High-tech

High-tech
Light

Thursday, November 20, 2014

Why I'm not deleting my Uber app

---------- Forwarded message ----------
From: "Network World After Dark" <nww_newsletters@newsletters.networkworld.com>
Date: Nov 20, 2014 9:01 PM
Subject: Why I'm not deleting my Uber app
To: <aquarianm@gmail.com>
Cc:

  20-plus eye-popping Black Friday 2014 tech deals | As Moore's Law approaches 50, Intel battling to keep up

 
  Network World After Dark  

Why I'm not deleting my Uber app
The big trend in tech blogging this week is deleting the Uber mobile app and then blogging about it. Look around and you'll find dozens of bloggers declaring that they've joined the boycott, or finding some other way to capitalize on the company's ongoing PR disaster. Read More
 


WEBCAST: BMC Software

Increase Your Data Center IQ
Discover how to improve network efficiency, lower IT costs and more proactively manage your physical, virtual and cloud environments. Join BMC Software and partners, Entuity and Sentry Software, to learn how to build data center success with a comprehensive performance monitoring solution. Learn More

: Brother International Corp.
 
Virtual Training Programs for Remote Sales Agents
Vehicle Protection Plus can train their sales agents, and get them productive, regardless of location using OmniJoin web conferencing. Find out how. Learn More>>

20-plus eye-popping Black Friday 2014 tech deals
  iPhone 6, iPad Air, Samsung Galaxy gear and big cheap TVs among the hottest electronic deals for Black Friday and Cyber Monday in 2014. Read More
 

As Moore's Law approaches 50, Intel battling to keep up
With advances in chip technology, it's becoming more difficult for Intel to keep up with Moore's Law, but the company's CEO says that remains the key baseline when it comes to adding performance and functionality to its processors."Our job at Intel is to make sure it lives on as long as possible," Brian Krzanich said during a keynote at the Intel investor meeting in Santa Clara, California, Thursday.Next year marks the 50th year anniversary of Moore's Law, and Intel is planning to mark the event, Krzanich said.Moore's Law is based on an observation by Gordon Moore, who co-founded Intel in 1968, that the number of transistors that can be placed on silicon will double every two years, making it possible to improve chip performance and add new functionality. Intel has used Moore's Law, which was offered in a 1965 paper, as a baseline to pack more transistors onto chips, and reduce their size and cost.To read this article in full or to leave a comment, please click here Read More
 

Parrot's Bebop drone flies onto shelves December 1
Parrot's Bebop drone flies onto shelves December 1 The lightweight drone that can shoot incredibly stable video will cost $500. From: Network World Views: 0 0 ratings Time: 01:22 More in Science & Technology Read More
 

Doxxing defense: Remove your personal info from data brokers
Many women gamers and developers, as well as those who support them, have lately come under attack from online trolls. A common intimidation tactic that trolls use is "doxxing," or publicly exposing their targets' personal details, including home address, phone number and even financial records.To read this article in full or to leave a comment, please click here Read More
 

15 can't-miss products at DEMO Fall 2014
Startups flock to DEMO with stand-out products. Read More
 

Black Friday: Microsoft slashing Surface, laptop, Xbox prices
Microsoft Microsoft has revealed a slew of Black Friday deals, including big cuts intended to move its iPad rival, the Surface Pro 3 tablet.Microsoft's 2014 Black Friday deals technically start to phase in on Monday, Nov. 24, with the rest in effect by Thanksgiving Day.MORE: 20+ Eye-Popping Black Friday 2014 Tech DealsTo read this article in full or to leave a comment, please click here Read More
 

DEMO Fall 2014: LikeAGlove Smart Garments
DEMO Fall 2014: LikeAGlove Smart Garments Interview with the team from LikeAGlove about their smart garments, which measure your shape to help you find the perfect fit when shopping online. From: Network World Views: 0 0 ratings Time: 02:05 More in Science & Technology Read More
 

4 ways your competitors are stealing your IT talent
One of the best places for your competitors to find great talent is within the walls of your company. If your best and brightest have been jumping ship to work for your biggest rival, it's important to know how they're being recruited, why they are being targeted and what you can do to stop it. Here's how your competitors may be poaching your talent.They're Using Professional Search Tactics Savvy companies know that the best talent is often already employed - with their competitors. Hiring a professional search firm -- or if that's not financially feasible, copying their subtle approach -- can lure away even the most content employees. As this Inc. Magazine article points out, targeting successful talent and then making contact via social networks like Facebook or LinkedIn, or at professional networking events, conferences or industry events with the promise of a "great opportunity" can pique their interest and entice them to consider a move.To read this article in full or to leave a comment, please click here Read More
 

Citadel malware now targets password management applications
Attackers have started using the Citadel Trojan program to steal master passwords for password management applications and other authentication programs.The Citadel malware has typically been used to steal online banking credentials and other financial information by modifying banking sites on the fly when opened by users in their local browsers. The technique is known as a man-in-the-browser attack.However, earlier this year, security researchers from Trusteer, a subsidiary of IBM, reported that Citadel also was being used in targeted attacks against petrochemical companies.To read this article in full or to leave a comment, please click here Read More
 

7 commonly overlooked ways to tighten cybersecurity
It's OK to be paranoid about every last detail when it comes to security. Read More
 

SDN groups respond to Cisco's "game over"
A couple of organizations are taking issues with Cisco CEO John Chambers' claims that it's "game over" for SDN and that Cisco has won the SDN battle with its Application Centric Infrastructure. The Open Networking Foundation, which is encouraging standardization of the classical SDN model of decoupled control and data planes facilitated by the OpenFlow protocol, has butt heads with ONF member Cisco before.To read this article in full or to leave a comment, please click here Read More
 

Mozilla tells Google, it's not you (anymore), it's Yahoo
Mozilla on Wednesday announced that it had not renewed its lucrative contract with Google, but instead will use Yahoo as Firefox's default search engine in the U.S.And rather than have a global designated search partner -- as it has had with Google in nearly all markets for a decade -- Mozilla will instead strike country-by-country deals.Mozilla implied that the change from one to many search partners would result in better ideological alignments, but said nothing about revenue potential. "In evaluating our search partnerships, our primary consideration was to ensure our strategy aligned with our values of choice and independence, and positions us to innovate and advance our mission in ways that best serve our users and the Web," said Chris Beard, Mozilla's CEO since July.To read this article in full or to leave a comment, please click here Read More
 

 

SLIDESHOWS

Pi, translated: The evolution of Raspberry Pi

It's only been two years, but the Raspberry Pi has already come a long way.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

MOST-READ STORIES of 2014

1. Peeping into 73,000 unsecured security cameras thanks to default passwords

2. Google Internet balloon drops in on farmer

3. How does a Windows bug go undetected for 19 years

4. 20-plus eye-popping Black Friday 2014 tech deals

5. Gartner's cloud showdown: Amazon Web Services vs. Microsoft Azure

6. New cruise ship a floating heaven for tech geeks

7. Ransomware: City of Detroit didn't pay, TN sheriff's office did pay to decrypt

8. Tech's new blue collar: Good-paying jobs that don't require a 4-year degree

9. FTC gets federal court to shut down $120M tech support scam

10. SDN in action: Hands-on with Cumulus Linux


 
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_after_dark_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 


No comments:

Post a Comment