How to do open source right: LinkedIn shows the way

Email not displaying correctly? View it in your browser.

InfoWorld Daily: Morning Edition

Aug 30, 2017
Featured Image

3 projects lighting a fire under machine learning

PyTorch, MXNet, and upstart Java-centric Smile bring greater speed and ease to model training and deployment Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to do open source right: LinkedIn shows the way
40% off Lexar microSD To Lightning Reader - Deal Alert
NativeScript: Build native iOS and Android apps with JavaScript
Pivotal, VMware team up to deploy Kubernetes on vSphere

White Paper: Citrix Systems

10 Reasons to Strengthen Security with App and Desktop Virtualization

Data security has become an increasingly critical concern for all organizations. In this paper, we explore 10 reasons why app and desktop virtualization should be the foundation for your layered approach to information security. Read More

Thumbnail Image

How to do open source right: LinkedIn shows the way

LinkedIn is a model for producing open source code that really matters to a community—and highlights why developers would want to work for you Read More

Thumbnail Image
DealPost

40% off Lexar microSD To Lightning Reader - Deal Alert

With its Lightning connector, this reader makes it easy to move all your favorite content to & from your iOS device on the go. So whether you’re offloading stunning action photos or epic adventure video, it’s got you covered. Read More

Thumbnail Image

NativeScript: Build native iOS and Android apps with JavaScript

NativeScript lets you use Angular, TypeScript, or JavaScript to build mobile apps with a truly native look and feel Read More

Thumbnail Image

Pivotal, VMware team up to deploy Kubernetes on vSphere

Pivotal Container Service provides enterprise Kubernetes atop VMware vSphere and Cloud Foundation in public and private clouds Read More

eBook: Forcepoint

Advanced Evasion Techniques for Dummies

Welcome to Advanced Evasion Techniques For Dummies, your guide to the security evasion techniques that have become a serious preoccupation of the IT industry. This isn't to say that IT security hasn't been a major source of worry in the past; on the contrary, the last decade has been witness to growing security threats, cybercrime and compliance regulations. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Daily: Morning Edition as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.