Monday, December 8, 2014

Google may have money for you

Hackers said to threaten Sony employees
Your Morning Countdown
December 08, 2014 Read about Google's plans to refund customers for unfair in-app billing on Android devices.
10. Hackers said to threaten Sony employees

9. Peter Smith: Microsoft & Barnes & Noble end NOOK agreement

8. Holiday gift guide 2014: Top-notch tech for $150 or more

7. Jim Lynch: Samsung Galaxy S6 specs may have leaked

6. Hands on with Andy, the Android emulator for Windows
WHITE PAPER: Box

Six Essential Elements for A Modern Mobility Strategy
Enterprises that understand the strategic importance of mobility are moving to the head of the pack. With a cohesive mobile strategy that balances secure content sharing, enhanced collaboration, and a superior user experience, a company can ultimately facilitate innovation across the organization.
View now

5. Apple asks court to dismiss iTunes DRM case after curious plaintiff twist

4. Melanie Pinola: A lesson from Sony's massive hack: Don't store your passwords in Word docs and Excel sheets

3. NSA spy program targets mobile networks worldwide

2. Eric Bloom: 7 Great Options for a Business Analyst Who Wants More

1. Google to begin contacting customers about in-app refunds
WEBCAST: CSG Invotas

Creating a Culture of Security: Whose Job Is It Anyway?
Join us for an exclusive round table discussion featuring three distinguished panelists who explore multiple angles on who's ultimately responsible for security, why the board needs to understand what a CISO does, as well as some of the insurance and liability implications for security and business leaders.
Learn More

Most Popular
IT Resume Makeover: Top 11 tips from 2014

9 ways to keep employees motivated and productive during the holidays

New cruise ship a floating heaven for tech geeks [VIDEO]

5 signs that a vendor won't make it to 2020

Top 10 Tech stories 2014: Backlash! Disrupting the disruptors

WHITE PAPER: Ixia

The Real Secret to Securing your Network
In this white paper, Ixia shares a recommended solution and eye-opening strategies for mitigating security threats. Learn how emerging visibility architectures support your security policies to help bulletproof defenses.
Learn more.


You are currently subscribed to itworld_morning_countdown as garn14.tech@blogger.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com
To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.

Follow ITworld
Google +
Facebook
Twitter
LinkedIn

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.