Disaster-proof Your Critical Business Data

Experts identify 12 important steps How do you ensure your critical data will be safe should disaster strike? CIO magazine asked dozens of data storage, data management, and disaster-recovery experts for their suggestions for disaster-proofing data and applications. Here are their top tips: Conduct a data assessment: Use the 80/20 rule to identify and protect […]

Citrix XenApp certification: The skills that truly deliver

Citrix XenApp is an on-demand application delivery solution that enables any Windows application to be virtualized, centralized, and managed in a datacenter, and delivered as a service to any user, anywhere, on any device. Application management has become a big issue for organizations across the globe, as, when executed properly, can reduce IT costs by […]

CIOs Reluctant to Hire, Eager to Contract

First the good news: companies are increasing their budgets for hiring skilled IT contractors. The bad news? Hiring for full-time positions is sluggish. An article by Sharon Florentine on cio.com cites the latest data from the Bureau of Labor Statistics showing that only 77,600 IT jobs were added over the last 12 months.  CIOs and […]

Hackers Probe HTTPS Weaknesses

In a guest essay on usatoday.com, Rohit Sethi, vice president at Security Compass, argues that threats to online security are outpacing the development of cryptographic systems that make a secure Internet possible. HTTPS, the protocol for secure network communications, is especially at risk, he says. “HTTPS is vulnerable to attack, and we can expect the […]

Experimental Malware Travels by Sound

Network security doesn’t get more secure than an air gap. But two German researchers have demonstrated how microphones and speakers built into laptops can be used to covertly transmit and receive data between physically isolated computers through low-frequency audio signals. As Lucian Constantin reports on computerworld.com, Michael Hanspach and Michael Goetz of the Fraunhofer Institute […]

McAfee’s Private Network Idea: Cool, but Unoriginal

High-profile antivirus software creator John McAfee has an ingenious idea for evading National Security Agency snooping. It’s a device called the D-Central — essentially a $100 router for building small, disconnected private networks that act as pockets of sharing access that are not connected to the broader worldwide web. The problem is, according to Darrell […]

Bluetooth Coming to MLB Ballparks

Mobile technologies have revolutionized the ways today’s sports fan can experience live sporting events – most notably through live streaming, which allows fans to watch games in real time on their mobile devices. Soon, mobile devices will transform the fan experience at the live event as well, through Bluetooth-enabled in-venue positioning. In an article on […]

Hacker Watch: Seven Sneaky Tricks

Treachery is alive and well in the digital world. In an article on Networkworld.com, a security researcher identifies seven of the most pernicious techniques used by hackers today. They include: Fake wireless access points: Clever because it is so simple. With a bit of software and a wireless network card, a hacker can pose as […]

Free iPad Mini with CompTIA Training

When you enroll in Unitek Education’s CompTIA  A+ Network+ and Security+ Certification Boot Camp before September 30th, 2013, you score a free iPad Mini. It’s a win-win situation: get ahead of the curve by mastering the updated curriculum now; and score a free iPad Mini as a bonus! CompTIA Security+ Training has just been updated […]

Free Microsoft Surface RT with Microsoft, Citrix Training

Enjoy the unparalleled training of Unitek Education, and leave the course with something special (besides the awesome memories) – a FREE Microsoft Surface RT or $500 Amazon Gift Card!   Unitek Education is offering a Free Microsoft Surface RT with enrollment in select Microsoft training and Citrix training courses: SQL Server 2012 Boot Camp MCSA […]