<b>Enterprise Mobile Today:</b> "The tech press and blogosphere are gushing about the new dual 3G/4G smartphone, and some writers attending the wireless conference even got a few brief minutes to test it out, so we save you the surfing and provide the highlights of the debut."
<b>Tech Source: </b>"If you happen to own a business and are looking for CRM applications, I have here a list of some of the most well-known free and open-source customer relationship management (CRM) software available today."
<b>IT World:</b> "When Canonical announced its Ubuntu Light platform for netbooks and platforms Monday morning, a lot of fuss was made about the new Unity interface, the capability of Ubuntu Light to act as an instant-on environment for users of these devices who just want to surf, and the general coolness of the plan."
<b>Zona-M:</b> "When you start doing it though, you soon find out that the hardest, or at least lest documented task, is not how to send email, or how to block spam. It is how to make sure that the email you send is always accepted by other sites, that is how to find out if your email server looks like a spam source."
Red Hat's community Linux has undergone a major development change, with the bleeding edge Rawhide splitting off to become its own branch. A look at what this means, and why it matters.
<b>Packt:</b> "While Vim itself is inherently a powerful editor, personalizing it to suit your needs can be a daunting task. However, it is possible to do so with this book."
<b>Handle With Linux:</b> "Some manufacturers are using Linux for their television sets, Sony for instance has a impressive list of tv's which are running Linux."
Microsoft Access Small Business Solutions, published by Wiley, proves that Microsoft Access can be used to create valuable business solutions in theory and in practice by providing both the reasoning for the database design and the databases themselves in the CD that accompanies the book.
Insiders -- the people who already have access to your network -- can do a lot more damage than a hacker who's still outside the firewall. Learn ways to minimize your risk from the insider threat.
Insiders -- the people who already have access to your network -- can do a lot more damage than a hacker who's still outside the firewall. Learn ways to minimize your risk from the insider threat.
<b>The VAR Guy:</b> "It's one small step for Dell, and one big strategic win for Canonical's Ubuntu Linux cloud strategy. Specifically, Dell on March 24 said it would support Ubuntu Enterprise Cloud (UEC) as an infrastructure solution."
Moving from self-hosted to cloud-hosted e-mail services makes a lot of people nervous, but with a little planning and good communication with your user base, there's no reason it has to be hard.
<b>Cyber Cynic:</b> "As everyone knows by now who follows technology news, the Financial Times reported that Google "is phasing out the internal use of Microsoft's ubiquitous Windows operating system because of security concerns." Some doubt this story, because they say that's its vague about sources"