Microsoft's chief privacy strategist tells CFP conference attendees that protecting and ensuring accountability for user information requires the participation of a wide group.
<b>Worldlabel:</b> "If you use the open source Mozilla Thunderbird email client, you're probably familiar with its powerful address book features: import and export, online status information for your friends, even synchronization. But one thing that's not so obvious is how to do a mail merge to your address book contacts."
<b>The H Open:</b> "Free software has won: practically all of the biggest and most exciting Web companies like Google, Facebook and Twitter run on it. But it is also in danger of losing, because those same services now represent a huge threat to our freedom..."
<b>Tech Source: </b>"If you happen to own a business and are looking for CRM applications, I have here a list of some of the most well-known free and open-source customer relationship management (CRM) software available today."
Convenience is great, as long as you don’t inadvertently place your business at risk. We show you how to encrypt the data on those very convenient, if easy-to-lose, flash drives.
Convenience is great, as long as you don’t inadvertently place your business at risk. We show you how to encrypt the data on those very convenient, if easy-to-lose, flash drives.
Business customers will be able to get their hands on the new office suite on May 12th, while consumers will have to wait until the boxes are ready for store shelves.
<b>Linux Planet:</b> "Ubuntu developers invented Upstart as a replacement for the hoary old SysV init system, with the aim of meeting the complex demands of booting modern Linux systems. Upstart is being adopted by Fedora, Debian, and openSUSE. Akkana Peck introduces us to this Ubuntu success story."
<b>IT World:</b> "When Canonical announced its Ubuntu Light platform for netbooks and platforms Monday morning, a lot of fuss was made about the new Unity interface, the capability of Ubuntu Light to act as an instant-on environment for users of these devices who just want to surf, and the general coolness of the plan."
<b>The H Open: </b>"Red Hat has published a reminder that version 3 of Red Hat Enterprise Linux (RHEL) reaches its end-of-life (EOL) date on the 31st of October, 2010."
Moving from self-hosted to cloud-hosted e-mail services makes a lot of people nervous, but with a little planning and good communication with your user base, there's no reason it has to be hard.
<b>LWN.net:</b> "Linux distributions don't simply appear on mirrors and BitTorrent networks fully formed. A great deal of work goes on behind the scenes before a release sees the light of day."
Insiders -- the people who already have access to your network -- can do a lot more damage than a hacker who's still outside the firewall. Learn ways to minimize your risk from the insider threat.
Insiders -- the people who already have access to your network -- can do a lot more damage than a hacker who's still outside the firewall. Learn ways to minimize your risk from the insider threat.
Responding to requests from government officials across the globe, Microsoft unveils two new programs that aim to share threat information faster than its normal monthly cycle.
<b>Enterprise Mobile Today:</b> "The tech press and blogosphere are gushing about the new dual 3G/4G smartphone, and some writers attending the wireless conference even got a few brief minutes to test it out, so we save you the surfing and provide the highlights of the debut."