Thursday, September 5, 2013

3 lessons from IT's flawed approach to big data

6 tips for finding mobile app talent

IT hiring: Your text resume is soooo last century

ITworld Today
September 05, 2013
Share this email

3 lessons CMOs take away from IT's flawed approach to big data

Many marketers aren't getting what they need from the CIO. If IT can't deliver, CIOs should expect CMOs to go around them.

READ MORE
 

Issue highlights

1. 6 tips for finding mobile app talent

2. IT hiring: Your text resume is soooo last century

3. Apple steps up their app store reviewing speed

4. 'Hash Hunters' Web service cracks password hashes for bitcoins

5. Almost 90 percent of Internet users have taken steps to avoid surveillance, survey finds

6. Fire-hit SK Hynix DRAM plant in China to resume operations soon

7. Cache warfare: Azure and AWS get updated caching services

8. 15 geeky places to visit before you die

9. Microsoft gives us a launch date for Xbox One and a lifespan for Xbox 360

Resource compliments of: Canon

Document management made simple, with Canon.

Canon's next-generation imageRUNNER ADVANCE gives your users simple, seamless ways to do more in less time: Like one-touch printing, sharing and accessing documents --in the office or remotely via mobile devices. And it gives your business a powerful document management platform that's easy and painless to run, upgrade, and expand. LEARN MORE

6 tips for finding mobile app talent

To understand what's hot in the IT job market today, just ask yourself a simple question: When is the last time you checked your mobile device or used the mobile Web? READ MORE

IT hiring: Your text resume is soooo last century

Tim Ondrey has glimpsed the future of the job-search market, and it's going multimedia. READ MORE

Apple steps up their app store reviewing speed

App review times for both new and updated apps have been a major pain point for developers targeting the iOS/OSX platforms. With review times reaching upwards of 20 days, the consequences of submitting an app with a major flaw are serious. Lately however, review times have been down right speedy. READ MORE

'Hash Hunters' Web service cracks password hashes for bitcoins

A search for "Hash Hunters" turns up marijuana-themed t-shirts for sale. It also brings up a password-cracking outsourcing service, payable in bitcoin. READ MORE

White Paper: Code 42 Software, Inc.

Ohio State University: Backing up Buckeyes

Ohio State's Tim Winningham, systems manager for the mathematics department, implemented CrashPlan and has decreased time spent on backup by a whopping 98%. Learn More. Learn More.

Almost 90 percent of Internet users have taken steps to avoid surveillance, survey finds

A majority of U.S. Internet users polled in a recent survey report taking steps to remove or mask their digital footprints online, according to a report from the Pew Research Center's Internet Project and Carnegie Mellon University. READ MORE

Fire-hit SK Hynix DRAM plant in China to resume operations soon

A fire at a SK Hynix memory chip plant in Wuxi, China will have no impact on the company's DRAM production, the company said on Thursday, adding that the factory will resume operations soon. READ MORE

Cache warfare: Azure and AWS get updated caching services

The competition between Microsoft's Windows Azure and Amazon Web Services (AWS) has moved to the caching layer: Both companies updated their caching services this week. READ MORE

15 geeky places to visit before you die

If you like reliving geeky history, you'll want to add visiting to these places to your bucket list. READ MORE

Microsoft gives us a launch date for Xbox One and a lifespan for Xbox 360

Microsoft dropped the original Xbox like a bad habit when the Xbox 360 launched, but the same won't be true this generation. READ MORE

White Paper: Polycom

Benefits of Video in a Converged Communications Environment

In an increasingly virtual workplace, advanced communications are changing the way people interact, communicate and collaborate. Learn more.

SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.

DON'T MISS...

Famous firsts: The earliest days of your favorite social networks

Jealous much? 8 techy things that can spark office envy

Hey Gen Y'er, want a promotion? Communicate like an old guy

10 overhyped tech products that crashed and burned

Up all night: How the tech elite pushes a crazy workaholic culture

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.