2015년 3월 9일 월요일

How to stop obnoxious online comments


How 2 legal cases may decide the future of open source software
Your Morning Countdown
  March 09, 2015 Read about an effort to stem the tide of abusive online comments through user interface and interaction design.
10.How 2 legal cases may decide the future of open source software

9.Phil Johnson: IKEA’s phone charging furniture will revolutionize home arguments [CARTOON]

8.10 cool tablets from MWC 2015

7.Peter Smith: Steam Machines hit the Steam Store

6.Two indicted for stealing 1 billion email addresses in historic breach
WEBCAST: Fortinet
Breaking the Kill Chain
In this webcast subject matter experts discuss, in technical detail, 1) the current trends and the latest information on the global cybercrime eco-system 2) all the different elements that make up the “Kill Chain” 3) protective steps that forward-thinking companies are taking to break the kill chain to minimize the chances of a data breach.
Learn more >>
5.Visa, MasterCard partner with mobile money providers in Africa

4.Andy Patrizio: SanDisk jumps into enterprise SSD market

3.Jim Lynch: uTorrent installs cryptocurrency miner on user computers

2.Melanie Pinola: How to hide specific Google+ circles from your Google Contacts list

1.Building an abuse-resistant commenting system
WHITE PAPER: Fortinet
Securing ICS Infrastructure for NERC Compliance
This paper 1) summarizes the NERC CIP requirements, 2) identifies the key security capabilities in that contribute to compliance and 3) outlines solutions that meet NERC needs.
Learn more >>
  Most Popular
The smartphone stars of MWC 2015

VMware sued for alleged GPL license infractions

5 steps for transforming your business using data

Fujitsu tech can track heavily blurred people in security videos

Amazon opens store on Alibaba to sell imported goods in China
WHITE PAPER: Fortinet
Transform Your WiFi Network Into A Secure Wireless LAN
Broad adoption of WiFi has created a complex Wireless landscape with proliferating mobile devices and applications. It is no longer sufficient to treat all wireless users and applications alike. Threats from social media networks and mobile malware provide a compelling need to deploy and enforce granular WLAN control policies.
View Now>>

댓글 없음:

댓글 쓰기