Issue highlights 1. Apple offers free recycling of its products worldwide 2. Former GitHub CEO quits after harassment investigation 3. NEC launches face-recognition protection for PCs 4. Google Hangouts for Android merges conversations 5. NEC launches face-recognition protection for PCs 6. With "Baidu Inside," the Chinese firm takes aim at hardware market 7. Web apps and point-of-sale were leading hacker targets in 2013, says Verizon 8. History's 15 most popular computer scientists |
| White Paper: Intigua Discover how virtualizing the management layer, by de-coupling agents from the underlying server infrastructure, eliminates the need to install physical agents on servers and makes ongoing management tasks such as provisioning and updating agents as simple as copying a single "virtual agent" file to all required servers. Read more. Learn More |
| Apple is offering to recycle its products for free worldwide, and has included even third-party products like mobile phones and PCs in the program in some countries. READ MORE |
| Former GitHub CEO Tom Preston-Werner has resigned from the company following an investigation into claims of harassment. READ MORE |
| NEC has launched a biometric security program that uses face recognition to unlock access to PCs. READ MORE |
| The new Android version of Google communication tool Hangouts will allow users to merge SMS and Hangout conversations. READ MORE |
| White Paper: Perforce Software Whether it's New York Stock Exchange or Netflix, Samsung or Salesforce.com, companies of all kinds have embraced the design practice known as Continuous Delivery--a discipline in which software can be released to production at any time. In this Best Practices eBook, discover 5 habits that set top practitioners apart. Learn more >> |
| NEC has launched a biometric security program that uses face recognition to unlock access to PCs. READ MORE |
| Printers, air quality monitors, and weighing scales aren't exactly in the realm of Baidu, China's largest search engine. But that's starting to change under a new company initiative that seeks to bring Baidu technology to smart devices, including household appliances. READ MORE |
| Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report on data breach investigations. READ MORE |
| The MIT Media Lab uses Wikipedia data to rank which computer scientists have made the biggest impressions globally over time READ MORE |
| White Paper: Dell Inc. Improvements in 10GbE technology, lower pricing, and improved performance make 10GbE for the mid-market a viable and cost-effective strategy. This white paper discusses a multitude of reasons why moving to a 10GbE infrastructure today makes sense. View Now |
| BOOK GIVEAWAY: We've got 5 copies of each of these new books to give to some lucky ITworld readers. Enter today for your chance to win!
Quality Code: Software Testing Principles, Practices, and Patterns Using real-world code examples, Stephen Vance introduces patterns, principles, and more than two dozen detailed techniques for testing any software system more fully, effectively, and painlessly.
Java SE8 for Programmers, 3rd Edition Hundreds of complete Java programs with thousands of lines of proven Java code, and hundreds of tips will help you build robust applications. DON'T MISS... 16 terrible computer pranks that could get you fired Your new PC needs these 22 free programs 8 books every IT leader should read this year
A method to the madness: How 13 programming languages got their names IT Salary Survey, 2014: How IT pros really feel about their pay, stress, and career prospects | |
No comments:
Post a Comment