From stolen devices and phishing attacks, to buggy apps and human blunders, 2009 was a banner year for data breaches. Here are 10 from which we can learn a lot.
Marcin Policht examines SQL Server Integration Services' component, Derived Column Transformation,and how its usefulness is enhanced by its ability to implement fairly elaborate mathematical, logical, and string operations.
<b>We'll See:</b> "I spent last week at the Ubuntu Developer Summit in Belgium, where we kicked off the 10.10 development cycle. Due to our time-boxed release cycle, not everything discussed here will necessarily appear in Ubuntu 10.10, but this should provide a reasonable overview of the direction we're taking."
<b>Martin's Blog:</b> "as you wanted to have a mail with all my concerns about client-side-window-decorations (CSD), here is a very long mail presenting all my concerns what will not be possible any more with CSD and why I think that these particular features will be impossible."
<b>Linux Planet:</B> "Take a small box. Add a 64-bit CPU, two SATA hard drives, a Compact Flash slot, dual Gigabit Ethernet, and quiet operation, and what do you have? The VIA M'SERV mini-server. Could this be the perfect Linux box?"
<b>Database Journal:</b> "One of the key elements that helps to enable open source software applications to gain broader enterprise usage is the availability of commercial support options. In the case of the open source MongoDB NoSQL database, that commercial support is now coming from project backer 10gen."
<b>OLPC news:</b> "I was in the Peace Corps in Cape Verde as an ICT volunteer from 2006 to 2008, and while I was there, the One Laptop Per Child project came on my radar and I became pretty enamored of the prospect of bringing some XOs to the country, or at least raising awareness of the idea within the government."
For the second time in two years, Wyndham Hotels and Resorts says hackers managed to access its computer systems, stealing personal data including customer payment card data.