Wednesday, October 29, 2014

15 pieces of classic software whose code is now accessible

Exposing the source: 15 pieces of classic software whose code is now accessible | Google enlists PwC to push Apps, Android, cloud computing to businesses

ITworld Enterprise Applications

Google Plus LinkedIn Facebook Twitter


Office 365 is getting management features for iOS, Android and Windows Phone
The upgrade will be available during the first quarter next year. Read More


: Verizon

Mobile Device Management
In this eGuide, InfoWorld and sister publications IDG News Service, Network World, Computerworld, and CSO look at many of today's issues surrounding mobile security and MDM. Read on to learn how MDM can help your enterprise enable mobile security without hampering employee productivity. Learn More

WHITE PAPER: VeriSign

Turn to the Cloud for Website Availability & Protection
Domain name system (DNS) protection is a key component to a comprehensive security plan. One of the most efficient ways to bolster DNS security is to deploy a cloud-based DNS infrastructure. This DNS Security eGuide, will review top cyber threats to DNS and identify five top reasons, along with guidance, on selecting a managed DNS service provider. Learn More>>

Exposing the source: 15 pieces of classic software whose code is now accessible
The source code behind proprietary software doesn't always remain hidden forever. Here are a number of examples where the code behind well-known applications has come to light Read More

Google enlists PwC to push Apps, Android, cloud computing to businesses
PwC will also roll out Apps to 45,000 staffers in the US and Australia. Read More

IBM sends Cognos, SPSS to the cloud
IBM continues to migrate its portfolio of enterprise software to the cloud. Read More

Microsoft opens Office 365 to programmers
At TechEd Europe, Microsoft announced updates to Office 365, Azure and Intune. Read More


WHITE PAPER: Samsung

Secure Mobility Myth Buster
As organizations try to make sense of the Secure Mobility cacophony, they most often encounter a collection of confusing and conflicting myths instead of useful information to guide key evaluation and acquisition decisions. This document reviews the more common myths and misconceptions about secure mobility and EMM. Learn More

Exposed: Xerox Alto and CP/M OS source code released
The Computer History Museum has made the code behind yet more historic software available for download Read More

Microsoft beefs up Office 365 with unlimited OneDrive cloud storage
The free upgrade rolls out to all users in the coming months, forcing other storage services to up their game. Read More

Neural networks draw on context to improve machine translations
Dutch researchers have improved the output of a statistical machine translation system by examining the context in which words are found. Read More

The top 10 keyboard shortcuts in Word and Excel that help you work faster
From formatting to editing, these combo-key wonders will save time and tedium every workday. Read More


ITWORLD GIVEAWAYS:

We've got 5 copies of each of this books to give to some lucky ITworld readers. Enter now for your chance to win!

Help Your Kids with Computer Coding
Take your kids from browsing to building the web. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python. Enter now!

Introduction to Agile Methods
If you want to understand Agile and become conversant with Agile values, principles, framework, and processes, this book is the place to start. Enter now!

Programming in C, 4th Edition
Learn C by example, with complete C programs used to illustrate each new concept along the way. Enter now!

SALARY SURVEY:

What's your earning power? How does it compare with your peers'?

With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_enterprise_applications as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.