Wednesday, September 4, 2013

The 10 most embarrassing, exploitative, soul-killing, downright dangerous tech jobs

The 10 most embarrassing, exploitative, soul-killing, downright dangerous tech jobs

Hands on with Samsung's Galaxy Gear smartwatch [VIDEO]

ITworld Tonight
September 04, 2013
Share this email

6 new rules for improving your career

Stop job-jumping, delay that MBA and other advice for career advancement

READ MORE
 

Issue highlights

1. The 10 most embarrassing, exploitative, soul-killing, downright dangerous tech jobs

2. Hands on with Samsung's Galaxy Gear smartwatch [VIDEO]

3. Hynix plant explosions leave memory shipments on hold

4. Did Microsoft kill Windows by buying Nokia?

5. Borked Google Authenticator update wipes iOS user data

6. How to find the best LinkedIn groups

7. Lookout Antivirus & Security review: Basic protection for your Android phone

8. The ultimate Stan Lee cameo - playable Lego character

The 10 most embarrassing, exploitative, soul-killing, downright dangerous tech jobs

Think your job stinks? Hope it isn't one of these. READ MORE

Hands on with Samsung's Galaxy Gear smartwatch [VIDEO]

Samsung's Galaxy Gear is here, launched on Wednesday at Germany's IFA electronics show. READ MORE

Hynix plant explosions leave memory shipments on hold

The Korean press reports that a huge explosion and fire in Hynix's fabrication plants 1 and 2 in China may put DRAM shipments on hold for the foreseeable future. Hynix is responsible for about 30% of the world's DRAM production. READ MORE

Did Microsoft kill Windows by buying Nokia?

In today's open source roundup: Is Windows dead after the purchase of Nokia by Microsoft? Plus: The $45 CuBox-i Mini-PC runs Android and Linux, and should games be ported to Linux via Wine? READ MORE

Borked Google Authenticator update wipes iOS user data

The two-factor authentication offered by Google Authenticator works great, except for when it doesn't. READ MORE

How to find the best LinkedIn groups

This tool helps you find the LinkedIn groups that are actually worth joining--ones with little spam and lots of engagement READ MORE

Lookout Antivirus & Security review: Basic protection for your Android phone

Don't let your sensitive data fall into the wrong hands. READ MORE

The ultimate Stan Lee cameo - playable Lego character

Finally, a video game character worth playing - Stan Lee! READ MORE

SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.

DON'T MISS...

Famous firsts: The earliest days of your favorite social networks

Jealous much? 8 techy things that can spark office envy

Hey Gen Y'er, want a promotion? Communicate like an old guy

10 overhyped tech products that crashed and burned

Up all night: How the tech elite pushes a crazy workaholic culture

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.