skip to main | skip to sidebar

Bilişim Hukuku Günlüğü

YOUR TIME IS LIMITED... HAVE TO COURAGE TO FOLLOW YOUR HEART and INTUITION. - Steve Jobs

Nanex Research-25 January 2013-Liquidating Apple

Gönderen leyla keser berber on 27 Ocak 2013 Pazar
Etiketler: Apple, ICT Companies
See:
http://www.nanex.net/aqck2/4089.html

0 yorum:

Yorum Gönder

Sonraki Kayıt Önceki Kayıt Ana Sayfa

Destekleyenler

  • Beyaz Şapka
  • Bilgisayar Polisi
  • Life (Over) IP
  • Nebula Bilişim

İzleyiciler

Beyaz Şapka Bilgi Güvenliği Topluluğu

Yükleniyor...

Bağlantılar

  • LLB Danışmanlık
  • Bilgi Üniversitesi
  • herbelge.com
  • bilgiedinmehakki.org
  • Bilgisayar Polisi
  • guvenlik.info
  • Internet ve Hukuk Platformu
  • e-kesif.com

Günlükte Ara

Hakkımda

Hakkımda
Yrd. Doç. Dr. Leyla Keser Berber
  • Özgeçmiş
  • Yayın Listesi
  • Creative Commons

Etiketler

  • 4G (1)
  • 5651 Sayılı Kanun (9)
  • Aaron Swartz (12)
  • Accelerating Intelligence (3)
  • Access Control (1)
  • Adalet Bakanlığı (1)
  • Adli Bilişim (15)
  • Aerodynamic (5)
  • Aeronautics (7)
  • Agent Based Model; System of Systems (SoS) (1)
  • Aile Hekimliği (1)
  • Alan Adları (1)
  • Alan F. Westin (1)
  • Alan Turing (1)
  • Alternative Dispute Resolutions (1)
  • Animals (4)
  • Anti-Bullying (1)
  • Anti-Forensics (1)
  • Anti-Piracy (4)
  • Antitrust (9)
  • Apple (4)
  • Applied Mathematics (1)
  • Arbitration (1)
  • Architecture Software Systems (1)
  • Article 29 WP (14)
  • Artificial Creativity (1)
  • Artificial Intelligence (AI) (14)
  • Astro/Social Turf (1)
  • Astronomy (1)
  • Asyncronous System (1)
  • Atomic Clock (1)
  • Atos (1)
  • Augmented Reality (7)
  • Authentication Methods (11)
  • Aviation (30)
  • Avukatlık Kanunu; Reklam Yasağı Yönetmeliği (3)
  • Baldrige (2)
  • Behavioral Advertising (5)
  • Behavioral Economics (1)
  • Berkman Center (8)
  • BIG TENT 2012 İstanbul (1)
  • Big Data (27)
  • Bikes (1)
  • Bilgi Edinme Hakkı (2)
  • Bilgi Güvenliği (17)
  • Bilgi Toplumu (6)
  • Bilgi ve İletişim Teknolojileri (2)
  • Bilişim Adası; Bilgi Ekonomisi; Bilişim Teknolojisi Hukuku (1)
  • Bilişim Teknolojisi Hukuku (9)
  • Bilişim ve İnternet (2)
  • Bilişim ve Teknoloji Hukuku Enstitüsü (24)
  • Bilişim ve Teknoloji Hukuku Sertifika programı (1)
  • Binding Corporate Rules (BCRs) (2)
  • Bioinformatic (1)
  • Biological Engineering (1)
  • Biology (2)
  • Biometric Methods (31)
  • Biometry (5)
  • Birleşme ve Devralma (1)
  • Bitcoin (8)
  • biyometrik yöntemler (2)
  • BKM (1)
  • BOOK (167)
  • BotNet (5)
  • Brain (8)
  • Brain Computer Interface (5)
  • Brain-to-Brain-Interface (1)
  • Broadband (5)
  • BSI (4)
  • BTK (4)
  • Buisness (1)
  • Bulut Bilişim (1)
  • Business (3)
  • Business Continuity Management (3)
  • BYOD (2)
  • CA (1)
  • Cars (4)
  • Cars; Technology and Innovation (32)
  • Case Management (1)
  • Cellular Networks (1)
  • CEN (3)
  • Censorship (17)
  • Certification Authority (CA) (1)
  • CERTs (1)
  • Child Protection (2)
  • Clayton M. Christensen (1)
  • Cloud Computing (89)
  • Cloud Forensics (4)
  • Cloud Robotics (1)
  • CMK (1)
  • Code of Conduct (1)
  • Cognitive Sciences (1)
  • Common Creative (3)
  • Communication Techniques (9)
  • Computation (1)
  • Computational analysis and design (1)
  • Computational Biology (3)
  • Computational Imaging (1)
  • Computational Science (1)
  • Computer Forensics (15)
  • Computer Fraud and Abuse Act (1)
  • Computer Science (4)
  • Computer Science; Artificial Intelligence (AI) (1)
  • Consumer Protection (1)
  • Content (1)
  • Content Delivery Networks (CDN) (1)
  • Convergence (1)
  • Cookie Yasası (1)
  • Copula Estimation (1)
  • Copyright (8)
  • Counterfeiting (1)
  • Court Decisions on ICT (1)
  • Crashworthiness Analysis (1)
  • Creativity (6)
  • CRM (1)
  • Crowdsourcing (2)
  • Cryptographic Key Generation (1)
  • Cryptographic Key Management (7)
  • Cryptography (19)
  • Cryptology (9)
  • CWA (1)
  • Cyber Bullying (1)
  • Cyber Crime (4)
  • Cyber Crimes (11)
  • Cyber Legislation (1)
  • Cyber Money (1)
  • Cyber Security (155)
  • Cyber Threat (1)
  • Cyber Threats (54)
  • Cypherpunk (1)
  • Çevreci Bilişim (1)
  • Çevreci Bilişim (Green IT) (3)
  • Çevreci Bilişim Hukuku (Green IT Law) (1)
  • Data (2)
  • Data Breach (7)
  • Data Centers (13)
  • Data Mining (4)
  • Data Protection (114)
  • Data Recovery (2)
  • Data Retention (7)
  • Davranışsal Hedefleme (1)
  • DDos (2)
  • Denizcilik ve Haberleşme Bakanlığı (1)
  • Digital Agenda (1)
  • Digital Certifcate (1)
  • Digital Company (3)
  • Digital Divide (4)
  • Digital Due Process (1)
  • Digital Economy (3)
  • Digital Europe (1)
  • Digital Hospital (1)
  • Digital Library (1)
  • Digital Publishing (1)
  • Dijital Ekonomi (1)
  • Disclosure (1)
  • DMCA (3)
  • DNA (3)
  • DNA Collection (1)
  • DNA Encoding (1)
  • DNA Sequence (1)
  • DNA Signature (1)
  • DNS (2)
  • DNS Filtering (1)
  • Dogs (9)
  • Domain Names (3)
  • Douglas Engelbart (1)
  • e-Apostil (1)
  • e-Archiving (2)
  • e-Authentication (2)
  • e-Bay (1)
  • e-belge; e-haciz (1)
  • e-Book (4)
  • e-commerce (27)
  • e-Communication (3)
  • e-Communication Infrastructures (8)
  • e-Devlet (10)
  • e-discovery (14)
  • e-Evidence (3)
  • e-Fatura (3)
  • e-Genel Kurul Bilişim Sistemi (1)
  • e-General Assembly Informatics System (1)
  • e-Government (13)
  • e-Health (2)
  • e-Health Records (7)
  • e-Heath Records; Health IT (35)
  • e-ID (8)
  • e-Identity (2)
  • e-Inclusion (1)
  • e-Invoicing (5)
  • e-İhale (1)
  • e-İmza (5)
  • e-kapasite; e-skills (1)
  • e-Keşif (3)
  • e-Kimlik Kartları (1)
  • e-Learning (9)
  • e-money (6)
  • e-Oy; e-Demokrasi; e-Parlamento (1)
  • e-Participation (1)
  • e-Pass (1)
  • e-Payment (15)
  • e-Prescription (1)
  • e-sağlık (4)
  • e-Signature (6)
  • e-Tebligat; (2)
  • e-Tebligat; Uluslararası e-Tebligat (1)
  • e-Ticaret (6)
  • e-Transformation (1)
  • Eavesdropping (4)
  • Economy (11)
  • Edgar Allan Poe (1)
  • Education (5)
  • edX (1)
  • EGKS (7)
  • Ekonomi (1)
  • Electronic Frontier Foundation (EFF) (3)
  • Elektronik Delil (1)
  • Elektronik Genel Kurul Sistemi (1)
  • Elektronik Haberleşme (2)
  • Elektronik İmza (3)
  • elektronik sağlık kayıtları (2)
  • Emoticon (1)
  • Emotional Intelligence (EI) (1)
  • EnCase (1)
  • Encryption (7)
  • Energy (6)
  • ENISA (25)
  • Environment (27)
  • epSOS (1)
  • Erdoğan Büyükkasap (1)
  • ESK (1)
  • Ethernet (1)
  • Ethics (1)
  • ETSI (2)
  • ETSI; ICT Events (4)
  • EU (1)
  • Eulerian Motion (1)
  • Eurobarometer (1)
  • Evidence (1)
  • Exploit (3)
  • Extreme Sports (3)
  • F1 (10)
  • Facebook (7)
  • Fatih Project (1)
  • FCC (4)
  • Fibre Optic (1)
  • Fikri Mülkiyet (2)
  • Filtreleme (2)
  • Finance (2)
  • Finansal Tablolar (1)
  • Flight Kinematics (1)
  • FoI (1)
  • Forensic Analysis (1)
  • Forensic Science (2)
  • Free Fall (1)
  • FTC (5)
  • Gaming (1)
  • Gaziantep (13)
  • GE (1)
  • Geek News (4)
  • Gender Equality (1)
  • Genetics (3)
  • Global Change (1)
  • Google (4)
  • GPS (2)
  • Green Button (1)
  • Green IT (21)
  • GSO; Gaziantep (21)
  • Güvenli İnternet (6)
  • Hackathon (1)
  • Hague Securities Convention (1)
  • Hak ve Özgürlükler ve İnternet (2)
  • Hash Algorithms (3)
  • hay (1)
  • Haystack (277)
  • Health and IT (11)
  • Health IT (20)
  • Heliski (1)
  • HIMSS (1)
  • HIPAA (1)
  • High Order Methods (1)
  • High-Tech Sports (1)
  • Honeypot (1)
  • Honeywords (1)
  • Human Brain Project (11)
  • IAB (2)
  • IAPP (2)
  • IBM (1)
  • ICANN (8)
  • ICT (5)
  • ICT Companies (71)
  • ICT Events (124)
  • ICT Infrastructures (5)
  • ICT news (109)
  • ICT Products (162)
  • ICT Regulations (2)
  • ICT Standards (17)
  • ICT statistics (1)
  • ICT Trends (2)
  • ICT4Peace Foundation (1)
  • ICTA (4)
  • IDC (1)
  • Identity Theft (1)
  • IGF İstanbul 2014 (1)
  • INET İstanbul (1)
  • Information Economy (2)
  • Information Management (2)
  • Information Security (217)
  • Information Society (11)
  • Information Technologies (11)
  • Information Theory (2)
  • Innovation (4)
  • Intellectual Property; Copyright (29)
  • Intelligent Content (1)
  • Internet (25)
  • Internet Activism (2)
  • Internet Advertising (1)
  • Internet Content (2)
  • Internet Governance (35)
  • Internet Improvement Board (1)
  • Internet Laws and Regulations (2)
  • Internet of Things (IoT) (2)
  • Interoperability (3)
  • IoT (1)
  • IPv6 (2)
  • Isaac Newton (1)
  • ISACA (3)
  • ISO (1)
  • ISO 27001 (1)
  • ISO Standards (3)
  • ISO/IEC (5)
  • ISO/IEC 27032:2012 (1)
  • ISOC (2)
  • IT Law Institute (2)
  • ITU (9)
  • i-Transportation (1)
  • İnternet Alan Adları (1)
  • İnternet Bankacılığı (3)
  • İnternet Erişiminin Engellenmesi (6)
  • İnternet Yönetişimi (3)
  • İnternet'te Sansür (5)
  • İnternette Eser Sahipliği ve Teknolojik Koruma (2)
  • İstanbul (4)
  • İstanbul Bilgi University IT Law Institute (13)
  • İstanbul Bilgi Üniversitesi (1)
  • İstanbul Bilgi Üniversitesi Bilişim ve Teknoloji Hukuku Enstitüsü (5)
  • İstanbul Chamber of Commerce (İTO) (1)
  • J.R.R. TOLKIEN (3)
  • Joseph Alois Schumpeter (1)
  • Kayıtlı Elektronik Posta (4)
  • Kemal Merkit (2)
  • Kenan Sofuoğlu (2)
  • kimlik doğrulama (1)
  • Kişisel (1)
  • Kişisel Sağlık Verileri (7)
  • Kişisel Verileri Koruma Kurulu (1)
  • Kişisel verilerin korunması (67)
  • Kitap (1)
  • Kriptografi (1)
  • KVKK (2)
  • Language Processing (1)
  • Law and Economy (1)
  • LES (1)
  • Linux (1)
  • LTE (4)
  • m-Payment (4)
  • m2m (2)
  • Machine Learning (6)
  • Machine-to-Machine M2M (2)
  • Mahremiyet (15)
  • Marmara Üniversitesi Hukuk Fakültesi (1)
  • Master Programı (8)
  • Mathematic (1)
  • Measurements (1)
  • Media (1)
  • Medicine (6)
  • Medicine-Innovation and Technology (14)
  • Memory (1)
  • merkezi tüzel kimlik projesi (1)
  • MetaData (1)
  • Mezopotamya Rallisi (1)
  • MKK (12)
  • Mobile e-Signature (1)
  • Mobile Economy (1)
  • Mobile Forensics (1)
  • Mobile Marketing (2)
  • Mobile Networks (4)
  • Mobile Payments (5)
  • Mobile Phone (1)
  • Mobile Roaming (1)
  • Mobile Robotics Network (1)
  • Mobile Security (5)
  • Mobile Systems (8)
  • Mobile Trends (2)
  • Mobility (2)
  • Molecular Programming (1)
  • Money Laundering (1)
  • Motorbikes (5)
  • Motorsports (2)
  • Multi Stakeholder Internet Governance (2)
  • Multistakeholder Internet Governance (1)
  • Music (2)
  • Music and IT (16)
  • National Medical Day (1)
  • Net Neutrality (11)
  • Network (2)
  • Network Communications (1)
  • Network Economy (1)
  • Network Security (2)
  • Networks (2)
  • Neural Information Processing (1)
  • Neural Networks (3)
  • Neuroscience (2)
  • New TCC (6)
  • Next Generation Communication Technologies (2)
  • NFC (7)
  • NIST (67)
  • NoC (2)
  • NTIA (2)
  • Nuclear Forensics (1)
  • OASIS (1)
  • OECD (1)
  • Online Advertising (3)
  • Online Behavioral Advertising (OBA) (15)
  • Online Education (1)
  • Online Gambling (1)
  • Online Games (7)
  • Online Reklamcılık (2)
  • Online Reputation Management (ORM) (2)
  • Online Rights (1)
  • Online Transactions (1)
  • Online Uyuşmazlık Çözüm Yöntemleri (ODR) (1)
  • Open Access (1)
  • Open Compute Project (4)
  • Open Data (3)
  • Open Government (2)
  • Open Internet (1)
  • Open Source (5)
  • Open University (1)
  • Operating Systems (2)
  • Özel Hayatın Gizliliği (2)
  • Passwords (2)
  • Passwords cracking (1)
  • Patent (16)
  • PayPal (1)
  • Personal and Corporate Security (1)
  • Personal Identity Verification (1)
  • Personalisation (1)
  • Personally Identifiable Information (PII) (2)
  • PGP (2)
  • Phishing; Information Security (2)
  • PIN (1)
  • Piracy (3)
  • PKI (1)
  • PPP (1)
  • pri (2)
  • Privacy (169)
  • Privacy Auditing (1)
  • Privacy by Design (3)
  • Privacy Enhancing Technologies (PETs) (1)
  • Privacy Policy (2)
  • Prof.Dr. Uğur ALACAKAPTAN (1)
  • Public Key Encryption (1)
  • QR Code (2)
  • Quantum Computing (3)
  • Quantum Mechanics (1)
  • Rally (3)
  • Ray Kurzweil (1)
  • Registered e-Mail (2)
  • Regulatory Compliance (2)
  • Renan Öztürk (1)
  • Renewable Energy (2)
  • Research and Development (1)
  • Respect for the Masters (20)
  • Restrict Access (1)
  • RFID (2)
  • Robotics (26)
  • safe harbour ilkeleri (1)
  • SafeGov; Collaboration Agreement (1)
  • Safer Internet (3)
  • Safer Internet Day (1)
  • Safety (3)
  • Sağlık Bilişimi (1)
  • Samsung (1)
  • SANKO; Gaziantep (10)
  • SANS (4)
  • Sc (1)
  • Science (33)
  • Science and Engineering (1)
  • Science and Innovation (13)
  • Science and Technology (19)
  • Secrecy (1)
  • Security (5)
  • Security Protocols (1)
  • Security Standards (1)
  • security weaknesses (1)
  • SGK (2)
  • Siber Güvenlik (10)
  • Silicon Electronics (1)
  • Siyaset (2)
  • SKI (1)
  • Skydive (2)
  • Smart Grid (1)
  • SMEs (1)
  • Social and Information Networks (3)
  • Social Business (1)
  • Social e-Commerce (1)
  • Social Engineering (1)
  • Social Media (46)
  • Social Networks (13)
  • Social Responsibility (5)
  • Software (4)
  • Software and Conformance Testing (2)
  • software security (1)
  • Sound Systems (1)
  • Spam (1)
  • Spectrum (1)
  • SPK (2)
  • SSL (1)
  • Steganography (1)
  • Stephen Hawking (1)
  • Steve Jobs (11)
  • Storage (1)
  • Surveillance (57)
  • Sustainability (1)
  • Tahkim (1)
  • Tax (9)
  • TBMM Bilişm ve İnternet Araştırma Komisyonu-Arama Konferansı (1)
  • TCC (2)
  • Technology (18)
  • Technology and Innovation (15)
  • Technology News (8)
  • Telecommunication (2)
  • Telekomünikasyon (1)
  • Telekomünikasyon Sektöründe Kişisel Verilerin Korunması (2)
  • Telekomünikasyon; Telekomünikasyon Yoluyla Yapılan İletişimin Denetlenmesi (1)
  • Telemedicine (1)
  • The Gold Bug (1)
  • The Green Deal (1)
  • The HOBBIT (9)
  • The Internet of Things (8)
  • The Right to Acces to Information (1)
  • The Right To Be Forgotten (2)
  • The Sedona Conference (2)
  • Thesis (1)
  • tıbbi verilerin mahremiyeti ve güvenliği (4)
  • Ticari Sır; Telekomünikasyon (1)
  • Timestamp (1)
  • TLS (2)
  • Tracking (7)
  • Trademark Infringement (1)
  • Transanatolia (3)
  • Transparency (2)
  • TSM (1)
  • TSP (1)
  • TTK (1)
  • Turkey (3)
  • Turkish Airlines (2)
  • Tüketicilerin Korunması (1)
  • Türk Ticaret Kanunu (2)
  • Türkiye (3)
  • Twitter (3)
  • UDACITY (1)
  • Ulaştırma (1)
  • ulusal ve uluslararası standartlar (2)
  • Venture Capital (2)
  • Veri Koruması (8)
  • Veri Koruması Direktifi (2)
  • Veri Saklama (7)
  • Veri Saklama Direktifi (3)
  • Video Rendering (1)
  • Virtual Cell (1)
  • Virtual Education (1)
  • Virtual Memory System (1)
  • Virtual Reality (1)
  • W3C (52)
  • Watering Hole Attack (1)
  • Wearable Technology (3)
  • Web (4)
  • Web 2.0 (8)
  • Web Accesssibility (3)
  • Web Films (1)
  • web siteleri (1)
  • Web Trust (1)
  • WebSites Criteria (1)
  • WHO (1)
  • Wi-Fi (4)
  • Wikipedia (2)
  • Wired (2)
  • Wireless Networks (4)
  • Wiretap (2)
  • Wiretapping (2)
  • World Economic Forum (WEF) (2)
  • XBRL (1)
  • Yahoo (1)
  • Yandex (1)
  • YASAD (1)
  • Yeni Dijital Düzen Konferansı (1)
  • Yeni TTK (7)
  • Yeni Türk Ticaret Kanunu ve Dijital Şirket (6)
  • Youtube (2)
  • Zombi Bilgisayarlar (1)

Arşiv

  • ► 2017 (5)
    • ► Mayıs (2)
    • ► Nisan (2)
    • ► Mart (1)
  • ► 2016 (7)
    • ► Nisan (5)
    • ► Mart (2)
  • ► 2015 (21)
    • ► Aralık (1)
    • ► Kasım (2)
    • ► Eylül (2)
    • ► Ağustos (3)
    • ► Haziran (1)
    • ► Nisan (2)
    • ► Mart (7)
    • ► Şubat (1)
    • ► Ocak (2)
  • ► 2014 (104)
    • ► Kasım (1)
    • ► Eylül (3)
    • ► Ağustos (1)
    • ► Temmuz (1)
    • ► Haziran (3)
    • ► Mayıs (5)
    • ► Nisan (9)
    • ► Mart (30)
    • ► Şubat (31)
    • ► Ocak (20)
  • ▼ 2013 (2416)
    • ► Aralık (38)
    • ► Kasım (22)
    • ► Ekim (86)
    • ► Eylül (77)
    • ► Ağustos (101)
    • ► Temmuz (241)
    • ► Haziran (133)
    • ► Mayıs (107)
    • ► Nisan (227)
    • ► Mart (363)
    • ► Şubat (276)
    • ▼ Ocak (745)
      • International Science&Engineering Visualisation Ch...
      • Why It’s Impossible to Build a Concussion-Proof He...
      • 19 Adorable Animals Using Technology Adorably
      • Launch Party: a crowdfunding revolution ignites th...
      • Backdoor Protect: Detect, Quarentine&Remove Shells...
      • Exploring Grand Canyon On Google Maps
      • TEBRİKLER SERHAT!
      • Google to add a new Notification Center to Chrome,...
      • Wikipedia and encyclopedic production
      • NQ Mobile(TM) Threat Alert: "Bill Shocker" Mobile ...
      • Opera partners with Neomobile to bring one-click m...
      • Hackers in China Attacked The Times for Last 4 Mon...
      • 'Paperman,' a black-and-white love story from Disn...
      • Babies Start 'Mind Reading' Earlier Than Thought
      • Singapore Annual e-Government Customer Perception ...
      • Sorting Out Stroking Sensations
      • Senators look to extend ban on Internet taxes
      • FCC Announces Telemedicine Demo Details for Jan. 3...
      • Kaspersky Lab Answers the Call for Visibility, Con...
      • Cyber Criminals Exploit Brazil Nightclub Tragedy
      • Power And The Internet
      • What Should We Be Worried About?
      • 2013 Top 10 Predictions for the EMEA Financial Ser...
      • Gartner: Social business software efforts largely ...
      • IBM's Watson going to college for Web science, Big...
      • Welcome to IBM’s Supercomputer Waterworld of the F...
      • Hollywood Lobby Applauds Spain’s Copyright Law
      • A Journal of the Plague Year
      • Wirecard, Telefonica O2 Germany enter mobile payme...
      • Security Flaws in Universal Plug and Play: Unplug,...
      • Managing Identity Requirements for Remote Users of...
      • W3C
      • Elon Musk calls 787 Dreamliner battery structure '...
      • UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ...
      • The Legend of Zelda: Hyrule Historia HC
      • Primary Care Physician Shortages Could Be Eliminat...
      • Isaac's Eye by Lucas Hnath
      • Digital citizenship: Participation and exclusion i...
      • Algebraic Geometry Modeling in Information Theory ...
      • Elton John's phantom fingers: the remote presence ...
      • WTO Allows Antigua to Open Piracy Site
      • Congress Demands Justice Department Explain Aaron ...
      • TBMM Kararı
      • ELEKTRONİK İMZA İLE İLGİLİ SÜREÇLERE VE TEKNİK KRİ...
      • SafeGov&Bilişim ve Teknoloji Hukuku Enstitüsü İşbi...
      • Examining The Dangers of Complexity in Network Sec...
      • PokerAgent Botnet Stole Over 16.000 Facebook Crede...
      • Cybercrime and Cloud Forensics: Applications for I...
      • Liability Issues Create Potholes on the Road to Dr...
      • Personal Genome Project
      • Kayaking Over A Waterfall
      • 5 years after major DNS flaw is discovered, few US...
      • Estimating Industry IPv6 & DNSSEC External Service...
      • Israeli startup eVolution creates a power-saver mo...
      • Google Maps North Korea
      • Electronics Giants Jump Into Health Care
      • WhatsApp Violates International Phone Number Priva...
      • W3Conf 2013, W3C's Developer Conference
      • Facebook Version 5.4 for Apple Products
      • Twitter Transparency Report
      • BANKALARIN İÇ SİSTEMLERİ HAKKINDA YÖNETMELİKTE DEĞ...
      • BANKALARIN DESTEK HİZMETİ ALMALARINA İLİŞKİN YÖNET...
      • Sermaye Artırımına İlişkin Genelge
      • FBI to start querying national iris index this yea...
      • Oracle will continue to bundle 'crapware' with Jav...
      • Transparency Report: What it takes for governments...
      • Conference on Human Factors in Computing Systems
      • ENISA supports the European Data Protection Day-28...
      • MIDI turns 30: a revolutionary open music standard...
      • Human Brain Project
      • Interactive nails give you a screen at your finger...
      • What IT needs to know about near-field communicati...
      • Hackers play Asteroids on US government websites
      • European Venture-Capital Industry Continues Declin...
      • NACHA's Council for Electronic Billing and Payment...
      • Article 29: Working Document 01/2013
      • uBiome: Sequencing Your Microbiome
      • Mega Passed Its First Copyright Takedown Test
      • This Is Where Google Keeps Your Email And YouTube ...
      • Apple has a porn problem, and it's about to get wo...
      • Aging in Brain Found to Hurt Sleep Needed for Memo...
      • Tracking for Health
      • Pentagon Expanding Cybersecurity Force to Protect ...
      • Memories of the Slammer worm - ten years later
      • Dissecting A Mobile Malware
      • Japan to start world's first 4K TV broadcasts in J...
      • Hackers claim attack on Justice Department website...
      • Apple pressured to provide iOS 6 source code
      • For Love or Money: Marriage and Economic Developme...
      • Reform(aliz)ing Copyright for the Internet Age?
      • Policy Enforcement Framework for Cloud Data Manage...
      • Interview with GE's head of software, William Ruh
      • Facebook Blocks Yandex’s New Social Search App Fro...
      • Facebook's Categorial İmperative
      • 802.11ac Action Plan: A Network-Readiness Checklis...
      • The Most Ridiculous Law of 2013 (So Far): It Is No...
      • The Future: Six Drivers of Global Change
      • CALL FOR NOMINATIONS NOW OPEN FOR ITU TELECOM WORL...
      • New video codec to ease pressure on global network...
      • Disruptions: A Fuzzy and Shifting Line Between Hac...
  • ► 2012 (647)
    • ► Aralık (209)
    • ► Kasım (203)
    • ► Ekim (135)
    • ► Eylül (76)
    • ► Ağustos (8)
    • ► Temmuz (2)
    • ► Haziran (6)
    • ► Mayıs (3)
    • ► Nisan (1)
    • ► Şubat (1)
    • ► Ocak (3)
  • ► 2011 (44)
    • ► Kasım (1)
    • ► Eylül (15)
    • ► Ağustos (4)
    • ► Temmuz (4)
    • ► Haziran (2)
    • ► Mayıs (1)
    • ► Nisan (2)
    • ► Mart (3)
    • ► Şubat (1)
    • ► Ocak (11)
  • ► 2010 (50)
    • ► Aralık (9)
    • ► Kasım (6)
    • ► Ekim (6)
    • ► Eylül (1)
    • ► Ağustos (7)
    • ► Haziran (3)
    • ► Mayıs (4)
    • ► Nisan (2)
    • ► Mart (2)
    • ► Şubat (2)
    • ► Ocak (8)
  • ► 2009 (61)
    • ► Aralık (6)
    • ► Kasım (3)
    • ► Ekim (4)
    • ► Eylül (9)
    • ► Ağustos (5)
    • ► Temmuz (2)
    • ► Haziran (7)
    • ► Mayıs (7)
    • ► Nisan (4)
    • ► Mart (5)
    • ► Şubat (4)
    • ► Ocak (5)
  • ► 2008 (41)
    • ► Aralık (9)
    • ► Kasım (3)
    • ► Ekim (4)
    • ► Eylül (1)
    • ► Ağustos (5)
    • ► Temmuz (12)
    • ► Haziran (5)
    • ► Mayıs (2)
 
© 2009 Bilişim Hukuku Günlüğü