May 12th: Women Who Tech TeleSummit
ROSE Blog: Rikki's Open Source Exchange
Feminine Mystique - 11AM EDT
Women and Open Source - 11AM EDT
Breaking Through the Digital Ceiling - 12PM EDT
Tech Marketing in a Recession - 12PM EDT
Social Networks and Diversity Barriers - 1PM EDT
Tools Galore in Online Communications -1PM EDT
Innovation and Tech Career Reinvention - 3PM EDT
Launching Your Own Startup - 3PM EDT
What Shirky Didn't Tell Us - 4PM EDT
Video Activism - 4PM EDT
Transparency and Government 2.0 - 5PM EDT
Social Media ROI - 5PM EDT
Check out the 2008 TeleSummit podcasts: http://www.womenwhotech.com/podcasts
Happy TeleSummitting!comments powered by Disqus
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.