Friday, October 4, 2013

10 juicy tidbits from Twitter's IPO filing

Transitioning an iOS 6 design to iOS 7: A quick, helpful tip

Ridiculous details to leave off your resume

ITworld Today
October 04, 2013
Share this email

10 juicy tidbits from Twitter's IPO filing

Twitter made its IPO documents public Thursday and in the process revealed some juicy information about the company, like how much its executives get paid. Here are a few of the details we learned.

READ MORE
 

Issue highlights

1. Transitioning an iOS 6 design to iOS 7: A quick, helpful tip

2. Ridiculous details to leave off your resume

3. BOOK GIVEAWAY: The Official Ubuntu Server Book, 3rd Ed.

4. Hackers steal information on 2.9 million Adobe customers

5. What to do after your email account is compromised

6. Which IT skill sets are in highest demand in the Linux job market?

7. Amazon could be in the streaming set-top box game by holidays

8. (Almost) cleared for takeoff: FAA panel says electronics are safe 'gate to gate'

9. What's an unemployed spook to do? [CARTOON]

Webcast: HP

HP Webcast: Mobile Application Development

More than 50% of custom mobile apps have been deployed by business units without IT oversight. The results of this Mobile App Development Survey highlight the responses of 208 IT leaders surveyed by IDC. Hear how your peers are grappling with app testing processes, cross-platform development approaches, performance and security concerns. View Now

Transitioning an iOS 6 design to iOS 7: A quick, helpful tip

Use the assistant view and iOS 6/7 deltas to update your app. READ MORE

Ridiculous details to leave off your resume

You'll laugh, but these folks must have thought it was a good idea to put these crazy, irrelevant details on their resumes. READ MORE

BOOK GIVEAWAY: The Official Ubuntu Server Book, 3rd Ed.

We've got 5 copies to give to some lucky ITworld readers. Enter now for your chance to win! READ MORE

Hackers steal information on 2.9 million Adobe customers

Hackers broke into the internal computer network of Adobe Systems and stole information on 2.9 million customers, as well as source code for several of the company's products. READ MORE

Webcast: Lumension Security

Combating Threats with Endpoint Configuration Management

In this webcast learn why Randy Franklin Smith from Ultimate Windows Security stands up for group policy as the "right" way to configure the bulk of workstation security settings. But for endpoint configuration management to be secure, efficient and compliant, group policy is only part of the answer. Learn more!

What to do after your email account is compromised

No one wants shoulda/coulda advice. Here is what Kevin Purdy tells people who want to know what to do next, after their email has been opened up and sorted through. READ MORE

Which IT skill sets are in highest demand in the Linux job market?

In today's open source roundup: Find out which IT skill sets are most in demand for Linux jobs. Plus: Where will Microsoft be in five years? And Foss Force asks if there are too many Linux distros. READ MORE

Amazon could be in the streaming set-top box game by holidays

Push aside your Roku, Apple TV and Google TV and make room for the Amazon FireTube. READ MORE

(Almost) cleared for takeoff: FAA panel says electronics are safe 'gate to gate'

You'd still have to put your tray table up. READ MORE

What's an unemployed spook to do? [CARTOON]

The government shutdown has forced the NSA to furlough a lot of people. What's an unemployed spook to do? READ MORE

White Paper: Verizon Enterprise Services

How to Leverage Technology for Innovation and Success

This Frost & Sullivan paper presents the many opportunities for C-level management, IT, other services lines and the LOBs to align and unite behind common goals. This cloud-based solution has the strength to underpin enterprise innovation, enabling agility, speed to market and efficiency–which are paramount to ensuring growth and sustained revenue. Learn More>>

SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.

BOOK GIVEAWAY:

We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

The 10 programming languages most likely to drive developers insane

11 foods you'll be eating in 2050

15 geeky places to visit before you die

I'll cry if I want to: Ten tech titans and their temper tantrums

7 ways to beat fingerprint biometrics

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.