IT General

Teach your router new tricks with DD-WRT or OpenWrt

Top Tech Stories - Wed, 05/28/2014 - 11:00

With each passing year, hardware devices grow less dependent on proprietary components and more reliant on open source technologies.

Categories: IT General

Teach your router new tricks with DD-WRT or OpenWrt

Top Tech Stories - Wed, 05/28/2014 - 11:00

With each passing year, hardware devices grow less dependent on proprietary components and more reliant on open source technologies.

Categories: IT General

Security in a cloud world: Go multifactor

Top Tech Stories - Wed, 05/28/2014 - 11:00

Cloud computing is typically described with terms like "software as a service" (SaaS), "infrastructure as a service" (IaaS), and "platform as a service" (PaaS), but we've seen an explosion of the use of "aaS" to describe just about anything and everything as a service: communication,

Categories: IT General

App dev Q&A: The journey to making Famo.us real

Top Tech Stories - Wed, 05/28/2014 - 11:00

Famo.us CEO Steve Newcomb

Categories: IT General

10 cities that offer IT pros the most bang for the buck

Top Tech Stories - Wed, 05/28/2014 - 11:00
If you're looking for a move, here are some places to consider based on IT salaries, employment opportunities, and cost of living Dek:  If you're looking for a move, here are some places to consider based on IT salaries, employment opportunities, and cost of living External Source:  cio.com Redirect Unpublished Slideshow to:  http://www.cio.com/slideshow/154138
Categories: IT General

Toothless tigers: The state of Internet privacy laws

Top Tech Stories - Wed, 05/28/2014 - 11:00

Will tech CEOs ever be prosecuted for privacy violations? Can they? It's an interesting and somewhat depressing question, mainly because it doesn't seem possible in the United States.

Categories: IT General

5 signs you're outgrowing MySQL

Top Tech Stories - Wed, 05/28/2014 - 11:00

MySQL has long been the go-to database of the Web. It has powered some of the largest websites on the planet, as well as countless installations of open source software on every scale imaginable. But as many have learned, at a certain point, MySQL can become a burden to scale efficiently.

Scott Sullivan, vice president of technical account management at NewSQL vendor Clustrix, explains MySQL's limitations and details how NewSQL databases provide a fresh alternative. -- Paul Venezia

Categories: IT General

3 reasons why IT execs need to go out to lunch more

Top Tech Stories - Wed, 05/28/2014 - 11:00

In the last couple of years, social, mobile, analytics and cloud technologies have risen to the top of many organizations' agendas. IDC calls the combination of these technologies "the third platform" and predicts they will account for 89% of technology spending this year.

Categories: IT General

Unofficial XP update has Microsoft up in arms

Top Tech Stories - Tue, 05/27/2014 - 20:28

Windows XP users are discovering that their now-unsupported operating system can receive updates from Microsoft by making a few simple changes to the Registry -- albeit updates intended for different versions of Windows.

Categories: IT General

Unofficial XP update has Microsoft up in arms

Top Tech Stories - Tue, 05/27/2014 - 20:28

Windows XP users are discovering that their now-unsupported operating system can receive updates from Microsoft by making a few simple changes to the Registry -- albeit updates intended for different versions of Windows.

Categories: IT General

A Call to Action for Women Programmers

RHoK - Fri, 04/29/2011 - 23:59

In the two short years since its inception, Random Hacks of Kindness has grown into a diverse global community of experts and volunteer technologists putting their skills to work for the greater good.  An important part of that diversity is the significant number of women programmers who have come out to RHoK events to hack for humanity.  Women have traditionally been underrepresented in the global software development community. Here at RHoK, we are aiming to better the statistics.


A map showing RHOK #2 participation globally with circle size indicating total attendance and circle color indicating percentage of women attending.
Green: >=20%, Yellow: between 10 and 20%, Red: <=10%.

At last year’s Grace Hopper Celebration of Women in Computing, the Open Source for Good panel (including Avni Khatri and Alice Bonhomme-Biais from RHoK founding partners Yahoo! and Google) threw down a challenge: to ensure that women made up 20% of all participants at RHoK #2.

The challenge made an impact.  RHoK locations in Chicago, New York, Boston and Seattle, and Lusaka, Zambia all had close to 30% female participation, with 17% of participants globally being women, and many women acting as lead organizers.

“We didn’t just hit 20% challenge of women participants, we leapt over it,” said Chicago attendee Natalia Vinnick, Yahoo!, on the YDN blog.  “It was great to see so many women who participated and women who won!”

The winning team at the RHoK #2 Chicago Mainstage

“I found out about RHoK from a friend who participated in RHoK #1 and recommended it to me, since I am passionate about humanitarian causes,” said Eugenia Gabrilova, a member of the winning team in Chicago.  “I hope more women learn that a career in tech isn’t about sitting in a corner coding—you can accomplish so much and interact with many cool people.”

Yahoo! took the 20% challenge one step further, funding a scholarship for a female student to travel to RHoK #2’s Chicago Mainstage event.

“I have always hoped that my education will help me in building tools that will have social outreach—tools that will benefit others across any boundaries,” wrote scholarship winner Malveeka Tewari, a graduate computer science student at UCSD in her winning essay about hacking for humanity.

Nairobi RHoK attendees included members of the AkiraChix team.  The AkiraChix “are a group of intelligent and energetic ladies yearning to empower women through the use of technology in our day-to-day lives and change the cliché that IT is for men,” said Jamila Abass and Judith Owigar.  Their team learned about RHoK through Nairobi’s innovation hub and RHoK’s Nairobi venue, the iHub.

AkiraChix member Linda Kamau at the iHub

“Currently there are few women in technology here in Kenya.  Even fewer involved in software development.  We as AkiraChix would like to change that,” said Jamila Abass and Judith Owigar.  “We would like to see more women using technology to enrich their lives and creating relevant applications.  Since these women are an untapped resource who knows what new applications they could create?  The bottom line is by getting more women involved in technology we get a greater variety of ideas and applications, all of which are for the benefit of all people who will interact with these applications.”

With RHoK #3 fast approaching, RHoK is sending out a call to action to lady hackers around the globe: we invite you to take RHoK by storm!  Register here to join us in hacking for humanity on June 4th and 5th.

Categories: IT General, Technology

RHoK #3 on June 4th and 5th

RHoK - Tue, 04/12/2011 - 06:22

Hackers, mark your calendars.  On June 4th and 5th, 2011 Random Hacks of Kindness is coming to a city near you.  Taking place in 20 locations around the globe, RHoK #3 will be RHoK’s fourth hackathon, and the first with an expanded focus on both disaster risk and climate change.  So we are issuing a call to action: Experts in disaster risk and climate change—send your challenges our way.  And to the coders, designers, engineers, programmers and geeks of every variety—join us on June 4th and 5th to tackle some real-world problems and hack for humanity.

Click here to register

RHoK #3 will be taking place in:

Aarhus, Denmark
Bangalore, India
Basel, Switzerland
Berlin, Germany
Buenos Aires, Argentina
Hartford, Connecticut, U.S.A.
Jakarta, Indonesia
Lusaka, Zambia
Melbourne, Australia
Nairobi, Kenya
Philadelphia, Pennsylvania, U.S.A.
Santiago, Chile
Sao Paulo, Brazil
Seattle, Washington, U.S.A.
Toronto, Canada
Trento, Italy

Stay tuned for the announcement of additional RHoK #3 locations and the opening of registration, and get ready for a weekend of intensive brainstorming, collaborating and problem solving.

Categories: IT General, Technology

With Our Eyes Turned to Sendai

RHoK - Tue, 03/15/2011 - 19:52

As we watch with shock and profound sadness the tragedy unfolding in Japan and across the Pacific rim in the wake of the Sendai earthquake, our hearts and sympathies are with the families affected and their loved ones around the world.  Both personally and professionally, we are deeply sensitive to the challenges now facing that region.

We know many of you in the Random Hacks of Kindness community feel an urgency to take action in some way, to express your solidarity with the people of Japan and to offer your time, skills and efforts in their support.

There are many incredible initiatives out there that are actively engaged in the response efforts, working with volunteer technologists and citizens alike to channel their concern into action.  We know they would welcome your help.  These are just a few that we are aware of:

The Crisis Commons Volunteer Community

Crisis Mappers Net: The International Network of Crisis Mappers

OpenStreetMap (OpenStreetMap Japan)

Ushahidi (in Japanese)

Google Crisis Response (English)/(Japanese)

Microsoft Disaster Response

Yahoo!: How to Help

Categories: IT General, Technology

Advice: Cautions for the Holiday Season - Dec. 2, 2010

SANS Security Information Service - Wed, 02/09/2011 - 19:32
Problem: The holiday season brings with it a uptick in email phishing scams and malware campaigns. Watch out for: -electroni...
Categories: IT General, Security

Alert: Update Java to neutralize vulnerabilities - Oct. 18, 2010

SANS Security Information Service - Wed, 02/09/2011 - 19:32
Java has become a big target for the Bad Guys. You may not realize that you have Java installed on your computer because it works ...
Categories: IT General, Security

Advice: Disposing of your old computer - Oct. 8, 2010

SANS Security Information Service - Wed, 02/09/2011 - 19:32
Your computer has finally reached the end of its life. It could be broken or just obsolete. You want to recycle it or give it awa...
Categories: IT General, Security

Alert: Caring for Your Family's Computers - Oct. 6, 2010

SANS Security Information Service - Wed, 02/09/2011 - 19:32
Family members often share computers, and it's not unusual to find both desktop systems and laptops in the home. The informat...
Categories: IT General, Security

Alert: "Here you Have" Email Virus - Sep. 10, 2010

SANS Security Information Service - Wed, 02/09/2011 - 19:32
An email virus that hijacks your contact list is spreading rapidly via the Internet. The messages have the subject line, "Her...
Categories: IT General, Security

Alert: SIS Alert: Apple Releases iPhone Updates to Quell "JailbreakMe" Security Exploit - Aug. 12, 2010

SANS Security Information Service - Wed, 02/09/2011 - 19:32
Apple released updates yesterday for the iOS on the iPhone, iPad, and iPod Touch to patch flaws that were exploited by the Jailbre...
Categories: IT General, Security

Alert: Multiple Vulnerabilities in Mac OS X - Jun. 16, 2010

SANS Security Information Service - Wed, 02/09/2011 - 19:32
Apple released today an advisory for multiple vulnerabilities discovered in Mac OS X, version 10.6.3 and earlier....
Categories: IT General, Security
Syndicate content

eXTReMe Tracker