
Tech News Flash: Wednesday -- September 3, 2014
TechNewsWorld -- All Tech - All The Timehttp://www.TechNewsWorld.com
Part of the ECT News Network
![]() | ![]() | ![]() | ![]() | ![]() |
Headline Scan
Admins Grapple With Shadow Tech
Victimized Celebs Blamed for Their Indecent Exposure
Fanning the Flames of the Systemd Inferno
What Lies Beneath Social Media Users' Self-Censoring Ways
Leap Motion Gets Your Hands in the Game
Digital Clone: You Won't Be Able to Live Without One
Peach OSI Is Fresh and Juicy
Message From Our Sponsor
Get access to millions of new customers in minutes.
Zero hassle PayPal integration from Braintree. Learn more:
http://www.ectnews.com/adsys/link/?crid=8931/Braintree
News Alerts From ECT News Network
Get the day's top business and technology news delivered
to your inbox as stories break. Sign up today -- it's free!
http://www.ectnews.com/adsys/link/?crid=2202/News_Alerts
INSTA-LEADS from ECT News Network
Access 30 million B2B purchasing decision makers. Learn more:
http://www.ectnews.com/adsys/link/?crid=8734/INSTA-LEADS
Today's Story Highlights
Admins Grapple With Shadow Tech

conversation. "Shadow IT" is a term applied to technology deployed by an
organization's users outside the purview of the IT department. It's
bothersome to system shepherds because it can open up an organization to
data leakages. It's also growing. Many Shadow IT programs run in the
cloud, but all clouds are not created equal.
http://www.technewsworld.com/story/80981.html
Victimized Celebs Blamed for Their Indecent Exposure

than 100 celebrities' photos in various stages of dishabille on a highly
targeted hack attack to gain access to their usernames, passwords and
answers to security questions. None of the cases investigated resulted
from any breach in the company's systems, including iCloud or Find my
iPhone, Apple maintained.
http://www.technewsworld.com/story/80978.html
Fanning the Flames of the Systemd Inferno

be said of the Linux blogs. Case in point: Just as the world at large is
filled today with fiery strife -- Gaza, Ukraine, Syria, Ferguson -- so,
too, is the Linux blogosphere. Of course, it's not political, social or
racial struggles tearing the FOSS community apart. Rather, the dividing
issue here is none other than Systemd.
http://www.technewsworld.com/story/80980.html
What Lies Beneath Social Media Users' Self-Censoring Ways

revelations about the NSA's surveillance activities in social media, the
Pew Center Internet Project reported last week. Only 42 percent of the
1,800 adults interviewed by the center were willing to post their views
on the topic on their Facebook and Twitter accounts, although 82 percent
were willing to discuss it face to face.
http://www.technewsworld.com/story/80966.html
Leap Motion Gets Your Hands in the Game

mount for Oculus Rift and a new API that together will take the VR game
to new heights. The API feeds raw infrared imagery straight from Leap's
sensors to the controller on the headset, giving users a real time view
of the environment. The API expands the tracking space to any direction
the user is facing.
http://www.technewsworld.com/story/80960.html
Digital Clone: You Won't Be Able to Live Without One

Rothblatt -- apparently she is America's top paid female CEO -- its
title is Virtually Human: The Promise -- and the Peril -- of Digital
Immortality . The subject is digital clones, and Rothblatt goes into
depth about what they are, when they are coming, and the likelihood they
eventually will have equal human rights.
http://www.technewsworld.com/story/80971.html
Peach OSI Is Fresh and Juicy

first stable version was just released in June -- yet it displays more
performance traits and sophistication than many Linux distros that have
been searching for an audience for years. In the crowded Linux distro
field, it is very rare to find a newcomer that is not like any of the
others.
http://www.technewsworld.com/story/80965.html
How to Advertise in This Newsletter
To advertise in this newsletter or elsewhere on ECT News Network,
please call our sales department toll-free at (877) 328-5500, or view
our online media kit at
http://www.ectnews.com/advertising/
Subscribing and Unsubscribing
You are receiving the Tech News Flash in response to your request
on the TechNewsWorld Web site for our daily newsletter. If you wish
to make changes to your newsletter subscription, or if you wish to
receive other free newsletters from the ECT News Network, please click
here:
Newsletter Management Wizard
If this e-mail was forwarded to you and you wish to subscribe to
this FREE newsletter, please use our newsletter sign-up wizard:
http://www.ectnews.com/perl/newsletter_registration.pl/
Feedback
We welcome your feedback. Contact us online at
http://www.ectnews.com/perl/contact_form.pl?to=editorial
Copyright 2014 ECT News Network, Inc. All Rights Reserved.
ECT News Network, Inc.
16133 Ventura Blvd., Suite 700
Encino, CA 91436

No comments:
Post a Comment