Search This Blog

Tuesday, April 01, 2014

The best tech-related April Fool's pranks of 2014

April Fool's Day 2014 fake video roundup

Grading Google's April Fools' Day

ITworld Tonight
April 01, 2014
Share this email

The best tech-related April Fool's pranks of 2014

What is April Fool's without a few online pranks? Here are some of the companies having a little fun today.

READ MORE
 

Issue highlights

1. April Fool's Day 2014 fake video roundup

2. Grading Google's April Fools' Day

3. 5 things we love about Fedora 20 (and 5 things we hate)

4. In space, nobody can hear you poop

5. Mozilla steps up damage control as pressure for CEO Eich's ouster mounts

6. The Hobbit as a 16-bit video game

7. The (mostly) cool history of the IBM mainframe

8. Google trumpets extra encryption for Gmail, but stays mum on other apps

9. Hacked passwords can enable remote unlocking, tracking of Tesla cars

April Fool's Day 2014 fake video roundup

Ha ha ha! Oh, my sides. Yep, time for "funny" videos on April Fool's Day. READ MORE

Grading Google's April Fools' Day

Because it's not funny unless it's verified as funny. READ MORE

5 things we love about Fedora 20 (and 5 things we hate)

The latest release of Fedora, nicknamed "Heisenbug," is a step towards making Fedora a player in the mobile arena. READ MORE

In space, nobody can hear you poop

Reason #47 why I never want to go to space. READ MORE

Mozilla steps up damage control as pressure for CEO Eich's ouster mounts

Petition calling for Brendan Eich to renounce past support for same-sex marriage ban nears 70K signatures. READ MORE

The Hobbit as a 16-bit video game

Video animation combines old-school graphics with classic book/film treatment. Oooh, and goblins and dragons too! READ MORE

The (mostly) cool history of the IBM mainframe

IBM's iconic mainframe turns 40. READ MORE

Google trumpets extra encryption for Gmail, but stays mum on other apps

Google recently trumpeted that it now encrypts Gmail messages while shuffling them among its data centers, an extra security layer aimed at thwarting government and criminal snoops, but didn't say if it applies this protection to its other applications. READ MORE

Hacked passwords can enable remote unlocking, tracking of Tesla cars

Tesla Motors accounts are protected only by simple passwords, making it easy for hackers to potentially track and unlock cars, according to a security researcher. READ MORE

BOOK GIVEAWAY:

No joke. We've got 5 copies of each of these new books to give to some lucky ITworld readers. Enter today for your chance to win!

Quality Code: Software Testing Principles, Practices, and Patterns
Using real-world code examples, Stephen Vance introduces patterns, principles, and more than two dozen detailed techniques for testing any software system more fully, effectively, and painlessly.

Java SE8 for Programmers, 3rd Edition
Hundreds of complete Java programs with thousands of lines of proven Java code, and hundreds of tips will help you build robust applications.

DON'T MISS...

20 tech brand names you're saying wrong

10 Eclipse projects that have made waves in IT

Your new PC needs these 22 free programs

10 Chrome tab tricks

The clock in the mountain: 10 curious side projects of tech's rich and famous

Follow ITworld

Share this email

You are currently subscribed to itworld_today as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments: