to improve the end-user experience significantly over the past two months."

Slashdot Top Deals