Wednesday, October 30, 2013

Tech-or-treat: What 13 tech companies might be handing out this Halloween

8 mobile OS features you saw on Android first

Surface 2 review: Cautious upgrades don't help a tablet in desperate need of relevance

ITworld Today
October 30, 2013
Share this email

Tech-or-treat: What 13 tech companies might be handing out this Halloween

Here's what trick-or-treaters could expect to get if these technology companies turned on their porch lights this Halloween.

READ MORE
 

Issue highlights

1. 8 mobile OS features you saw on Android first

2. Surface 2 review: Cautious upgrades don't help a tablet in desperate need of relevance

3. Taiwan protests Apple maps that show island as province of China

4. Survey: younger employees break the rules and put your company at risk

5. Mozilla releases 10 patches, five critical, for Firefox

6. MongoDB support firm says intruders may have accessed databases

7. Every phone charger should be like the Bolt charger

8. Hadoop is not enough for 'big data', says Facebook analytics chief

9. BOOK GIVEAWAY: The Practice of Network Security Monitoring

Resource compliments of: Canon

Document management made simple, with Canon.

Canon's next-generation imageRUNNER ADVANCE gives your users simple, seamless ways to do more in less time: Like one-touch printing, sharing and accessing documents --in the office or remotely via mobile devices. And it gives your business a powerful document management platform that's easy and painless to run, upgrade, and expand. LEARN MORE

8 mobile OS features you saw on Android first

If your phone has free turn-by-turn navigation, LTE, or multitasking, you should thank Android. READ MORE

Surface 2 review: Cautious upgrades don't help a tablet in desperate need of relevance

Microsoft needed to bring the razzle-dazzle. Instead we got a 40-degree angle and higher resolution screen. READ MORE

Taiwan protests Apple maps that show island as province of China

Taiwan is demanding Apple revise its mapping software and remove a label that describes the island as a province of China, rather than as a sovereign state. READ MORE

Survey: younger employees break the rules and put your company at risk

Many Generation Y workers are willing to circumvent BYOD and security policies if they don't agree with them. READ MORE

Resource compliments of: VMTurbo

Get the Most Out of Your Virtual Environment

How can you ensure the performance of applications while getting the most out of your virtualized environment? VMTurbo taps into the increased agility provided by virtualization to continually tune, adjust, and plan how the infrastructure is optimized based on the needs and demands of your entire infrastructure while reducing IT costs by 20-40%. Try it free in your environment

Mozilla releases 10 patches, five critical, for Firefox

Mozilla released 10 patches for three versions of its Firefox browser on Tuesday, five of which are considered critical and could be used to remotely install malicious code. READ MORE

MongoDB support firm says intruders may have accessed databases

MongoHQ, which provides hosting and support for the open-source Mongo database, said attackers may have accessed several of its customers' databases earlier this week. READ MORE

Every phone charger should be like the Bolt charger

Kevin Purdy is happy to report that the Bolt is a working replacement for a lot of the charging clutter we carry around these days. READ MORE

Hadoop is not enough for 'big data', says Facebook analytics chief

The Hadoop programming framework may be synonymous with the "big data" movement but it's not the only tool companies need to derive insights from massive stores of unstructured information, according to Facebook analytics chief Ken Rudin. READ MORE

BOOK GIVEAWAY: The Practice of Network Security Monitoring

We've got 5 copies to give to some lucky ITworld readers. Enter now for your chance to win! READ MORE

White Paper: CDW

Improving customer interactions with powerful technology

Social tools and strategies are now crucial to building a successful CRM strategy. Learn how to take advantage of social CRM to improve business processes and enhance customer loyalty without a complete "rip-and-replace" of traditional CRM tools. Read Now

BOOK GIVEAWAY:

The drawings end October 31. Enter now for your chance to win one of these two new books!

The Official Ubuntu Server Book, 3rd Ed.
Written by leading members of the Ubuntu community, The Official Ubuntu Server Book, Third Edition, covers all you need to know to make the most of Ubuntu Server, whether you're a beginner or a battle-hardened senior systems administrator.

The Practice of Network Security Monitoring
Learn how to deploy, build, and run a network security monitoring (NSM) operation using open source software and vendor-neutral tools.

DON'T MISS...

Arg! The 9 hardest things programmers have to do

7 tools that help protect you against the NSA and Google

Obsolete! Careers that are being automated into oblivion

15 geeky places to visit before you die

13 unsung women of technology

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.