Thursday, January 2, 2014

How to land a Facebook internship. Plus: 2013's winners and losers

The winners and losers of 2013

10 mobile tech predictions for 2014

ITworld Today
January 02, 2014
Share this email

If you want a Facebook internship, try playing Starcraft 2

Former Facebook interns share advice on to land one of those coveted jobs.

READ MORE
 

Issue highlights

1. The winners and losers of 2013

2. 10 mobile tech predictions for 2014

3. Hackers claim to expose phone information of 4.6 million Snapchat users

4. Report: NSA developed software for backdoor access to iPhones

5. Lenovo's first LTE smartphone signals mobile expansion efforts

6. CocoaPods: Package management for iOS & OS X development

7. ABC shutting down next day streaming for non-subscribers

8. The security industry found its dream enemy in 2013 -- and new technical challenges too

9. IT pro's revitalization guide 2014

White Paper: Dell

Tech Brief: Exchange 2013 Data Loss Prevention

In this new white paper, learn about the new data loss prevention feature in Exchange 2013 and Exchange Online, how it controls inbound and outbound data flow and how it works for businesses of any size. Download it today Read now!

The winners and losers of 2013

After a year of launches and relaunches, wins and losses, wins and failures, the tech chessboard looks pretty much the same. But there were some big wins and losses along the way. READ MORE

10 mobile tech predictions for 2014

What does 2014 have in store for mobile technology? Experts, analysts and others share their predictions for smartphones, tablets, platforms, wireless network technologies, video and mobile banking in the coming year. READ MORE

Hackers claim to expose phone information of 4.6 million Snapchat users

Phone numbers paired with user names of over 4.6 million alleged Snapchat users were posted online by hackers, a few days after a security research group claimed a vulnerability in the social sharing service that could allow attackers to match phone numbers to Snapchat accounts. READ MORE

Report: NSA developed software for backdoor access to iPhones

The software being developed in 2008 would let the agency locate phones and remotely turn on cameras and mics, Der Spiegel reported. READ MORE

White Paper: VMware

The Clear Path to Cloud Security, Compliance, & Cost Control

Both customers and IT decision makers are concerned about cloud security, according to recent research. How can you negotiate this barrier to realize the benefits of cloud computing? Read this paper to learn about the techniques, tools, and technologies that will enable you to capitalize on the cloud safely and cost-effectively. Read Now

Lenovo's first LTE smartphone signals mobile expansion efforts

Lenovo announced its first LTE smartphone and other handsets priced between $219 and $549, but none will be immediately available in the U.S. READ MORE

CocoaPods: Package management for iOS & OS X development

Following in the footsteps of great package managers like Ruby Gems, aptitude, yum, NuGet (and many more), comes CocoaPods for iOS and OSX development. READ MORE

ABC shutting down next day streaming for non-subscribers

ABC is changing their streaming policy. Starting Monday, unless you subscribe to Hulu Plus or the right cable provider, you won't be able to stream episodes until a week after they air. READ MORE

The security industry found its dream enemy in 2013 -- and new technical challenges too

Revelations about mass surveillance will fuel encryption adoption in the next year, but implementing it will take care, security experts say. READ MORE

IT pro's revitalization guide 2014

Take a moment to retool your personal and professional priorities. READ MORE

White Paper: Trusteer

The Rising Threat of Corporate Cybercrime

This white paper discusses the cybercriminal motives and methods, and presents the need for Enterprises to recognize this growing danger and implement technologies that effectively prevent malware. Learn More

SPECIAL REPORT

Your Strategic Guide to VDI
Companies take bold steps into desktop virtualization as benefits begin to outweigh challenges. In this special report, IT leaders share their rookie mistakes (Do not virtualize everything!) and their best tips (Choose that pilot project carefully!) Get the report now!

GIVEAWAYS:

Enter now for your chance to win.

Python Guide for the Total Beginner LiveLessons (Video Training)

Being Agile: Eleven Breakthrough Techniques to Keep You from "Waterfalling Backward" (Book)

DON'T MISS...

18 hot IT certifications for 2014

0, 1, 2, Go! 8 bad habits you can blame on programming

15 programming productivity killers

Arg! The 9 hardest things programmers have to do

The most-watched YouTube videos of 2013 in one handy blog post

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.