Late last week the number of objects stored in Amazon S3 reached one trillion (1,000,000,000,000 or 1012). That's 142 objects for every person on Planet Earth or 3.3 objects for every star in our Galaxy. If you could count one object per second it would take you 31,710 years to count them all. Read more here - http://aws.typepad.com/aws/2012/06/amazon-s3-the-first-trillion-objects.html?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+AmazonWebServicesBlog+%28Amazon+Web+Services+Blog%29
Half of Europe's workforce is too tech-challenged to fill all the extra ICT jobs that will be knocking around in the next few years, according to the European Commission (EC). The EC's Digital Agenda crew released its scoreboard of how well the continent is doing. The overall aim of the EC Digital Agenda is to deliver sustainable economic and social benefits from a digital single market based on fast and ultra-fast internet and interoperable applications. The European Commission is worried about the lack of funds available to R&D in Europe when compared to the US, and the overall under-investment in IT technologies. Read more here - http://www.theregister.co.uk/2012/06/18/digital_agenda_scoreboard/
Check out this free tool provided by Microsoft which was released to fix an inconsistency in the Windows servicing store which may prevent the successful installation of future updates, service packs, and software. This tool checks your computer for such inconsistencies and tries to resolve issues if found. This tool is for Windows Vista, Windows Server 2008, Windows Server 2008 R2, and Windows 7. Read more here - http://support.microsoft.com/kb/947821
If I was to perform an IT audit of an organization and I find that all privileged users accounts such as, administrative accounts of the various systems are all stored in a central location with adequate security, and access to such accounts' details is restricted to only authorized staff based on their role within the IT team, then I would surely expect to find an identity management product behind all this good practice! Whichever product you may use and I do recommend such products in corporate environments it is important to trust the management of the product to an individual outside of the IT department such as, an internal audit or security officer. There are various products to choose from but I would suggest looking at NetWrix's Privileged Account Manager (PAM) full product which is now available for free for unlimited users!!! Read more here - http://blog.netwrix.com/2012/04/26/full-featured-netwrix-privileged-account-manager-is-now-100-free-of-charge/
Trend Micro, the antivirus vendor has identified suspicious URLs which appear to be hosted on legitimate sources such as, Facebook and Google domains that promote a malicious file called ChromeSetup.exe. This file has nothing to do with Google's Chrome installation but is simply an information-stealing Trojan application and is offered for download on various websites! An analysis of the file ChromeSetup.exe was carried out by Roddell Santos and Roland dela Paz, threats analysts at TrendMicro which concluded that the malicious file is a multi-component BANKER malware detected as TSPY_BANKER.EUIQ. Read more here - http://blog.trendmicro.com/info-stealer-poses-as-google-chrome-installer/