Issue highlights 1. IBM tries to forecast and control Beijing's air pollution 2. Mobile phones and other electronic devices under higher scrutiny at airports 3. Who is buying these non Moto 360 Android watches? 4. Encrypted instant messaging project seeks to obscure metadata 5. NSA may be targeting Linux users for increased surveillance 6. Ruby on Rails gets patches for SQL injection vulnerabilities 7. BOOK GIVEAWAY: App Accomplished: Strategies for App Development Success |
White Paper: iRise CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources. An IDG survey reveals the top three drivers of project failure and offers CIOs insight into how to prevent or overcome project failure. Learn more |
Using supercomputers to predict and study pollution patterns is nothing new. But IBM is hoping to design a better system tailored for Beijing that can predict air quality levels three days in advance, and even pinpoint the exact sources of the pollution down to the street level. READ MORE |
The U.S. Transportation Security Administration has said it may ask air travelers headed to the U.S. on direct flights to power up some electronic devices, including cell phones, as part of enhanced security measures at certain airports abroad. READ MORE |
At Google I/O this year presenters drew a chorus of boos when they revealed that the Moto 360 watch would not be available until some time later in 2014. They did however release two Android Wear watches from LG and Samsung instead. My question is, who in their right mind is going to buy one of these? READ MORE |
Webcast: CA Technologies A fundamental change is necessary to fix data protection. It requires the adoption of a modern architecture that has been designed to solve today's complex problems, as well as provide a highly scalable platform for the future. Learn more! |
Security researchers have a working prototype of an instant messaging application that aims to thoroughly obscure and scrub evidence that two parties have been chatting. READ MORE |
In today's open source roundup: The NSA considers Linux Journal an "extremist forum" and may be targeting Linux users for additional surveillance. Plus: Download Tor to protect your privacy and funny NSA jokes. READ MORE |
Two SQL injection vulnerabilities were patched in Ruby on Rails, a popular open-source Web development framework used by some high-profile websites. READ MORE |
Whether you're writing your own code or contracting out, you'll find hard-won guidance for your entire mobile app development life cycle. Five will win. Enter the drawing today! READ MORE |
White Paper: New Relic In this eBook you'll learn; what DevOps is, where it came from, why it was created and who's adopting it...plus a whole lot more. Learn more! |
|
No comments:
Post a Comment