Issue highlights 1. Fire at Samsung facility affects website, media portal 2. Google's smart contact lenses could aid the visually impaired 3. Activists want net neutrality, NSA spying debated at Brazil Internet conference 4. Most but not all sites have fixed Heartbleed flaw 5. Even the most secure cloud storage may not be so secure, study finds 6. Thornton May: Your privacy map is probably wrong 7. What Google is getting out of Ingress 8. Steve Jobs' character becomes issue in Silicon Valley no-hiring case |
| White Paper: HootSuite Media, Inc. With social media taking an increasingly important role in business, CIOs have an opportunity before them: Demonstrate their ability to evolve by facilitating the adoption of social media in a secure, compliant manner. Learn More |
| A fire at a Samsung facility in South Korea on Sunday resulted in a temporary outage that shut down its website and caused the company's Smart TV products to report error messages. READ MORE |
| In today's accessible technology roundup: Google wants to embed cameras in contact lenses, Apple gets a patent for a new GUI for touch devices to improve accessibility and a hacker develops a virtual cane for the blind READ MORE |
| A campaign on the Internet is objecting to the exclusion of issues like net neutrality, the cyberweapons arms race and surveillance by the U.S. National Security Agency from the discussion paper of an Internet governance conference this week in Sao Paulo, Brazil. READ MORE |
| The world's top 1,000 websites have been patched to protect their servers against the "Heartbleed" exploit, but up to 2% of the top million were still vulnerable as of last week. READ MORE |
| White Paper: Hitachi Today's enterprises face a wide range of flash storage options that offer clear benefits over traditional storage systems for many use cases. Hitachi developed this guide to compare available benefits and identify the solution that best meets current and future storage requirements. Read now! |
| Some cloud storage providers who hope to be on the leading edge of cloud security adopt a "zero-knowledge" policy in which vendors say it is impossible for customer data to be snooped on. But a recent study by computer scientists at Johns Hopkins University is questioning just how secure those zero knowledge tactics are. READ MORE |
| The privacy maps being created today are primarily designed to avoid lawsuits. READ MORE |
| Official answer 1: Nothing! Official answer 2: Geo-map games! People's answers: more than you can imagine. READ MORE |
| Tech workers suing over an alleged no-poaching agreement among Silicon Valley firms are fighting an attempt by defendants to ban evidence that might portray Steve Jobs as a bad guy. READ MORE |
| White Paper: ClickSoftware This Report will provide you: - Research, analysis and interpretation of the field service market - A visual representation of the 2013 marketplace - Strengths and cautions for all vendors - Technology-related insights and evaluation criteria Learn More |
| BOOK GIVEAWAY: We've got 5 copies of each of these new books to give to some lucky ITworld readers. Enter today for your chance to win!
Quality Code: Software Testing Principles, Practices, and Patterns Using real-world code examples, Stephen Vance introduces patterns, principles, and more than two dozen detailed techniques for testing any software system more fully, effectively, and painlessly.
Java SE8 for Programmers, 3rd Edition Hundreds of complete Java programs with thousands of lines of proven Java code, and hundreds of tips will help you build robust applications. DON'T MISS... 16 terrible computer pranks that could get you fired Your new PC needs these 22 free programs 8 books every IT leader should read this year
A method to the madness: How 13 programming languages got their names IT Salary Survey, 2014: How IT pros really feel about their pay, stress, and career prospects | |
No comments:
Post a Comment