If you have trouble reading this e-mail, go to: http://www.nytimes.com/indexes/2010/09/30/technology/techupdate/index.html |
September 30, 2010Tech Update |
In a Computer Worm, a Possible Biblical ClueBy JOHN MARKOFF and DAVID E. SANGERA reference in computer code to the Book of Esther may or may not be a sign of an Israeli origin to the Stuxnet worm. Web Tastes Freedom Inside Syria, and It's BitterBy ROBERT F. WORTHA draft law regulating online media would clamp down on bloggers and other journalists. ADVERTISEMENT AdvertisingCosmo Campaign Puts Viewers in the Photo ShootBy JANE L. LEVEREHearst, the publisher of Cosmopolitan, is spending $1.5 million for what is the magazine's first global, digital advertising campaign. Private Moment Made Public, Then a Fatal JumpBy LISA W. FODERAROTyler Clementi killed himself after an intimate encounter was broadcast. Nintendo Says 3-D Device Will Arrive After HolidaysBy HIROKO TABUCHIThe company said its new 3DS console would not be available until early next year, meaning it will miss the crucial year-end holiday sales season. Room For DebateCan Twitter Lead the Masses?What are the limitations of social media tools in inciting political activism? Technology Most E-Mailed | Personal TechState of the ArtA Simple Swipe on a Phone, and You're PaidBy DAVID POGUEThe Square device snaps into an iPhone and allows you to become a credit card authorizing entrepreneur. No setup fees, no two-year contract - you're in business. The Social Network That Gets Down to BusinessBy MIGUEL HELFTLinkedIn allows its 75 million users to network with other professionals to find jobs or help build their businesses. App SmartHealthful Reminders for Medications, Beyond an Apple a DayBy BOB TEDESCHIAppropriately enough, using the apps that remind you to take medications feels like ingesting medicine - an unpleasant chore, but good for you. |
About This E-MailYou received this message because you signed up for NYTimes.com's Tech Update newsletter. As a member of the TRUSTe privacy program, we are committed to protecting your privacy. |
No comments:
Post a Comment