Monday, November 17, 2014

.NET goes open source

Jim Lynch: Microsoft shocks the world by open sourcing .NET
Your Morning Countdown
November 17, 2014 Read about Microsoft's decision to open source (parts of) .NET
10. Jim Lynch: Microsoft shocks the world by open sourcing .NET

9. FBI: Crooks have stolen $20 million with false Internet ads

8. Phil Johnson: Even anti-virus software couldn't protect you from Clippy [CARTOON]

7. US putting fake cell towers in planes to spy on people, report says

6. Peter Smith: Sony announces Playstation Vue Internet TV service
WHITE PAPER: OutSystems

Mobile App Backlog
New research conducted by Opinion Matters reveals that 85% of enterprises have a mobile app development backlog because they can't cope with business demands. With the average application taking anywhere between three and 12 months to get out the door, this slow approach to app development is resulting in competitive disadvantage.
Learn More

5. Andy Patrizio: Want to juice up your desktop? Xeon Phi cards are just $200

4. Facebook gives its server racks a Tesla touch

3. Melanie Pinola: How to disable Facebook's in-app browser and use your default browser

2. Google project helps track overfishing

1. Eric Bloom: 8 Steps to move from Programmer to Business Analyst
: Zuora

Accelerate Success in the Subscription Economy
Learn the best practices in the Subscription Economy, with perspectives from finance, marketing, IT, operations, and a CEO.
Learn more!

Most Popular
Android 5.0 deep-dive review: Exploring Lollipop's many layers

8 free online courses to grow your tech skills

Room to grow: Tips for data center capacity planning

8 weird Android selfie apps that give you a virtual makeover

Popcorn Time torrent streaming app updated to Beta 0.3.5

WHITE PAPER: Aberdeen Group

3 Insider Threats Executives Need to Watch For
Aberdeen Group's Derek E. Brink discusses in this report the three types of insider threats that executives must watch out for, as well as five ways in which these threats are likely to occur, and how to react to them when they appear. Avoid costly security breaches with this valuable information.
Learn More


You are currently subscribed to itworld_morning_countdown as garn14.tech@blogger.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com
To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

Follow ITworld
Google +
Facebook
Twitter
LinkedIn

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.