Yahoo let the NSA read your email before you even opened it.

Yahoo! involved in unprecedented privacy violation #security

Posted · Add Comment

Website, Fight for the Future is directing people to delete their Yahoo! accounts after it was found that the company had been redirecting all personal emails to the NSA for analysis. “This is an absolutely unprecedented privacy violation. Surveillance experts and former government officials are saying they have never seen such a broad demand for […]

Microsoft System Center Configuration Manager 2012 R2

Deploying Windows through Microsoft SCCM #it #management #deployment

Posted · Add Comment

Niall C. Brady has a great site called windows-noob.com with tons of great Microsoft deployment tutorials. Now don’t let the name windows-noob.com fool you as there’s some very complex topics covered. Here’s some I’ve been referring to lately. How to deploy Windows 10 Enterprise using System Center 2012 R2 Configuration Manager. Niall discusses creating and […]

With Windows 10, there are two release types: feature updates that add new functionality two to three times per year, and quality updates that provide security and reliability fixes at least once a month.

Microsoft introduces Windows as a Service #waas #tech #it #management

Posted · Add Comment

J. Decker at Microsoft Windows IT Center recently posted an article explaining the streamlined IT management of Windows 10 workstations and the concept of Windows as a Service. Some of the changes include: new features will be delivered to the Windows Insider community as soon as possible — during the development cycle, through a process […]

Multiple Vulnerabilities in Cisco ASA Software

The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations #US-CERT bulletin

Posted · Add Comment

The US Computer Emergency Readiness Team (US-CERT) has released a bulletin with warnings for Network Infrastructure teams related to Cisco ASA devices. These network devices provide firewall and Virtual Private Network (VPN) functionality and are often deployed at the edge of a network to protect a site’s network infrastructure, and to give remote users access to protected local […]

Next Big Tech Corridor? Between Seattle and Vancouver, Planners Hope

Leaders in #Vancouver and #Seattle talk about a #tech corridor between the two cities

Posted · Add Comment

There’s plans in the works to create a tech corridor between Seattle and Vancouver. A report from the New York Times found ideas being thrown around for a dedicated lane for self-driving vehicles. “A group of Seattle techies proposed … a dedicated lane for autonomous vehicles on Interstate 5, the highway connecting Seattle to the Canadian border. […]

 
 
DMS