You’re accessing archived content
This is archived content from the UIT website. Information may be outdated, and links
may no longer function. Please contact stratcomm@it.utah.edu if you have any questions about archived content.
You’re accessing archived content
This is archived content from the UIT website. Information may be outdated, and links may no longer function. Please contact stratcomm@it.utah.edu if you have any questions about archived content.
Relevant and interesting links
Your writers for Node 4 occasionally come across stories that we think would be interesting or relevant to our readership. We'll post those links here each issue.
7 signs that you're acing an in-person job interview | Mashable
9 scheduling benefits employees love | Mashable
Google offers security tips for staying safe online | Mashable
How a man used 3D printing to help treat his wife’s brain tumor | Mashable
Thunderstrike: the scary vulnerability in your Mac's Thunderbolt port | Mashable
The worst and biggest data breaches of 2014 | Mashable
Warning: A computer science degree may be a waste of your time and money | Mashable
Why no one should multitask – and how I finally stopped | Mashable
Zombie cookie: The tracking cookie that you can’t kill | Mashable
Changing of the guard: Cisco Systems overtakes Oracle’s lagging hardware business | Motley Fool
Computer scientists "crack" poker | Naked Security
Ransomware with a difference – this one is a true virus | Naked Security
Steep rise in medical data breaches blamed on human error | Naked Security
Browsing in privacy mode isn't as secure as you think | ReadWrite
Open source: Both bigger and less relevant that you imagined | ReadWrite
How open source can fix 2015's data entropy | ReadWrite
Stop putting your email address in Your email signature | Slate
The AI bot that scans your email and automatically schedules meetings | WIRED
Are we asking the right questions in the wake of the sony pictures breach? | WIRED
The biggest security threats we’ll face in 2015 | WIRED
Computational creativity and the what-if machine | WIRED
A new generation of data requires next-generation systems | WIRED
Our system is so broken, almost no patented discoveries ever get used | Wired