2015년 3월 14일 토요일

10 insanely innovative, incredibly cool Raspberry Pi projects

ITworld
ITworld Today
March 14, 2015

10 insanely innovative, incredibly cool Raspberry Pi projects

Here are 10 of the most thrilling examples of makers getting creative with the $35 Raspberry Pi. READ MORE
 

Issue highlights

WHITE PAPER: BMC Software

Best Practices Guide to Manage Mainframe Software Charges

Monthly license charges (MLC) are rising by 7% or more each year, and account for 30% of total mainframe costs. Yet managing MLC costs is an inexact science. This best practice guide provides a step-by-step process to reduce mainframe MLC costs up to 20% without compromising business critical services. LEARN MORE

Reality check: Apple Watch vs. Pebble Time (vs. no smartwatch at all)

We compare the Apple Watch and the Pebble Time on features like screen quality, battery life, functionality, and price. Both work with iOS, but that's just about all they have in common. READ MORE

Hotel guests open the door to a robotic butler

If a guest is staying at the Aloft hotel in Cupertino, Calif. and asks for a comb or a late-night snack, the guest may be surprised at who -- or what -- brings it to the room. READ MORE

What NOT to share on LinkedIn

LinkedIn constantly encourages its users to share more about themselves, but more isn't always best. READ MORE

Oracle lays out Lego-like future of Java

At EclipseCon, an Oracle exec shares a vision of a modular Java 9 from which developers can draw on to assemble what they need. READ MORE
WHITE PAPER: Quantum Secure

When It Comes to Security, Can You Identify Insider Threats?

To address the evolving insider threat landscape, enterprises need to think about their own potential for insider threats. Download this exclusive Tech Dossier to learn what insider threats look like, how to protect against them, and why Quantum Secure can help. LEARN MORE >>
INSIDER

9 networking tips for introverts

Successful networking can be difficult for anyone, but it’s especially challenging if you’re introverted and shy by nature. Here, experts share networking tips that should make the process easier, if not completely painless. READ MORE

Google’s smart-home plans include 'neighborhood security networks' and security ratings for homes

Google is toying with the idea of scoring smart homes on how secure they are. READ MORE

5 things the MacBook needs in the next generation

Just like the MacBook Air needed a second iteration to make sense, the second-gen MacBooks could be truly amazing. READ MORE

Why is Apple avoiding wireless charging?

Samsung recently announced its Galaxy 6 and S6 Edge will have native wireless charging. Other, less-popular mobile devices also have it. But Apple has shunned the technology so far with its iPhone models and with its most mobile device to date, the Apple Watch. READ MORE

WIN THIS BOOK: Effective Python: 59 Specific Ways to Write Better Python

We've got 5 copies to give to some lucky readers. Enter for your chance to win! READ MORE
WHITE PAPER: Quantum Secure

The Road to Predictive Analytics Paved with Good Intentions

Learn why the time to start thinking about the most effective ways to deploy predictive analytics for security and to address key areas—security policies, physical security and audits—is now. LEARN MORE >>
BECOME AN ITWORLD INSIDER
Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

R programming beginner's guide
IT Resume Makeover: Emphasize your 'X factor'
4 open source monitoring tools that deserve a look
Free and cheap ways to learn about IT security
PowerShell for beginners: Scripts and loops
Six Ted talks that can change your career

What are you waiting for? Sign up today!
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

댓글 없음:

댓글 쓰기