You’re accessing archived content
This is archived content from the UIT website. Information may be outdated, and links
may no longer function. Please contact stratcomm@it.utah.edu if you have any questions about archived content.
You’re accessing archived content
This is archived content from the UIT website. Information may be outdated, and links may no longer function. Please contact stratcomm@it.utah.edu if you have any questions about archived content.
Interesting and relevant links
Your writers for Node 4 occasionally come across stories that we think would be interesting or relevant to our readership. We'll post those links here each issue.
8 ways to be everyone’s favorite coworker | Mashable
C.H.I.P. - the super tiny computer that only costs $9 | Mashable
Coding and creativity could conquer the digital divide | Mashable
IT talk: The latest innovation driving enterprise networking and infrastructure simplicity | Mashable
Managing an employee with a different communication style | Mashable
Probing the whole Internet - in under an hour - for major security flaws | Mashable
The pros and cons of public, private and hybrid clouds | Mashable
DARPA’s plan to make software security “the domain of machines” | Naked Security
Practical IT: What you need to know about email encryption | Naked Security
Your “strong” password may be weaker than you think | ReadWrite
For task completion, Cortana now integrates more deeply with apps | Search Engine Land
Reading, Writing, ‘Rithmetic, ‘Rogramming: Should every school class be a computer coding class? | Slate
Great Cannon, POODLE, Heartbleed: How cybersecurity threats get names | Slate
An economy of trust: how transparency is changing the tech industry | WIRED
Email phishing attacks take just minutes to hook recipients | WIRED
The future of big data looks like streaming | WIRED
AI startups are reinventing media | WIRED
The privacy revolt: the growing demand for privacy-as-a-service | WIRED
Small packages of code are the biggest thing in app-making | WIRED
DDoS attacks are getting worse, as attackers shift tactics and targets | ZDNet
Why a CISO's job has never been more public or chaotic | ZDNet