Issue highlights 1. The true costs of UI development in .NET 2. Facebook users targeted by iBanking Android trojan app 3. WIN THIS BOOK: Java SE8 for Programmers, 3rd Edition 4. Windows XP's retirement turns into major security project for Chinese firm 5. LaCie warns hackers may have customer info, credit cards after year-long breach 6. Mac Pro shortage sets record as worst Mac production boondoggle 7. Teen arrested in Heartbleed attack against Canadian tax site 8. Apps that fight our distracted driving habits 9. Twitch.tv not content being the idiot box of gaming, expands to sales and funding |
| White Paper: Box Box trumps Dropbox, Engyte, Citrix ShareFile, EMC Syncplicity, and OwnCloud with rich mix of file sync, file sharing, user management, deep reporting and enterprise integration. Learn more in this article from InfoWorld. Learn more>> |
| Building a user interface heavy application in .NET is a difficult task. With the rise of tablet computing, the technique you use is more important than ever if you want your app to perform on a wide range of devices. But each technique has its trade-offs. READ MORE |
| Cybercriminals have started using a sophisticated Android Trojan app designed for e-banking fraud to target Facebook users, possibly in an attempt to bypass the two-factor authentication protection on the social network. READ MORE |
| Five will win. Enter the drawing today! READ MORE |
| Microsoft may have retired Windows XP, but one of China's leading security vendors is trying to keep the OS threat-free, and rolling out protection software to hundreds of millions of users in the nation. READ MORE |
| White Paper: Perforce Software Whether it's New York Stock Exchange or Netflix, Samsung or Salesforce.com, companies of all kinds have embraced the design practice known as Continuous Delivery--a discipline in which software can be released to production at any time. In this Best Practices eBook, discover 5 habits that set top practitioners apart. Learn more >> |
| For almost an entire year, malicious attackers may have been harvesting customer information including credit card data. READ MORE |
| Apple's inability to meet demand for its Mac Pro desktop computer has surpassed that of its most egregious Mac production problem in memory, the debacle over the all-in-one iMac of late 2012 and early 2013. READ MORE |
| Canadian police have arrested a 19-year-old man for allegedly using the Heartbleed bug to steal data about taxpayers. READ MORE |
| Here are some of the apps and tools I would recommend trying out if you want to try making your phone conscious of your driving. READ MORE |
| Streaming your games for others to watch on Twitch is a big fad these days, but it looks like the company is taking the first tentative steps towards branching into other areas. READ MORE |
| White Paper: CA Technologies When it comes to data protection, having multiple point solutions is not the answer. Find out how to gain a holistic view of your IT infrastructure, with an emphasis on business needs and IT/data risk and recovery, that will inform your choice for a comprehensive, cost-effective data protection solution. Read now! |
| BOOK GIVEAWAY: We've got 5 copies of each of these new books to give to some lucky ITworld readers. Enter today for your chance to win!
Quality Code: Software Testing Principles, Practices, and Patterns Using real-world code examples, Stephen Vance introduces patterns, principles, and more than two dozen detailed techniques for testing any software system more fully, effectively, and painlessly.
Java SE8 for Programmers, 3rd Edition Hundreds of complete Java programs with thousands of lines of proven Java code, and hundreds of tips will help you build robust applications. DON'T MISS... 16 terrible computer pranks that could get you fired Your new PC needs these 22 free programs 8 books every IT leader should read this year
A method to the madness: How 13 programming languages got their names IT Salary Survey, 2014: How IT pros really feel about their pay, stress, and career prospects | |
No comments:
Post a Comment