Thursday, October 3, 2013

Revenge of the nerds: 11 titans of technology who tackled sports

Meet the man behind Silk Road, the online drug marketplace the FBI has seized

How Japan's Olympics will revolutionize tech

ITworld Today
October 03, 2013
Share this email

Revenge of the nerds: 11 titans of technology who tackled sports

These geeks got rich and then bought their way into sports, but, unlike in tech, they didn't all hit it out of the park

READ MORE
 

Issue highlights

1. Meet the man behind Silk Road, the online drug marketplace the FBI has seized

2. How Japan's Olympics will revolutionize tech

3. BOOK GIVEAWAY: The Practice of Network Security Monitoring

4. Intel outfits open-source Galileo computer with Quark chip, targets DIY crowd

5. Bitcoin forum goes offline after hack

6. Who's training the next generation of data scientists?

7. IT purchasing: Who decides what tech to buy?

8. Google buys Flutter, a gesture recognition startup

9. Yahoo abandons T-shirt rewards for vulnerability information

White Paper: Akamai Technologies, Inc.

Demonstrate the Business Value of Security

This Forrester report highlights the most common mistakes made in the budgeting process and offers Forrester's step-by-step Information Security Value Model to guide you through a strategy to support smart investment and resource allocation. Learn More

Meet the man behind Silk Road, the online drug marketplace the FBI has seized

The FBI seized Silk Road this week after its suspected leader, Ross William Ulbricht, was allegedly using the service to hire hit men. READ MORE

How Japan's Olympics will revolutionize tech

Last month's awarding of the 2020 Olympic Games to Tokyo could be great news for technology. READ MORE

BOOK GIVEAWAY: The Practice of Network Security Monitoring

Enter now for your chance to win! You'll learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools. READ MORE

Intel outfits open-source Galileo computer with Quark chip, targets DIY crowd

To reach enthusiasts, Intel is partnering with Arduino. READ MORE

White Paper: CBT Nuggets

Why CBT Nuggets Works

This paper provides an academic approach to research spanning multiple fields, to explain how various training methods can optimize learning experiences. It further demonstrates how CBT Nuggets' unique training style creates this ideal training experience for end users. Read now!

Bitcoin forum goes offline after hack

A popular Bitcoin forum, Bitcointalk.org, remained offline Wednesday night as it investigated a cyberattack. READ MORE

Who's training the next generation of data scientists?

A projected shortage of qualified data scientists could leave U.S. businesses unable to tap the value of big data. READ MORE

IT purchasing: Who decides what tech to buy?

Lowe's knows a thing or two about buying and selling, so it means something that the Mooresville, N.C., home improvement retailer established a procurement department to help its various divisions make better deals. READ MORE

Google buys Flutter, a gesture recognition startup

Google has acquired Flutter, a gesture recognition company whose technology lets people control music and movies on their desktop by waving their hands. READ MORE

Yahoo abandons T-shirt rewards for vulnerability information

Yahoo will stop giving T-shirts as a reward for finding security vulnerabilities after a public shaming it's calling "t-shirt gate." READ MORE

White Paper: CDW

Improving customer interactions with powerful technology

Social tools and strategies are now crucial to building a successful CRM strategy. Learn how to take advantage of social CRM to improve business processes and enhance customer loyalty without a complete "rip-and-replace" of traditional CRM tools. Read Now

SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.

BOOK GIVEAWAY:

We're giving away 5 copies of each of these two new books to give to some lucky readers. Enter today for your chance to win!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

The 10 programming languages most likely to drive developers insane

11 foods you'll be eating in 2050

15 geeky places to visit before you die

I'll cry if I want to: Ten tech titans and their temper tantrums

7 ways to beat fingerprint biometrics

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.