Today's InfoWorld Headlines: Wrap Up | | Build 10074 is widely believed to be the version of Windows 10 that will be distributed at the Build conference | | Issue highlights 1. Puppet Enterprise 3.8 adds Docker, AWS management support 2. Bill to rein in NSA phone data collection reintroduced 3. Open source threatens to eat the database market | White Paper: MoreDirect In this highly competitive environment, retailers need to open up new ways of doing business . This paper shows how an end-to-end solution can help streamline business and increase customer retention and employee productivity. Learn More | Configuration-management and orchestration tool Puppet remains a mainstay in IT shops, thanks to its versatility and the vast improvements in performance and functionality that it's rolled out as of late. The latest edition of Puppet's commercial product, Puppet Enterprise 3.8, adds support for other key technologies -- containers and cloud environments -- that have also become enterprise standbys. READ MORE | Webcast: CDW The security threat landscape continues to evolve quickly. Hacking has become an industry, new attack surfaces emerge, and the one silver bullet to fix everything just doesn't exist. How can you ensure you are covering the entire attack continuum when developing a security strategy? CDW can help. Learn More | A bipartisan group of U.S. lawmakers has reintroduced legislation aimed at ending the National Security Agency's bulk collection of telephone records across the country.Four senior members of the House of Representatives Judiciary Committee planned to reintroduce the USA Freedom Act late Tuesday. The House passed a watered-down version of similar legislation in last May, but the Senate failed to act on it before November's elections. READ MORE | Today's open source databases comprise a fraction of the paid database market, yet now constitute as much as a quarter of all database usage. The database market, in short, is ripe for open source cannibalization. READ MORE | White Paper: Alert Logic This white paper offers a comprehensive look at how to evaluate security solutions developed specifically for the cloud, and why organizations cannot rely on traditional approaches to secure their cloud infrastructure. Learn More. | Join the IDG Contributor Network The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today. | | | | | |