skip to main | skip to sidebar

Bilişim Hukuku Günlüğü

YOUR TIME IS LIMITED... HAVE TO COURAGE TO FOLLOW YOUR HEART and INTUITION. - Steve Jobs

Time and Navigation: The Untold Story Getting From Here To There

Gönderen leyla keser berber on 14 Nisan 2013 Pazar
Etiketler: Haystack
See:
http://timeandnavigation.si.edu/

0 yorum:

Yorum Gönder

Sonraki Kayıt Önceki Kayıt Ana Sayfa

Destekleyenler

  • Beyaz Şapka
  • Bilgisayar Polisi
  • Life (Over) IP
  • Nebula Bilişim

İzleyiciler

Beyaz Şapka Bilgi Güvenliği Topluluğu

Yükleniyor...

Bağlantılar

  • LLB Danışmanlık
  • Bilgi Üniversitesi
  • herbelge.com
  • bilgiedinmehakki.org
  • Bilgisayar Polisi
  • guvenlik.info
  • Internet ve Hukuk Platformu
  • e-kesif.com

Günlükte Ara

Hakkımda

Hakkımda
Yrd. Doç. Dr. Leyla Keser Berber
  • Özgeçmiş
  • Yayın Listesi
  • Creative Commons

Etiketler

  • 4G (1)
  • 5651 Sayılı Kanun (9)
  • Aaron Swartz (12)
  • Accelerating Intelligence (3)
  • Access Control (1)
  • Adalet Bakanlığı (1)
  • Adli Bilişim (15)
  • Aerodynamic (5)
  • Aeronautics (7)
  • Agent Based Model; System of Systems (SoS) (1)
  • Aile Hekimliği (1)
  • Alan Adları (1)
  • Alan F. Westin (1)
  • Alan Turing (1)
  • Alternative Dispute Resolutions (1)
  • Animals (4)
  • Anti-Bullying (1)
  • Anti-Forensics (1)
  • Anti-Piracy (4)
  • Antitrust (9)
  • Apple (4)
  • Applied Mathematics (1)
  • Arbitration (1)
  • Architecture Software Systems (1)
  • Article 29 WP (14)
  • Artificial Creativity (1)
  • Artificial Intelligence (AI) (14)
  • Astro/Social Turf (1)
  • Astronomy (1)
  • Asyncronous System (1)
  • Atomic Clock (1)
  • Atos (1)
  • Augmented Reality (7)
  • Authentication Methods (11)
  • Aviation (30)
  • Avukatlık Kanunu; Reklam Yasağı Yönetmeliği (3)
  • Baldrige (2)
  • Behavioral Advertising (5)
  • Behavioral Economics (1)
  • Berkman Center (8)
  • BIG TENT 2012 İstanbul (1)
  • Big Data (27)
  • Bikes (1)
  • Bilgi Edinme Hakkı (2)
  • Bilgi Güvenliği (17)
  • Bilgi Toplumu (6)
  • Bilgi ve İletişim Teknolojileri (2)
  • Bilişim Adası; Bilgi Ekonomisi; Bilişim Teknolojisi Hukuku (1)
  • Bilişim Teknolojisi Hukuku (9)
  • Bilişim ve İnternet (2)
  • Bilişim ve Teknoloji Hukuku Enstitüsü (24)
  • Bilişim ve Teknoloji Hukuku Sertifika programı (1)
  • Binding Corporate Rules (BCRs) (2)
  • Bioinformatic (1)
  • Biological Engineering (1)
  • Biology (2)
  • Biometric Methods (31)
  • Biometry (5)
  • Birleşme ve Devralma (1)
  • Bitcoin (7)
  • biyometrik yöntemler (2)
  • BKM (1)
  • BOOK (162)
  • BotNet (5)
  • Brain (8)
  • Brain Computer Interface (5)
  • Brain-to-Brain-Interface (1)
  • Broadband (5)
  • BSI (4)
  • BTK (4)
  • Buisness (1)
  • Bulut Bilişim (1)
  • Business (3)
  • Business Continuity Management (3)
  • BYOD (2)
  • CA (1)
  • Cars (4)
  • Cars; Technology and Innovation (32)
  • Case Management (1)
  • Cellular Networks (1)
  • CEN (3)
  • Censorship (17)
  • Certification Authority (CA) (1)
  • CERTs (1)
  • Child Protection (2)
  • Clayton M. Christensen (1)
  • Cloud Computing (88)
  • Cloud Forensics (4)
  • Cloud Robotics (1)
  • CMK (1)
  • Code of Conduct (1)
  • Cognitive Sciences (1)
  • Common Creative (3)
  • Communication Techniques (9)
  • Computation (1)
  • Computational analysis and design (1)
  • Computational Biology (3)
  • Computational Imaging (1)
  • Computational Science (1)
  • Computer Forensics (15)
  • Computer Fraud and Abuse Act (1)
  • Computer Science (4)
  • Computer Science; Artificial Intelligence (AI) (1)
  • Consumer Protection (1)
  • Content (1)
  • Content Delivery Networks (CDN) (1)
  • Convergence (1)
  • Cookie Yasası (1)
  • Copula Estimation (1)
  • Copyright (8)
  • Counterfeiting (1)
  • Court Decisions on ICT (1)
  • Crashworthiness Analysis (1)
  • Creativity (6)
  • CRM (1)
  • Crowdsourcing (2)
  • Cryptographic Key Generation (1)
  • Cryptographic Key Management (7)
  • Cryptography (13)
  • Cryptology (9)
  • CWA (1)
  • Cyber Bullying (1)
  • Cyber Crime (4)
  • Cyber Crimes (11)
  • Cyber Legislation (1)
  • Cyber Money (1)
  • Cyber Security (155)
  • Cyber Threat (1)
  • Cyber Threats (54)
  • Cypherpunk (1)
  • Çevreci Bilişim (1)
  • Çevreci Bilişim (Green IT) (3)
  • Çevreci Bilişim Hukuku (Green IT Law) (1)
  • Data (2)
  • Data Breach (7)
  • Data Centers (13)
  • Data Mining (4)
  • Data Protection (114)
  • Data Recovery (2)
  • Data Retention (7)
  • Davranışsal Hedefleme (1)
  • DDos (2)
  • Denizcilik ve Haberleşme Bakanlığı (1)
  • Digital Agenda (1)
  • Digital Certifcate (1)
  • Digital Company (3)
  • Digital Divide (4)
  • Digital Due Process (1)
  • Digital Economy (3)
  • Digital Europe (1)
  • Digital Hospital (1)
  • Digital Library (1)
  • Digital Publishing (1)
  • Dijital Ekonomi (1)
  • Disclosure (1)
  • DMCA (3)
  • DNA (3)
  • DNA Collection (1)
  • DNA Encoding (1)
  • DNA Sequence (1)
  • DNA Signature (1)
  • DNS (2)
  • DNS Filtering (1)
  • Dogs (9)
  • Domain Names (3)
  • Douglas Engelbart (1)
  • e-Apostil (1)
  • e-Archiving (2)
  • e-Authentication (2)
  • e-Bay (1)
  • e-belge; e-haciz (1)
  • e-Book (4)
  • e-commerce (27)
  • e-Communication (3)
  • e-Communication Infrastructures (8)
  • e-Devlet (10)
  • e-discovery (14)
  • e-Evidence (3)
  • e-Fatura (3)
  • e-Genel Kurul Bilişim Sistemi (1)
  • e-General Assembly Informatics System (1)
  • e-Government (13)
  • e-Health (2)
  • e-Health Records (7)
  • e-Heath Records; Health IT (35)
  • e-ID (8)
  • e-Identity (2)
  • e-Inclusion (1)
  • e-Invoicing (5)
  • e-İhale (1)
  • e-İmza (5)
  • e-kapasite; e-skills (1)
  • e-Keşif (3)
  • e-Kimlik Kartları (1)
  • e-Learning (9)
  • e-money (5)
  • e-Oy; e-Demokrasi; e-Parlamento (1)
  • e-Participation (1)
  • e-Pass (1)
  • e-Payment (14)
  • e-Prescription (1)
  • e-sağlık (4)
  • e-Signature (6)
  • e-Tebligat; (2)
  • e-Tebligat; Uluslararası e-Tebligat (1)
  • e-Ticaret (6)
  • e-Transformation (1)
  • Eavesdropping (4)
  • Economy (11)
  • Edgar Allan Poe (1)
  • Education (5)
  • edX (1)
  • EGKS (7)
  • Ekonomi (1)
  • Electronic Frontier Foundation (EFF) (3)
  • Elektronik Delil (1)
  • Elektronik Genel Kurul Sistemi (1)
  • Elektronik Haberleşme (2)
  • Elektronik İmza (3)
  • elektronik sağlık kayıtları (2)
  • Emoticon (1)
  • Emotional Intelligence (EI) (1)
  • EnCase (1)
  • Encryption (6)
  • Energy (6)
  • ENISA (25)
  • Environment (27)
  • epSOS (1)
  • Erdoğan Büyükkasap (1)
  • ESK (1)
  • Ethernet (1)
  • Ethics (1)
  • ETSI (2)
  • ETSI; ICT Events (3)
  • EU (1)
  • Eulerian Motion (1)
  • Eurobarometer (1)
  • Evidence (1)
  • Exploit (3)
  • Extreme Sports (3)
  • F1 (10)
  • Facebook (7)
  • Fatih Project (1)
  • FCC (4)
  • Fibre Optic (1)
  • Fikri Mülkiyet (2)
  • Filtreleme (2)
  • Finance (2)
  • Finansal Tablolar (1)
  • Flight Kinematics (1)
  • FoI (1)
  • Forensic Analysis (1)
  • Forensic Science (2)
  • Free Fall (1)
  • FTC (5)
  • Gaming (1)
  • Gaziantep (13)
  • GE (1)
  • Geek News (4)
  • Gender Equality (1)
  • Genetics (3)
  • Global Change (1)
  • Google (4)
  • GPS (2)
  • Green Button (1)
  • Green IT (21)
  • GSO; Gaziantep (21)
  • Güvenli İnternet (6)
  • Hackathon (1)
  • Hague Securities Convention (1)
  • Hak ve Özgürlükler ve İnternet (2)
  • Hash Algorithms (3)
  • hay (1)
  • Haystack (276)
  • Health and IT (11)
  • Health IT (20)
  • Heliski (1)
  • HIMSS (1)
  • HIPAA (1)
  • High Order Methods (1)
  • High-Tech Sports (1)
  • Honeypot (1)
  • Honeywords (1)
  • Human Brain Project (11)
  • IAB (2)
  • IAPP (2)
  • IBM (1)
  • ICANN (8)
  • ICT (5)
  • ICT Companies (71)
  • ICT Events (123)
  • ICT Infrastructures (5)
  • ICT news (109)
  • ICT Products (162)
  • ICT Regulations (2)
  • ICT Standards (17)
  • ICT statistics (1)
  • ICT Trends (2)
  • ICT4Peace Foundation (1)
  • ICTA (4)
  • IDC (1)
  • Identity Theft (1)
  • IGF İstanbul 2014 (1)
  • INET İstanbul (1)
  • Information Economy (2)
  • Information Management (2)
  • Information Security (217)
  • Information Society (11)
  • Information Technologies (11)
  • Information Theory (2)
  • Innovation (4)
  • Intellectual Property; Copyright (29)
  • Intelligent Content (1)
  • Internet (25)
  • Internet Activism (2)
  • Internet Advertising (1)
  • Internet Content (2)
  • Internet Governance (35)
  • Internet Improvement Board (1)
  • Internet Laws and Regulations (2)
  • Internet of Things (IoT) (2)
  • Interoperability (3)
  • IoT (1)
  • IPv6 (2)
  • Isaac Newton (1)
  • ISACA (3)
  • ISO (1)
  • ISO 27001 (1)
  • ISO Standards (3)
  • ISO/IEC (5)
  • ISO/IEC 27032:2012 (1)
  • ISOC (2)
  • IT Law Institute (2)
  • ITU (9)
  • i-Transportation (1)
  • İnternet Alan Adları (1)
  • İnternet Bankacılığı (3)
  • İnternet Erişiminin Engellenmesi (6)
  • İnternet Yönetişimi (3)
  • İnternet'te Sansür (5)
  • İnternette Eser Sahipliği ve Teknolojik Koruma (2)
  • İstanbul (4)
  • İstanbul Bilgi University IT Law Institute (13)
  • İstanbul Bilgi Üniversitesi (1)
  • İstanbul Bilgi Üniversitesi Bilişim ve Teknoloji Hukuku Enstitüsü (5)
  • İstanbul Chamber of Commerce (İTO) (1)
  • J.R.R. TOLKIEN (3)
  • Joseph Alois Schumpeter (1)
  • Kayıtlı Elektronik Posta (4)
  • Kemal Merkit (2)
  • Kenan Sofuoğlu (2)
  • kimlik doğrulama (1)
  • Kişisel (1)
  • Kişisel Sağlık Verileri (7)
  • Kişisel Verileri Koruma Kurulu (1)
  • Kişisel verilerin korunması (67)
  • Kitap (1)
  • Kriptografi (1)
  • KVKK (2)
  • Language Processing (1)
  • Law and Economy (1)
  • LES (1)
  • Linux (1)
  • LTE (4)
  • m-Payment (4)
  • m2m (2)
  • Machine Learning (6)
  • Machine-to-Machine M2M (2)
  • Mahremiyet (15)
  • Marmara Üniversitesi Hukuk Fakültesi (1)
  • Master Programı (8)
  • Mathematic (1)
  • Measurements (1)
  • Media (1)
  • Medicine (6)
  • Medicine-Innovation and Technology (14)
  • Memory (1)
  • merkezi tüzel kimlik projesi (1)
  • MetaData (1)
  • Mezopotamya Rallisi (1)
  • MKK (12)
  • Mobile e-Signature (1)
  • Mobile Economy (1)
  • Mobile Forensics (1)
  • Mobile Marketing (2)
  • Mobile Networks (4)
  • Mobile Payments (5)
  • Mobile Phone (1)
  • Mobile Roaming (1)
  • Mobile Robotics Network (1)
  • Mobile Security (5)
  • Mobile Systems (8)
  • Mobile Trends (2)
  • Mobility (2)
  • Molecular Programming (1)
  • Money Laundering (1)
  • Motorbikes (5)
  • Motorsports (2)
  • Multi Stakeholder Internet Governance (2)
  • Multistakeholder Internet Governance (1)
  • Music (2)
  • Music and IT (16)
  • National Medical Day (1)
  • Net Neutrality (11)
  • Network (2)
  • Network Communications (1)
  • Network Economy (1)
  • Network Security (2)
  • Networks (2)
  • Neural Information Processing (1)
  • Neural Networks (3)
  • Neuroscience (2)
  • New TCC (6)
  • Next Generation Communication Technologies (2)
  • NFC (7)
  • NIST (67)
  • NoC (2)
  • NTIA (2)
  • Nuclear Forensics (1)
  • OASIS (1)
  • OECD (1)
  • Online Advertising (3)
  • Online Behavioral Advertising (OBA) (15)
  • Online Education (1)
  • Online Gambling (1)
  • Online Games (7)
  • Online Reklamcılık (2)
  • Online Reputation Management (ORM) (2)
  • Online Rights (1)
  • Online Transactions (1)
  • Online Uyuşmazlık Çözüm Yöntemleri (ODR) (1)
  • Open Access (1)
  • Open Compute Project (4)
  • Open Data (3)
  • Open Government (2)
  • Open Internet (1)
  • Open Source (5)
  • Open University (1)
  • Operating Systems (2)
  • Özel Hayatın Gizliliği (2)
  • Passwords (2)
  • Passwords cracking (1)
  • Patent (16)
  • PayPal (1)
  • Personal and Corporate Security (1)
  • Personal Identity Verification (1)
  • Personalisation (1)
  • Personally Identifiable Information (PII) (2)
  • PGP (2)
  • Phishing; Information Security (2)
  • PIN (1)
  • Piracy (3)
  • PKI (1)
  • PPP (1)
  • pri (2)
  • Privacy (169)
  • Privacy Auditing (1)
  • Privacy by Design (3)
  • Privacy Enhancing Technologies (PETs) (1)
  • Privacy Policy (2)
  • Prof.Dr. Uğur ALACAKAPTAN (1)
  • QR Code (2)
  • Quantum Computing (3)
  • Quantum Mechanics (1)
  • Rally (3)
  • Ray Kurzweil (1)
  • Registered e-Mail (2)
  • Regulatory Compliance (2)
  • Renan Öztürk (1)
  • Renewable Energy (2)
  • Research and Development (1)
  • Respect for the Masters (20)
  • Restrict Access (1)
  • RFID (2)
  • Robotics (26)
  • safe harbour ilkeleri (1)
  • SafeGov; Collaboration Agreement (1)
  • Safer Internet (3)
  • Safer Internet Day (1)
  • Safety (3)
  • Sağlık Bilişimi (1)
  • Samsung (1)
  • SANKO; Gaziantep (10)
  • SANS (4)
  • Sc (1)
  • Science (33)
  • Science and Engineering (1)
  • Science and Innovation (13)
  • Science and Technology (19)
  • Secrecy (1)
  • Security (5)
  • Security Protocols (1)
  • Security Standards (1)
  • security weaknesses (1)
  • SGK (2)
  • Siber Güvenlik (10)
  • Silicon Electronics (1)
  • Siyaset (2)
  • SKI (1)
  • Skydive (2)
  • Smart Grid (1)
  • SMEs (1)
  • Social and Information Networks (3)
  • Social Business (1)
  • Social e-Commerce (1)
  • Social Engineering (1)
  • Social Media (46)
  • Social Networks (13)
  • Social Responsibility (5)
  • Software (4)
  • Software and Conformance Testing (2)
  • software security (1)
  • Sound Systems (1)
  • Spam (1)
  • Spectrum (1)
  • SPK (2)
  • SSL (1)
  • Steganography (1)
  • Stephen Hawking (1)
  • Steve Jobs (11)
  • Storage (1)
  • Surveillance (57)
  • Sustainability (1)
  • Tahkim (1)
  • Tax (9)
  • TBMM Bilişm ve İnternet Araştırma Komisyonu-Arama Konferansı (1)
  • TCC (2)
  • Technology (18)
  • Technology and Innovation (15)
  • Technology News (8)
  • Telecommunication (2)
  • Telekomünikasyon (1)
  • Telekomünikasyon Sektöründe Kişisel Verilerin Korunması (2)
  • Telekomünikasyon; Telekomünikasyon Yoluyla Yapılan İletişimin Denetlenmesi (1)
  • Telemedicine (1)
  • The Gold Bug (1)
  • The Green Deal (1)
  • The HOBBIT (9)
  • The Internet of Things (8)
  • The Right to Acces to Information (1)
  • The Right To Be Forgotten (2)
  • The Sedona Conference (2)
  • Thesis (1)
  • tıbbi verilerin mahremiyeti ve güvenliği (4)
  • Ticari Sır; Telekomünikasyon (1)
  • Timestamp (1)
  • TLS (2)
  • Tracking (7)
  • Trademark Infringement (1)
  • Transanatolia (3)
  • Transparency (2)
  • TSM (1)
  • TSP (1)
  • TTK (1)
  • Turkey (3)
  • Turkish Airlines (2)
  • Tüketicilerin Korunması (1)
  • Türk Ticaret Kanunu (2)
  • Türkiye (3)
  • Twitter (3)
  • UDACITY (1)
  • Ulaştırma (1)
  • ulusal ve uluslararası standartlar (2)
  • Venture Capital (2)
  • Veri Koruması (8)
  • Veri Koruması Direktifi (2)
  • Veri Saklama (7)
  • Veri Saklama Direktifi (3)
  • Video Rendering (1)
  • Virtual Cell (1)
  • Virtual Education (1)
  • Virtual Memory System (1)
  • Virtual Reality (1)
  • W3C (51)
  • Watering Hole Attack (1)
  • Wearable Technology (3)
  • Web (4)
  • Web 2.0 (8)
  • Web Accesssibility (3)
  • Web Films (1)
  • web siteleri (1)
  • Web Trust (1)
  • WebSites Criteria (1)
  • WHO (1)
  • Wi-Fi (4)
  • Wikipedia (2)
  • Wired (2)
  • Wireless Networks (4)
  • Wiretap (2)
  • Wiretapping (2)
  • World Economic Forum (WEF) (2)
  • XBRL (1)
  • Yahoo (1)
  • Yandex (1)
  • YASAD (1)
  • Yeni Dijital Düzen Konferansı (1)
  • Yeni TTK (7)
  • Yeni Türk Ticaret Kanunu ve Dijital Şirket (6)
  • Youtube (2)
  • Zombi Bilgisayarlar (1)

Arşiv

  • ► 2017 (5)
    • ► Mayıs (2)
    • ► Nisan (2)
    • ► Mart (1)
  • ► 2016 (7)
    • ► Nisan (5)
    • ► Mart (2)
  • ► 2015 (21)
    • ► Aralık (1)
    • ► Kasım (2)
    • ► Eylül (2)
    • ► Ağustos (3)
    • ► Haziran (1)
    • ► Nisan (2)
    • ► Mart (7)
    • ► Şubat (1)
    • ► Ocak (2)
  • ► 2014 (102)
    • ► Kasım (1)
    • ► Eylül (2)
    • ► Ağustos (1)
    • ► Temmuz (1)
    • ► Haziran (3)
    • ► Mayıs (5)
    • ► Nisan (9)
    • ► Mart (30)
    • ► Şubat (30)
    • ► Ocak (20)
  • ▼ 2013 (2400)
    • ► Aralık (36)
    • ► Kasım (21)
    • ► Ekim (83)
    • ► Eylül (74)
    • ► Ağustos (99)
    • ► Temmuz (238)
    • ► Haziran (132)
    • ► Mayıs (107)
    • ▼ Nisan (226)
      • On The Importance of Backups and Personal Informat...
      • What Happened When One Man Pinged the Whole Intern...
      • Bilişim Konusunda Mahkemelerde Uzmanlaşmaya Doğru ...
      • PayPal streamlines the mobile shopping experience ...
      • Pentagon Paying China — Yes, China — To Carry Data...
      • New Documents on the Article 29 Working Party webs...
      • European Data Protection Authorities Adopted an Ex...
      • Harvard Professor Re-Identifies Anonymous Voluntee...
      • GSO’NUN SEÇİMLER ÖNCESİ SON MECLİS TOPLANTISI YAPI...
      • OASIS Members to Advance MQTT Standard for M2M/ Io...
      • BlackJet
      • With CISPA dead, a look ahead to the Senate’s comi...
      • Draft Special Publication 800-162, Guide to Attrib...
      • Second Cybersecurity Infrastructure Framework Work...
      • Registration Open for HTML5 Training Course; Early...
      • ENISA info film - Everything is connected
      • Government Seeks to Fine Companies for Not Complyi...
      • KISSmetrics: Customer Web Analytics
      • The growing importance of timing in data centers
      • iTunes Store at 10: how Apple built a digital medi...
      • Fifty Years of Clearing the Skies
      • NeuroSky: Brainwave Sensors For Everybody
      • Samsung Demos a Tablet Controlled by Your Brain
      • For the First Time Ever, You Can Now Hear What Ale...
      • Winners of the 2013 Sony World Photography Awards
      • Wikipedia is now drawing facts from the Wikidata r...
      • Bletchley Park codebreaker Raymond "Jerry" Roberts...
      • "Tor" calls for help as its supply of bridges falt...
      • Quantifying Trading Behavior in Financial Markets ...
      • This is what a DDoS attack looks like
      • Dutch Man Said to Be Held in Powerful Internet
      • "Ticaret Sicili Tüzüğünün Yürürlükten Kaldırılması...
      • ELEKTRONİK HABERLEŞME SEKTÖRÜNE İLİŞKİN YETKİLENDİ...
      • ICANN Opened İSTANBUL Hub
      • 6 Amazing Facts From an Amazing Obituary of a 'Hum...
      • Cool IT Leaderboard 6
      • The Future of Cars
      • Toward an Ecological Model of Research and Develop...
      • The Untold Story of the ZIP Code
      • The Check Is in the Mail, From Apple
      • NIST Announces Plan to Sponsor First Cybersecurity...
      • The 2013 Data Breach Investigations Report of Veri...
      • "Speedtest.net": The Global Broadband Speed Test
      • NASA's HyspIRI Sees the Forest for the Trees and M...
      • Investigators: Chinese Government is Behind 96 Per...
      • WIRED's 20th Anniversary: 1993-2013
      • 50 Years of Inspired Insanity From Lamborghini
      • DataHero
      • First Brain Surgery Performed on Bear
      • Stern Words, and a Pea-Size Punishment, for Google...
      • Hacked A.P. Twitter Feed Sends Erroneous Message A...
      • Twitter plays cat-and-mouse with hackers of the Sy...
      • Improving Two-Thumb Text Entry on Touchscreen Devi...
      • You’ve Got The Whole World In Your Hands As Leap M...
      • Watch an Airplane Turn Fog Into Beautifully Spinni...
      • Apple Wins Case Brought by Google’s Motorola Over ...
      • Facebook Catapults $1.5 Billion Data Center Into I...
      • "NEST": The Learning Thermostat
      • ICT, Law and Innovation: Recent Developments, Chal...
      • Tata Communications: The Speed To Lead
      • Yes, It's Time for an Internet Sales Tax
      • The Power of Gear: How Technical Equipment Redefin...
      • DDEMA: A Data Driven Environment for Multiphysics ...
      • SmartData: Privacy Meets Evolutionary Robotics
      • Anonymous leads 200+ websites in April 22 blackout...
      • Google wants to pay more for renewable energy, and...
      • Virtual Rx: how Oculus Rift could revolutionize me...
      • National Security Archive Electronic Briefing Book...
      • The Internet of Things: Coming to a network near y...
      • For Dog Lovers Like Me: DOGNITION
      • Conflicts in the Knowledge Society: The Contentiou...
      • From SOA to PaaS: How to create enterprise archite...
      • Sports Goggles Can Provide Vital Data and Distract...
      • Germany Fines Google Over Data Collection
      • XML Digital Signatures for Widgets is a W3C Recomm...
      • Security Content Automation Protocol (SCAP) Versio...
      • Open Source Software Isn’t Just Code. It’s Your Ré...
      • FeaturesThe Internet Catches a Viral EpidemicStart...
      • Microsoft launches new campaign to show Internet u...
      • Here we go again: Top Bitcoin exchange Mt. Gox tak...
      • The Callimahos Course
      • IT, Security, and Power
      • Young Innovators Competition 2013
      • Trends in Telecommunication Reform: Transnational ...
      • The New Digital Age: Reshaping the Future of Peopl...
      • Fake anti-virus for Android spreads via ads in oth...
      • Obama threatens veto of CISPA database-sharing bil...
      • Using Facial-Recognition Technology to Track Down ...
      • e-GKS Artık Dünya 1.cisi!
      • CONGRATULATIONS MKK and "e-Annual Meeting System (...
      • Microsoft Discovers Trojan That Erases Evidence Of...
      • Yahoo’s Surprisingly Gorgeous New iOS Weather App ...
      • Now, With No Further Ado, We Present... The Digita...
      • Defense-VA Medical Records Scanning System Not Rea...
      • TIME 100: 2013
      • A SUPER-EARTH-SIZED PLANET ORBITING IN OR NEAR THE...
      • CRAPCHA, Impossible CAPTCHA Tests That Pranks Web ...
      • Does anyone actually like the sound of typing in a...
      • Twitter unveils its new #Music app for the Web and...
      • Gene Patents Are Sabotaging the Future of Medicine...
    • ► Mart (363)
    • ► Şubat (276)
    • ► Ocak (745)
  • ► 2012 (647)
    • ► Aralık (209)
    • ► Kasım (203)
    • ► Ekim (135)
    • ► Eylül (76)
    • ► Ağustos (8)
    • ► Temmuz (2)
    • ► Haziran (6)
    • ► Mayıs (3)
    • ► Nisan (1)
    • ► Şubat (1)
    • ► Ocak (3)
  • ► 2011 (44)
    • ► Kasım (1)
    • ► Eylül (15)
    • ► Ağustos (4)
    • ► Temmuz (4)
    • ► Haziran (2)
    • ► Mayıs (1)
    • ► Nisan (2)
    • ► Mart (3)
    • ► Şubat (1)
    • ► Ocak (11)
  • ► 2010 (50)
    • ► Aralık (9)
    • ► Kasım (6)
    • ► Ekim (6)
    • ► Eylül (1)
    • ► Ağustos (7)
    • ► Haziran (3)
    • ► Mayıs (4)
    • ► Nisan (2)
    • ► Mart (2)
    • ► Şubat (2)
    • ► Ocak (8)
  • ► 2009 (61)
    • ► Aralık (6)
    • ► Kasım (3)
    • ► Ekim (4)
    • ► Eylül (9)
    • ► Ağustos (5)
    • ► Temmuz (2)
    • ► Haziran (7)
    • ► Mayıs (7)
    • ► Nisan (4)
    • ► Mart (5)
    • ► Şubat (4)
    • ► Ocak (5)
  • ► 2008 (41)
    • ► Aralık (9)
    • ► Kasım (3)
    • ► Ekim (4)
    • ► Eylül (1)
    • ► Ağustos (5)
    • ► Temmuz (12)
    • ► Haziran (5)
    • ► Mayıs (2)
 
© 2009 Bilişim Hukuku Günlüğü