If your notebook PC runs Ultimate or Enterprise editions of Windows 7 or Windows Vista, you can increase security by encrypting the hard drive with BitLocker. We'll show you how.
<b>Groklaw:</b> "SCO has filed its "renewed" motion for judgment "as a matter of law", with its supporting memorandum. They ask the judge to rule over the heads of the jury and decide that the jury "simply got it wrong" when it ruled that SCO didn't get the copyrights in 1995 from Novell. In the alternative, they'd like a new trial."
<b>Federal Computer Week: </b>"The challenges to government's adoption and participation in open-source communities is often thought to be a simpe culture clash, but in reality it goes deeper than that, accordning to NASA's newly-appointed chief technology officer."
What does an eye doctor with a penchant for inventions have to do with Microsoft's Zune, and will the company ante up with him in a patent dispute or fight to the finish?
<b>O'Reilly GMT:</b> "We often hear people saying that Perl is dead. I assume that you don't agree, but what do you say to people who try to tell you that?"
Tiny wall wart computers are everywhere, providing useful services, ease of use, and using little power. Paul Ferrill reviews the CloudPlug, a cross-platform, expandable backup server for both local and offsite storage.
Previously known as Windows Genuine Advantage, Windows Activation Technologies' update adds detection of 70 activation hacks for Windows 7, aims to cut down on piracy and counterfeiting.
Sophisticated cyber attacks are becoming a nearly routine event, causing IT managers a never-ending series of security headaches. A new report details the threats.
Previously known as Windows Genuine Advantage, Windows Activation Technologies' update adds detection of 70 activation hacks for Windows 7, aims to cut down on piracy and counterfeiting.
Sophisticated cyber attacks are becoming a nearly routine event, causing IT managers a never-ending series of security headaches. A new report details the threats.
This chapter provides an overview of some of the most important system namespaces and gives more detailed examples that demonstrate regular expressions, XML, cryptography, reflection, threading, parallel programming, and Direct3D.
This chapter provides an overview of some of the most important system namespaces and gives more detailed examples that demonstrate regular expressions, XML, cryptography, reflection, threading, parallel programming, and Direct3D.
This chapter provides an overview of some of the most important system namespaces and gives more detailed examples that demonstrate regular expressions, XML, cryptography, reflection, threading, parallel programming, and Direct3D.
<b>Tech Republic:</b> "Vincent Danen has some tips for using the smartmontools package to obtain important information about the health of your hard drives that could provide early warning signs of problems."
New study from Palo Alto Networks offers the latest warning about using social technologies in the enterprise, and finds a surprisingly high rate of adoption in regulated industries.