Search This Blog

Monday, July 07, 2014

14 of the world’s best living programmers

IBM tries to forecast and control Beijing's air pollution

Mobile phones and other electronic devices under higher scrutiny at airports

ITworld Today
July 07, 2014
Share this email

Superclass: 14 of the world's best living programmers

When developers discuss who the world's top programmer is, these names tend to come up a lot.

READ MORE
 

Issue highlights

1. IBM tries to forecast and control Beijing's air pollution

2. Mobile phones and other electronic devices under higher scrutiny at airports

3. Who is buying these non Moto 360 Android watches?

4. Encrypted instant messaging project seeks to obscure metadata

5. NSA may be targeting Linux users for increased surveillance

6. Ruby on Rails gets patches for SQL injection vulnerabilities

7. BOOK GIVEAWAY: App Accomplished: Strategies for App Development Success

White Paper: iRise

Why Projects Fail

CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources. An IDG survey reveals the top three drivers of project failure and offers CIOs insight into how to prevent or overcome project failure. Learn more

IBM tries to forecast and control Beijing's air pollution

Using supercomputers to predict and study pollution patterns is nothing new. But IBM is hoping to design a better system tailored for Beijing that can predict air quality levels three days in advance, and even pinpoint the exact sources of the pollution down to the street level. READ MORE

Mobile phones and other electronic devices under higher scrutiny at airports

The U.S. Transportation Security Administration has said it may ask air travelers headed to the U.S. on direct flights to power up some electronic devices, including cell phones, as part of enhanced security measures at certain airports abroad. READ MORE

Who is buying these non Moto 360 Android watches?

At Google I/O this year presenters drew a chorus of boos when they revealed that the Moto 360 watch would not be available until some time later in 2014. They did however release two Android Wear watches from LG and Samsung instead. My question is, who in their right mind is going to buy one of these? READ MORE

Webcast: CA Technologies

The End of Data Protection As We Know It.

A fundamental change is necessary to fix data protection. It requires the adoption of a modern architecture that has been designed to solve today's complex problems, as well as provide a highly scalable platform for the future. Learn more!

Encrypted instant messaging project seeks to obscure metadata

Security researchers have a working prototype of an instant messaging application that aims to thoroughly obscure and scrub evidence that two parties have been chatting. READ MORE

NSA may be targeting Linux users for increased surveillance

In today's open source roundup: The NSA considers Linux Journal an "extremist forum" and may be targeting Linux users for additional surveillance. Plus: Download Tor to protect your privacy and funny NSA jokes. READ MORE

Ruby on Rails gets patches for SQL injection vulnerabilities

Two SQL injection vulnerabilities were patched in Ruby on Rails, a popular open-source Web development framework used by some high-profile websites. READ MORE

BOOK GIVEAWAY: App Accomplished: Strategies for App Development Success

Whether you're writing your own code or contracting out, you'll find hard-won guidance for your entire mobile app development life cycle. Five will win. Enter the drawing today! READ MORE

White Paper: New Relic

Navigating DevOps: Learn What It Is and Why It Matters

In this eBook you'll learn; what DevOps is, where it came from, why it was created and who's adopting it...plus a whole lot more. Learn more!

GIVEAWAYS:

July's giveaways are here. Enter now for your chance to win!

App Accomplished: Strategies for App Development Success
Whether you're writing your own code or contracting out, you'll find hard-won guidance for your entire mobile app development life cycle. Five will win. Enter now!

SQL Queries for Mere Mortals: A Hands-On Guide to Data Manipulation in SQL
The clearest, simplest tutorial on writing effective SQL queries. Five will win. Enter now!

DON'T MISS...

Ringing a bell: 11 common phrases and terms that came from obsolete technology

IT salaries for the 20 hottest tech skills

Quick Look: Ubuntu GNOME 14.04

Haunting photos of a village built to handle electronic waste

Willkommen software engineers! 10 countries that pay you what you're worth

Follow ITworld

Share this email

You are currently subscribed to itworld_today as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments: