Thursday, October 16, 2014

Keyboard for one: 8 of the most impressive solo programming efforts

Whoops! Apple leaks iPad Mini 3 and iPad Air 2 details ahead of Thursday's event

First Look: The magnificent new Nexus 6 and Nexus 9

ITworld Today
October 16, 2014

Keyboard for one: 8 of the most impressive solo programming efforts

Notable examples of coding brilliance that came from the mind (and hands) of one programmer.

READ MORE
 

Issue highlights

1. Whoops! Apple leaks iPad Mini 3 and iPad Air 2 details ahead of Thursday's event

2. First Look: The magnificent new Nexus 6 and Nexus 9

3. Samsung claims data speed test 30 times faster than LTE

4. Density vs. Isolation in the data center

5. Startup builds on Wi-Fi chips for cheaper 'last mile' to home broadband

6. Intel preps new technology to secure credit card transactions

7. 10 mirroring devices let you present without wires

8. Hands on with Sony's Playstation TV

9. WIN THIS BOOK: Programming in C, 4th Edition

White Paper: SevenTablets

Mitigating Your Biggest Mobile Strategy Risk: User Rejection

Did you know eight out of ten apps are downloaded, used once, and deleted? User rejection is the greatest risk to your mobile strategy. This white paper outlines how to mitigate this risk by planning a user-friendly experience that balances responsiveness, intuitiveness, and functionality. Learn More

Whoops! Apple leaks iPad Mini 3 and iPad Air 2 details ahead of Thursday's event

Some information about the new gear was posted on iTunes. READ MORE

First Look: The magnificent new Nexus 6 and Nexus 9

Google introduced a wow-provoking new stable of Nexus devices Wednesday. READ MORE

Samsung claims data speed test 30 times faster than LTE

The company also said it logged 1.2Gbps in vehicle tests for 5G technologies. READ MORE

Density vs. Isolation in the data center

When filling your rack space with servers, is it better to go high density with fewer physical boxes or many isolated servers? READ MORE

White Paper: Secunia

New Data Released on 2014 Security Vulnerabilities

This 2014 Security Vulnerability Report reveals data on global trends. Learn how the primary attack vectors are shifting, why there's an increase of vulnerabilities in Windows 7, and how to be on the watch for risks in PDF readers, browsers and the top 50 software applications. Learn more >>

Startup builds on Wi-Fi chips for cheaper 'last mile' to home broadband

Mimosa Networks wants to help service providers reach customers without laying fiber or copper. READ MORE

Intel preps new technology to secure credit card transactions

Intel's Data Protection Technology for Transactions works with Apple Pay. READ MORE

10 mirroring devices let you present without wires

Wirelessly sending a presentation from your laptop or tablet to a large screen is a breeze with one of these mirroring devices. READ MORE

Hands on with Sony's Playstation TV

It plays games from five different Playstation platforms, but it can't stream Netflix. READ MORE

WIN THIS BOOK: Programming in C, 4th Edition

Learn C by example, with complete C programs used to illustrate each new concept along the way. Five will win. Enter the drawing today! READ MORE

: Samsung

Is your smartphone secure enough?

Learn how Samsung KNOX's multi-layered approach to mobile security protects against malicious apps, prevents attacks from one domain spreading to another domain and more. Learn More

DON'T MISS...

Head-scratchers: 10 confounding programming language features

Top 25 free tools for every Windows desktop

15 simple, secret Windows tips and tricks to save you time

Superclass: 14 of the world's best living programmers

The 10 best laptops of 2014 (so far)

ITWORLD GIVEAWAYS:

We've got 5 copies of each of this books to give to some lucky ITworld readers. Enter now for your chance to win!

Help Your Kids with Computer Coding
Take your kids from browsing to building the web. Fun projects throughout let kids start putting their computer skills into practice and build their own code using Scratch programming and Python. Enter now!

Introduction to Agile Methods
If you want to understand Agile and become conversant with Agile values, principles, framework, and processes, this book is the place to start. Enter now!

Programming in C, 4th Edition
Learn C by example, with complete C programs used to illustrate each new concept along the way. Enter now!

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.