- Behind the scenes: Security operations at the Little League World Series
- Linux Foundation's security checklist can help sysadmins harden workstations
- Centrify survey finds unmanaged Apple devices a corporate liability
- Qualcomm's Snapdragon 820 processor gets technology to secure Android phones
- The week in security: The end of Flash ads; Bounty offered as Ashley Madison fallout continues
George Washington University - News, Features, and Slideshows
The U.S. government <a href="https://www.whitehouse.gov/the-press-office/2015/04/03/fact-sheet-administration-announces-actions-drive-growth-solar-energy-an">has announced</a> plans to help train 75,000 people to enter the solar workforce by 2020, including a number of veterans.
Northwestern University has named <a href="https://www-03.ibm.com/press/us/en/biography/10069.wss">IBM Chairman and CEO Virginia Rometty</a> as its commencement speaker for ceremonies taking place on Friday, June 19 at Ryan Field in Evanston, Ill.
Apple over the next year or so is expected to surpass Walmart as the largest corporate user of solar power.
Energy utilities face losing between $18 billion and $48 billion a year in the U.S and up to €61 billion a year in Europe by 2025 as solar power and energy conservation initiatives grow, <a href="http://www.accenture.com/microsite/digitally-enabled-grid/Documents/pdf/exec-summary-DEGII-8-pager-Dec-2014-Final.pdf">according to Accenture</a>.
Sen. Dianne Feinstein's (D-Calif.) claim that the CIA violated provisions of the Computer Fraud and Abuse Act when it accessed computers used by members of the Senate Intelligence Committee, could be hard to substantiate, according to a leading legal expert.