Thursday, July 31, 2014

Fotopedia is shutting down

Comments



from Hacker News http://bit.ly/1ty6Dde

Time for programmers to grow a spine

Comments



from Hacker News http://bit.ly/1zzoUHA

NASA validates 'impossible' space drive

Comments



from Hacker News http://bit.ly/1k9e1ss

Paddy Power Data Breach

Comments



from Hacker News http://bit.ly/1k9e07C

Cloudy With a Chance of War

Comments



from Hacker News http://bit.ly/1k9dZRm

RT @BGallagher32: Jammed packed Technology Exhibit #EMCForum Tokyo. Yamano-San toasting our @EMCcorp customers, 20 years #EMCJapan http://t…






EMC logo
RT @BGallagher32: Jammed packed Technology Exhibit #EMCForum Tokyo. Yamano-San toasting our @EMCcorp customers, 20 years #EMCJapan http://t






via EMC Feeds http://bit.ly/1ACWyxr

RT @BGallagher32: Jammed packed Technology Exhibit #EMCForum Tokyo. Yamano-San toasting our @EMCcorp customers, 20 years #EMCJapan http://t…






EMC logo
RT @BGallagher32: Jammed packed Technology Exhibit #EMCForum Tokyo. Yamano-San toasting our @EMCcorp customers, 20 years #EMCJapan http://t






via EMC Feeds http://bit.ly/1ACWyxr

Bugtraq: Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account



from SecurityFocus Vulnerabilities http://bit.ly/1ACVvhf

Bugtraq: RE: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

RE: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account



from SecurityFocus Vulnerabilities http://bit.ly/1xEYBNa

Bugtraq: Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account

Re: [FD] Beginner's error: import function of Windows Mail executes rogue program C:\Program.exe with credentials of other account



from SecurityFocus Vulnerabilities http://bit.ly/1xEYBgj

Bugtraq: [ MDVSA-2014:144 ] live

[ MDVSA-2014:144 ] live



from SecurityFocus Vulnerabilities http://bit.ly/1ACVoSD

'Uber for Autorickshaws' comes to India

Comments



from Hacker News http://nyti.ms/UNLSuP

PaaS: Heroku, Dokku, Deis, Flynn The Future Is Shaping Up Quite Nicely

Comments



from Hacker News http://bit.ly/1oQutOi

Bring back TheOatmeal.com

Comments



from Hacker News http://bit.ly/1oQulOS

Google Announces ‘Right To Be Forgotten’ Tour 2014

Comments



from Hacker News http://bit.ly/1oQnIMu

Mesa: Geo-Replicated, Near Real-Time, Scalable Data Warehousing (VLDB 2014)

Comments



from Hacker News http://bit.ly/1oQnKDZ

The Sleeping Habits of Geniuses

Comments



from Hacker News http://nym.ag/1oQnxkk

Apply now for tickets to TEDxCERN

Comments



from Hacker News http://bit.ly/1oQnrJo

Tor attack may have unmasked dark net users

Comments



from Hacker News http://bbc.in/1ptdJMg

Quest Manages End User Cloud Services Using Citrix and Cisco Solutions


















Adam Burke, Director of Partner Development, Quest, explains why Citrix solutions help develop solutions for end user customers across the workspace stack for desktops, applications, security, disaster recovery, remote workforce and BYOD. Quest uses hosted Citrix XenApp and XenDesktop to deliver a consistent user experience and remove the complexity in delivering cloud capabilities for customers. As Citrix Service Provider and Cisco Cloud Services Provider, Quest services healthcare organizations, financial services, production, life sciences, and state and regional, and local governments. Learn more about Desktops-as-a-Service at www.citrix.com/daas


Views:1

Length:02:52






from CitrixTV RSS Feed http://bit.ly/1k96WI9

Ubuntu 14.04.1

Support for Ubuntu 14.04.1 has been introduced for these products:



  • ESXi 5.1 Update 2.

  • ESXi 5.5, ESXi 5.5 Update 1.


For more information about software and hardware support, please check the VMware Compatibility Guide






via VMware Blogs http://bit.ly/1txEnrb

Rackspace developer+ Program: For Developers, By Developers

Comments



from Hacker News http://bit.ly/1txDKOr

Ask HN: Would you like to play a game?

Comments



from Hacker News http://bit.ly/1n6A3XA

Next-Generation Microshutter Array Technology

Comments



from Hacker News http://1.usa.gov/1n6zVHC

Show HN: Bookmark full text search web app

Comments



from Hacker News https://linklet.io/

Google releases source code for its I/O 2014 app

Comments



from Hacker News http://bit.ly/1n6zL2Z

Why the Security of USB Is Fundamentally Broken

Comments



from Hacker News http://wrd.cm/1n6zHjK

Show HN: Yarnee for iOS

Comments



from Hacker News http://bit.ly/1txDmza

Dam removals: Rivers on the run

Comments



from Hacker News http://bit.ly/1n6zDk6

Countries don't own their Internet domains, ICANN says

Comments



from Hacker News http://bit.ly/1n6zD3y

Hackers Can Control Your Phone Using a Tool That’s Already Built Into It

Comments



from Hacker News http://wrd.cm/1n6ztcl

Try Jekyll on GitHub, without any installation

Comments



from Hacker News http://bit.ly/1txD4IF

Pope Francis reveals top 10 secrets to happiness

Comments



from Hacker News http://bit.ly/1txD0J0

Hackers Can Control Your Phone Using a Tool That’s Already Built Into It

A lot of concern about the NSA’s seemingly omnipresent surveillance over the last year has focused on the agency’s efforts to install back doors in software and hardware. Those efforts are greatly aided, however, if the agency can piggyback on embedded software already on a system that can be exploited. Two researchers have uncovered such […]

















from WIRED » Threat Level http://wrd.cm/1s6Csb0

F1 Tech (KERS) Is About to Make Buses Way More Efficient

Comments



from Hacker News http://wrd.cm/1m0LaBX

1 in 10 Android Apps Are Virus-Infected

Third-party markets in Asia are the main culprits.



from Infosecurity - Latest News http://bit.ly/1oPYdL9

Russia to Apple, SAP: Give us source code, prove you're not spies

Russian officials have asked the companies to hand over their source code so it can be tested for surveillance capabilities.



from Latest Topic for ZDNet in Security http://zd.net/1n6l0gx

BitTorrent Unveiled New Decentralized "Bleep" Instant Messenger





from The Hacker News http://bit.ly/UNrIRL

Vuln: Elasticsearch CVE-2014-3120 Arbitrary Java Code Execution Vulnerability

Elasticsearch CVE-2014-3120 Arbitrary Java Code Execution Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1uKkjmW

More than 10,000 medieval manuscripts online

Comments



from Hacker News http://bit.ly/1s6A574

Crippling DDoS Hits Major Aussie Broadband Provider

Cirrus Communications had half of its network taken down by attack earlier this week.



from Infosecurity - Latest News http://bit.ly/1oPKjZz

Crouching Yeti: an ongoing spying campaign with 2 800+ highly valuable targets worldwide

New malicious tools, an expanded list of victims, and other features related to the Crouching Yeti campaign, also known as Energetic Bear.



from http://bit.ly/1nW4q9l

Ionic Announces “Ionic Creator” Drag and Drop Apps

Comments



from Hacker News http://bit.ly/1m0uwSL

How to get Bitcoin from the early majority to the early adopters

Comments



from Hacker News http://bit.ly/1nMqQca

IBM snaps up Italian cloud security vendor CrossIdeas

IBM is adding more troops for its assault on the enterprise security market - this time with an Italian vendor giving it tools to handle segregation of duties.



from Latest Topic for ZDNet in Security http://zd.net/1zyGhs1

Russia and China teaming up to build floating nuclear power plants

Comments



from Hacker News http://reut.rs/1n6a16S

Mindful Browsing

Comments



from Hacker News http://bit.ly/1n6a3LW

Chinese Hackers Use APTs to Target Gaming Companies

TG-3279 group wants to play games for free or re-use source code in competing products, says Dell



from Infosecurity - Latest News http://bit.ly/1n683Dw

Show HN: Maqtoob – Find the best available business apps

Comments



from Hacker News http://bit.ly/1qrdwb6

Vuln: ppc64-diag CVE-2014-4039 Multiple Insecure File Permissions Vulnerabilities

ppc64-diag CVE-2014-4039 Multiple Insecure File Permissions Vulnerabilities



from SecurityFocus Vulnerabilities http://bit.ly/1pI1J6O

Wednesday, July 30, 2014

Tracking client-side errors in Google Analytics for easy diagnosis

Comments



from Hacker News http://bit.ly/1uGO8F3

Bugtraq: Vulnerabilities in Facebook and Facebook Messenger for Android [STIC-2014-0529]

Vulnerabilities in Facebook and Facebook Messenger for Android [STIC-2014-0529]



from SecurityFocus Vulnerabilities http://bit.ly/1qmhn9C

Bugtraq: [ MDVSA-2014:141 ] java-1.7.0-openjdk

[ MDVSA-2014:141 ] java-1.7.0-openjdk



from SecurityFocus Vulnerabilities http://bit.ly/1oKKy89

Bugtraq: [security bulletin] HPSBMU03078 rev.1 - HP CloudSystem Foundation and HP CloudSystem Enterprise Software running OpenSSL, Remote Unauthorized Access or Disclosure of Information

[security bulletin] HPSBMU03078 rev.1 - HP CloudSystem Foundation and HP CloudSystem Enterprise Software running OpenSSL, Remote Unauthorized Access or Disclosure of Information



from SecurityFocus Vulnerabilities http://bit.ly/1qmhbHl

Vuln: Cisco Unified Customer Voice Portal CVE-2014-3325 Multiple Cross Site Scripting Vulnerabilities

Cisco Unified Customer Voice Portal CVE-2014-3325 Multiple Cross Site Scripting Vulnerabilities



from SecurityFocus Vulnerabilities http://bit.ly/1qmh7Ye

Vuln: phpMyAdmin CVE-2014-4348 Multiple Cross Site Scripting Vulnerabilities

phpMyAdmin CVE-2014-4348 Multiple Cross Site Scripting Vulnerabilities



from SecurityFocus Vulnerabilities http://bit.ly/1oKKo0H

Vuln: phpMyAdmin CVE-2014-4349 Multiple Cross Site Scripting Vulnerabilities

phpMyAdmin CVE-2014-4349 Multiple Cross Site Scripting Vulnerabilities



from SecurityFocus Vulnerabilities http://bit.ly/1qmgVIj

Ask HN: How much traffic to expect if your project hits HN front page?

Comments



from Hacker News http://bit.ly/1rFYRdg

UK to allow driverless cars on public roads in January

Comments



from Hacker News http://bbc.in/XeFwqb

SSD vs. HDD Pricing: Seven Myths That Need Correcting

Comments



from Hacker News http://bit.ly/XeFyyk

Building applications for Firefox OS using AngularJS

Comments



from Hacker News http://mzl.la/1rFYQpL

People say techies are invading SF. They said the same about my immigrant GF

Comments



from Hacker News http://wapo.st/XeFezK

Dutch companies providing APIs and room for a big hackaton

Comments



from Hacker News http://bit.ly/XeFcrC

FreeBSD 9.3

Support for FreeBSD 9.3 has been introduced for these products: ESXi 5.5 Update 1 For more information about software support, please check the VMware Compatibility Guide



from VMware Blogs http://bit.ly/1pF1JEv

FreeBSD 9.3

Support for FreeBSD 9.3 has been introduced for these products:



  • ESXi 5.5 Update 1


For more information about software support, please check the VMware Compatibility Guide






via VMware Blogs http://bit.ly/1pF1JEv

Instasheep — Instagram Account Hacking Tool Released





from The Hacker News http://bit.ly/1uGFfv6

Your best passive income – 2014?

Comments



from Hacker News http://bit.ly/XeuaT0

Facebook GitHub repo – Immutable Data Collections for JavaScript

Comments



from Hacker News http://bit.ly/1rFP6M4

McDonald’s Ruling Could Open Door for Unions

Comments



from Hacker News http://nyti.ms/1rFP2vZ

DNS And Docker Containers

Comments



from Hacker News http://bit.ly/1rFOSVp

NSA Playset, 911 hacked and war cats: A wild ride at DEF CON 22

With one week until the eve of America's biggest and most controversial hacker conference, we've got a hotlist of explosive talks set to go off at DEF CON 22.



from Latest Topic for ZDNet in Security http://zd.net/1xyJAfT

Vuln: Moodle Repositories CVE-2014-3541 PHP Code Injection Vulnerability

Moodle Repositories CVE-2014-3541 PHP Code Injection Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1oKuV0H

Signal — Open Source iPhone App to Make Free End-to-End Encrypted Voice Calls





from The Hacker News http://bit.ly/1xyJ4hS

Sharks Cove – Microsoft's Development Board

Comments



from Hacker News http://bit.ly/1Ay9ZPh

Facebook Tweaks for iOS Game Development

Comments



from Hacker News http://bit.ly/1Ay9V1S

Cortana coming to China, India with windows phone update next week

Comments



from Hacker News http://bit.ly/1s3TlST

Eloquent JavaScript (second edition)

Comments



from Hacker News http://bit.ly/1o2Y0Up

USPS Redesign

Comments



from Hacker News http://bit.ly/1pq18JN

Hackers Plundered Firms that Built ‘Iron Dome’ Missile Defense System

Comments



from Hacker News http://bit.ly/1o2XRjC

Show HN: Lyric Analysis of Rolling Stone's Top 100 Artists

Comments



from Hacker News http://bit.ly/1o2XTbe

Game about Squares and Dots – Google Play

Comments



from Hacker News http://bit.ly/1pq19gN

What makes VMAX ideal for mission critical hybrid clouds? #RedefinePossible http://bit.ly/1paBAzW http://bit.ly/1pEPKa3






EMC logo
What makes VMAX ideal for mission critical hybrid clouds? #RedefinePossible http://bit.ly/1paBAzW http://bit.ly/1pEPKa3






via EMC Feeds http://bit.ly/1pEPKab

What makes VMAX ideal for mission critical hybrid clouds? #RedefinePossible http://bit.ly/1paBAzW http://bit.ly/1pEPKa3






EMC logo
What makes VMAX ideal for mission critical hybrid clouds? #RedefinePossible http://bit.ly/1paBAzW http://bit.ly/1pEPKa3






via EMC Feeds http://bit.ly/1pEPKab

Bugtraq: [ MDVSA-2014:140 ] owncloud

[ MDVSA-2014:140 ] owncloud



from SecurityFocus Vulnerabilities http://bit.ly/1pEMdse

Bugtraq: [Onapsis Security Advisory 2014-025] Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool

[Onapsis Security Advisory 2014-025] Multiple Cross Site Scripting Vulnerabilities in SAP HANA XS Administration Tool



from SecurityFocus Vulnerabilities http://bit.ly/1pEMdbG

Bugtraq: [Onapsis Security Advisory 2014-021] SAP HANA XS Missing encryption in form-based authentication

[Onapsis Security Advisory 2014-021] SAP HANA XS Missing encryption in form-based authentication



from SecurityFocus Vulnerabilities http://bit.ly/1ts7ZpX

Vuln: Moodle Quiz CVE-2014-3545 Remote Code Execution Vulnerability

Moodle Quiz CVE-2014-3545 Remote Code Execution Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1pEM6Nn

Vuln: Moodle Shibboleth Plugin CVE-2014-3552 Authentication Bypass Vulnerability

Moodle Shibboleth Plugin CVE-2014-3552 Authentication Bypass Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1pELXd1

Vuln: Moodle CVE-2014-3543 XML External Entity Information Disclosure Vulnerability

Moodle CVE-2014-3543 XML External Entity Information Disclosure Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1pELVSd

Vuln: Moodle CVE-2014-3546 Multiple Information Disclosure Vulnerabilities

Moodle CVE-2014-3546 Multiple Information Disclosure Vulnerabilities



from SecurityFocus Vulnerabilities http://bit.ly/1ts7Gew

How Thieves Can Hack and Disable Your Home Alarm System

Comments



from Hacker News http://wrd.cm/1qKyEy6

Tor security advisory: “relay early” traffic confirmation attack

Comments



from Hacker News http://bit.ly/1s3Kuk2

Why the the open-source Vivaldi tablet never came to market

Comments



from Hacker News http://bit.ly/1s3Ku3D

Open Source OCR in JavaScript

Comments



from Hacker News http://bit.ly/1s3KsbW

Android Users on High Alert After FakeID Bug Discovery

Major vulnerability allows malware to impersonate legitimate apps.



from Infosecurity - Latest News http://bit.ly/1ts0WNO

DDoS-ers Launch Attacks From Amazon EC2

Cybercriminals exploit vulnerability in Elasticsearch software to infiltrate cloud instances.



from Infosecurity - Latest News http://bit.ly/1oKan8x

Show HN: NomadList – the best cities to live and work remotely

Comments



from Hacker News http://bit.ly/UAZLwM

Black Hat researchers actively attack Tor users

Comments



from Hacker News http://bit.ly/UAZLgf

Kaspersky Internet Security Awarded MRG Effitas Online Banking Browser Security Certification

According to the results of the quarterly efficacy assessment of online transaction security conducted by MRG Effitas, Kaspersky Internet Security has received certification for its effective protection of financial information.



from http://bit.ly/1s28xRn

Android "Fake ID" Vulnerability Allows Malware to Impersonate Trusted Apps





from The Hacker News http://bit.ly/1oK6ws3

Tuesday, July 29, 2014

Flexport is hiring an office manager

Comments



from Hacker News http://bit.ly/1mZbN9Q

The Suburbs Will Die: One Man's Fight to Fix the American Dream

Comments



from Hacker News http://ti.me/XadLyW

UK Police Replacing Ads On Piracy Sites With Warnings

Comments



from Hacker News http://bit.ly/1mZbziR

Webinar: How to Protect Against top Web Security Issues With Citrix NetScaler


















This session will cover some of the industry-standard OWASP Top 10, a list describing the most prevalent security attacks on production environments. We will cover the Citrix NetScaler appliance and its role in shutting down these common vulnerabilities, and how to effectively do so through the use of the Application Firewall and protection features. What you will learn - How to protect against security attacks with Application Firewall - How to reinforce your environment through NetScaler protection features - How to simulate a vulnerable web server environment for testing All slides from this webinar series can be found here: http://slidesha.re/Xacloh


Views:0

Length:58:43






from CitrixTV RSS Feed http://bit.ly/XacnMY

Which is better, Adblock or Adblock Plus?

Comments



from Hacker News http://bit.ly/1rY816Y

Show HN: First US based Bitcoin broker/dealer (save 2% on trades)

Comments



from Hacker News http://www.sf-ox.com

Git flight rules–what to do when things go wrong

Comments



from Hacker News http://bit.ly/1rY7RMG

Help advance science while mining cryptocurrency

Comments



from Hacker News http://gridcoin.us/

Fontface Ninja

Comments



from Hacker News http://bit.ly/1rY7x0o

.@Gartner_Inc names #EMC @Syncplicity a leader in their latest Magic Quadrant on enterprise file sync and share http://bit.ly/TVqkMs






EMC logo
.@Gartner_Inc names #EMC @Syncplicity a leader in their latest Magic Quadrant on enterprise file sync and share http://bit.ly/TVqkMs






via EMC Feeds http://bit.ly/Xa0iqY

Demystifying Hadoop: http://bit.ly/Xa0eYf






EMC logo
Demystifying Hadoop: http://bit.ly/Xa0eYf






via EMC Feeds http://bit.ly/UIB9Sr

.@Gartner_Inc names #EMC @Syncplicity a leader in their latest Magic Quadrant on enterprise file sync and share http://bit.ly/TVqkMs






EMC logo
.@Gartner_Inc names #EMC @Syncplicity a leader in their latest Magic Quadrant on enterprise file sync and share http://bit.ly/TVqkMs






via EMC Feeds http://bit.ly/Xa0iqY

Demystifying Hadoop: http://bit.ly/Xa0eYf






EMC logo
Demystifying Hadoop: http://bit.ly/Xa0eYf






via EMC Feeds http://bit.ly/UIB9Sr

Comment Crew Chinese Hackers Blamed for Stealing Israeli Missile Secrets

Notorious PLA unit was after IP related to Israel’s Iron Dome missile defense system, says CyberESI.



from Infosecurity - Latest News http://bit.ly/1nRawb5

A $300M IT flop

Comments



from Hacker News http://bit.ly/1mZ0D52

Your ‘Craft’ Whiskey Is Probably From a Factory Distillery in Indiana

Comments



from Hacker News http://thebea.st/1tnyNYq

Cool Old Terminal – Awesome emulator

Comments



from Hacker News http://bit.ly/1tnyDQP

Circle's Allaire: Bitcoin is Good Money

Comments



from Hacker News http://bit.ly/1mZ0rCJ

Nine Nations of North America 30 years Later

Comments



from Hacker News http://nyti.ms/1xuuiZA

Your users deserve better than Disqus

Comments



from Hacker News http://bit.ly/1xuubx4

Android Fake ID Vulnerability Lets Malware Impersonate Trusted Applications

Comments



from Hacker News http://bit.ly/1AubspN

Indian E-Commerce Firm Flipkart Raises Eye-Popping $1B

Comments



from Hacker News http://nyti.ms/1AubpdC

Show HN: Picsi – My first iOS app (feedback wanted)

Comments



from Hacker News http://www.picsi.me/

Realtidsinformation för tillverkningsindustrin Vina Santa Rita -ett Citrix kundcase


















Realitidsinformation var helt avgörande i beslutsfattandet både på kort och lång sikt. Se hur Citrix hjälpt denna vinproducent att förbättra varje steg i allt från att odla druvor till att tjäna marknaden i 70 länder.


Views:0

Length:02:14






from CitrixTV RSS Feed http://bit.ly/1tnke6V

Debian and the PHP license

Comments



from Hacker News http://bit.ly/1tnet9w

GitHub hooks are not working

Comments



from Hacker News http://bit.ly/1tnet9k

BlackBerry acquires Secusmart, ups voice security ante

BlackBerry's acquisition of German software firm Secusmart is aimed at securing voice and data and putting better mobile security in every president and chancellor's hand.



from Latest Topic for ZDNet in Security http://zd.net/1nQSEwP

New MacBook Pro with retina display

Comments



from Hacker News http://bit.ly/1uDmmsT

Personal Privacy Is Only One of the Costs of NSA Surveillance

Comments



from Hacker News http://wrd.cm/1mYGNGW

Happy 56th Birthday, NASA

Comments



from Hacker News http://bit.ly/1mYGL1N

Informazioni in tempo reale per il settore produttivo- Viña Santa Rita -Storia di un cliente Citrix


















Quando si tratta di dover prendere una decisione, sia nel breve sia nel lungo termine, disporre di informazioni in tempo reale fa la differenza. Scoprite come Citrix aiuta questa azienda vinicola a ogni passo, dalla coltivazione dell'uva alla distribuzione dei propri prodotti sui mercati di più di 70 paesi.


Views:2

Length:02:14






from CitrixTV RSS Feed http://bit.ly/1zqlA1q

Using SSL Certificates with HAProxy 1.5

Comments



from Hacker News http://bit.ly/1pAJDDO

The NSA's Cyber-King Goes Corporate

Comments



from Hacker News http://atfp.co/1pAJvEa

Coolant Crisis – From Agile Teamwork to Lone-Wolf Game Development

Comments



from Hacker News http://bit.ly/1pAJyjn

Rhaetian Railway - ett Citrix kundcase


















Fjärrmiljöer blir mobila arbetsplatser med tillgång till applikationer och data både on-line och off-line. Se hur detta Rhaetian Railway använde Citrix för att utveckla sin mobilitetsstrategi.


Views:1

Length:02:14






from CitrixTV RSS Feed http://bit.ly/1tmVJH9

Internet of things big security worry, says HP

HP found 25 vulnerabilities per device including everything from TVs to thermostats to home alarms and scales.



from Latest Topic for ZDNet in Security http://zd.net/1tW7tOd

AptDeco NYC is hiring - Marketing Manager

Comments



from Hacker News http://bit.ly/WLnHPw

Google Startup Launch

Comments



from Hacker News http://bit.ly/1pAsyts

HTML5 Drag and Drop considered harmful (2009)

Comments



from Hacker News http://bit.ly/WLnH2a

How a bug in Dropbox permanently deleted my 8000 photos

Comments



from Hacker News http://bit.ly/1pAsrhH

German minister: best for Snowden to return to US

Comments



from Hacker News http://wapo.st/WLnE6m

PVS-Studio: Checking Bitcoin

Comments



from Hacker News http://bit.ly/WLnGeo

Nation-E Readies Cybersecurity Center for Critical Infrastructure

The focus will be on training and disaster preparedness.



from Infosecurity - Latest News http://bit.ly/1kkEjIs

Scalable Collaborative Filtering with Spark MLlib

Comments



from Hacker News http://bit.ly/1Atuv3x

Training Tomorrow's Data Scientists http://bit.ly/1pAjiWk http://bit.ly/1pAjkxB






EMC logo
Training Tomorrow's Data Scientists http://bit.ly/1pAjiWk http://bit.ly/1pAjkxB






via EMC Feeds http://bit.ly/1nCNFPb

Training Tomorrow's Data Scientists http://bit.ly/1pAjiWk http://bit.ly/1pAjkxB






EMC logo
Training Tomorrow's Data Scientists http://bit.ly/1pAjiWk http://bit.ly/1pAjkxB






via EMC Feeds http://bit.ly/1nCNFPb

Personal Privacy Is Only One of the Costs of NSA Surveillance

There is no doubt the integrity of our communications and the privacy of our online activities have been the biggest casualty of the NSA’s unfettered surveillance of our digital lives. But the ongoing revelations of government eavesdropping has had a profound impact on the economy, the security of the internet and the credibility of the […]

















from WIRED » Threat Level http://wrd.cm/1zq1uo2

Code Library Re-use Seeds Flaws in Top Android Apps

Private phone info is being sent to third party ad networks in many best-selling apps, new research says.



from Infosecurity - Latest News http://bit.ly/1zq0vnS

New MacBook Pros

Comments



from Hacker News http://bit.ly/WLi441

Facebook Self-XSS Scam Fools Users into Hacking Themselves





from The Hacker News http://bit.ly/1tmlWWo

Monday, July 28, 2014

Against the larger phone

Comments



from Hacker News http://bit.ly/1nziqEG

Text Analytics — breaking new ground in data and request management. Our #EMC IT data scientists take a deeper dive. http://bit.ly/1rRRocV






EMC logo
Text Analytics — breaking new ground in data and request management. Our #EMC IT data scientists take a deeper dive. http://bit.ly/1rRRocV






via EMC Feeds http://bit.ly/1rRRod7

This Is What Tech's Ugly Gender Problem Really Looks Like

Comments



from Hacker News http://wrd.cm/1qaeLeX

Text Analytics — breaking new ground in data and request management. Our #EMC IT data scientists take a deeper dive. http://bit.ly/1rRRocV






EMC logo
Text Analytics — breaking new ground in data and request management. Our #EMC IT data scientists take a deeper dive. http://bit.ly/1rRRocV






via EMC Feeds http://bit.ly/1rRRod7

Enabling KVM virtualization on ARM (Allwinner A20)

Comments



from Hacker News http://bit.ly/1nzc5cn

Dear Instagram

Comments



from Hacker News http://bit.ly/1qaesR2

NPR One

Comments



from Hacker News http://n.pr/1qaefNM

Join Bill Schmarzo's webcast on 7/31 as he discusses the "Next Wave of Big Data"...






EMC logo
Join Bill Schmarzo's webcast on 7/31 as he discusses the "Next Wave of Big Data" hosted by Data360 & EMC!

Register here: http://bit.ly/bdschmarzo










via EMC Feeds http://bit.ly/1oB1a2c

Join Bill Schmarzo's webcast on 7/31 as he discusses the "Next Wave of Big Data"...






EMC logo
Join Bill Schmarzo's webcast on 7/31 as he discusses the "Next Wave of Big Data" hosted by Data360 & EMC!

Register here: http://bit.ly/bdschmarzo










via EMC Feeds http://bit.ly/1oB1a2c

UK’s Youngsters Embark on Week Long Festival of Code

Programmers under 18 are given a chance to test their skills.



from Infosecurity - Latest News http://bit.ly/1xp8PkI

UK Drops Charges Against US Hacking Suspect Love

British man released from bail but another US indictment is filed as extradition pressure mounts.



from Infosecurity - Latest News http://bit.ly/1oAXSMm

Easy e-Filing of Tax Returns in India

Comments



from Hacker News https://cleartax.in/

A resource for quickly accessing and testing Material Design colors

Comments



from Hacker News http://bit.ly/1rRz9o7

The first Swift conference worldwide (Feb 6th, Paris)

Comments



from Hacker News http://bit.ly/1q9WQow

Amazon 3D Printing Store

Comments



from Hacker News http://amzn.to/1q9WP3R

Hackers Plundered Israeli Defense Firms that Built Missile Defense System

Comments



from Hacker News http://bit.ly/1rRyYco

IBM Security Bulletin: Fixes available for Security Vulnerabilities in IBM WebSphere Portal related to Unified Task List (UTL) Portlet (CVE-2014-3054, CVE-2014-3055, CVE-2014-3056, CVE-2014-3057)

Fixes are available for security vulnerabilities in IBM WebSphere Portal related to the Unified Task List (UTL) Portlet. CVE(s): CVE-2014-3054 , CVE-2014-3055 , CVE-2014-3056 and CVE-2014-3057 Affected product(s) and affected version(s): ...



from IBM Product Security Incident Response Team http://ibm.co/1lMWXDH

Zillow to Acquire Trulia for $3.5B

Comments



from Hacker News http://nyti.ms/1xoR4Sy

Show HN: Contactive API – Turn telephone numbers into full profiles

Comments



from Hacker News http://bit.ly/1Apyf6j

Amazon Store for on demand 3d printed products

Comments



from Hacker News http://amzn.to/1xoQTXz

Russia regains control of lizard sex satellite

Comments



from Hacker News http://bit.ly/1xoQSmu

Ask HN: How to find co-founders

Comments



from Hacker News http://bit.ly/1Apyb6w

Vuln: Zarafa WebAccess and WebApp Local Information Disclosure Vulnerability

Zarafa WebAccess and WebApp Local Information Disclosure Vulnerability



from SecurityFocus Vulnerabilities http://bit.ly/1uz167C

Russia offers $110,000 to crack Tor anonymous network

Comments



from Hacker News http://bbc.in/1xoKD22

Ask HN: Are there any lesser know open source projects that need contributors?

Comments



from Hacker News http://bit.ly/1xoKtaR

Soundcloud sucks at music discovery, so I built what we musicians do

Comments



from Hacker News http://bit.ly/1k3Ff3C

IFTT: A review

Comments



from Hacker News http://bit.ly/1xoKv2p

The new land of opportunity for immigrants is Germany

Comments



from Hacker News http://wapo.st/1k3FgV9

Zillow to Buy Trulia in $3.5B Deal

Comments



from Hacker News http://on.recode.net/1xoKqf7

Ask HN: Should we hire a CEO to run our growing company?

Comments



from Hacker News http://bit.ly/1q9xcQM

What price for free wifi? (BBC report on tracking users via wifi)

Comments



from Hacker News http://bbc.in/1q9xc3o

Show HN: An app that alerts you when your favourite products has a price change

Comments



from Hacker News http://bit.ly/1rReJvl

LG Announces 11.6-inches Android Tab Book Hybrid With Intel Core i5 CPU

Comments



from Hacker News http://bit.ly/1xosiSH

Kontakt.io beacon hardware and software company

Comments



from Hacker News http://bit.ly/1oAkEUw

Emms 4.0 released

Comments



from Hacker News http://bit.ly/1oAkH2C

What price for free wi-fi?

Comments



from Hacker News http://bbc.in/1xosgdr

Use of Formal Methods at Amazon Web Services [pdf]

Comments



from Hacker News http://bit.ly/1oAkCvV

Podcast: Sam Altman on Start-ups, Venture Capital, and the Y Combinator

Comments



from Hacker News http://bit.ly/1mUptTx

Banned for Life

Comments



from Hacker News http://bit.ly/1nN9o8g

Why Cloud Foundry? http://bit.ly/1o5Noj3 @pivotal http://bit.ly/X379Tb






EMC logo






via EMC Feeds http://bit.ly/X37cOJ

Why Cloud Foundry? http://bit.ly/1o5Noj3 @pivotal http://bit.ly/X379Tb






EMC logo






via EMC Feeds http://bit.ly/X37cOJ