skip to main | skip to sidebar

Bilişim Hukuku Günlüğü

YOUR TIME IS LIMITED... HAVE TO COURAGE TO FOLLOW YOUR HEART and INTUITION. - Steve Jobs

Letter From ICT Companies To The US Government

Gönderen leyla keser berber on 18 Temmuz 2013 Perşembe
Etiketler: Information Security
See:
https://www.cdt.org/files/pdfs/weneedtoknow-transparency-letter.pdf

0 yorum:

Yorum Gönder

Sonraki Kayıt Önceki Kayıt Ana Sayfa

Destekleyenler

  • Beyaz Şapka
  • Bilgisayar Polisi
  • Life (Over) IP
  • Nebula Bilişim

İzleyiciler

Beyaz Şapka Bilgi Güvenliği Topluluğu

Yükleniyor...

Bağlantılar

  • LLB Danışmanlık
  • Bilgi Üniversitesi
  • herbelge.com
  • bilgiedinmehakki.org
  • Bilgisayar Polisi
  • guvenlik.info
  • Internet ve Hukuk Platformu
  • e-kesif.com

Günlükte Ara

Hakkımda

Hakkımda
Yrd. Doç. Dr. Leyla Keser Berber
  • Özgeçmiş
  • Yayın Listesi
  • Creative Commons

Etiketler

  • 4G (1)
  • 5651 Sayılı Kanun (9)
  • Aaron Swartz (12)
  • Accelerating Intelligence (3)
  • Access Control (1)
  • Adalet Bakanlığı (1)
  • Adli Bilişim (15)
  • Aerodynamic (5)
  • Aeronautics (7)
  • Agent Based Model; System of Systems (SoS) (1)
  • Aile Hekimliği (1)
  • Alan Adları (1)
  • Alan F. Westin (1)
  • Alan Turing (1)
  • Alternative Dispute Resolutions (1)
  • Animals (4)
  • Anti-Bullying (1)
  • Anti-Forensics (1)
  • Anti-Piracy (4)
  • Antitrust (9)
  • Apple (4)
  • Applied Mathematics (1)
  • Arbitration (1)
  • Architecture Software Systems (1)
  • Article 29 WP (14)
  • Artificial Creativity (1)
  • Artificial Intelligence (AI) (14)
  • Astro/Social Turf (1)
  • Astronomy (1)
  • Asyncronous System (1)
  • Atomic Clock (1)
  • Atos (1)
  • Augmented Reality (7)
  • Authentication Methods (11)
  • Aviation (30)
  • Avukatlık Kanunu; Reklam Yasağı Yönetmeliği (3)
  • Baldrige (2)
  • Behavioral Advertising (5)
  • Behavioral Economics (1)
  • Berkman Center (8)
  • BIG TENT 2012 İstanbul (1)
  • Big Data (27)
  • Bikes (1)
  • Bilgi Edinme Hakkı (2)
  • Bilgi Güvenliği (17)
  • Bilgi Toplumu (6)
  • Bilgi ve İletişim Teknolojileri (2)
  • Bilişim Adası; Bilgi Ekonomisi; Bilişim Teknolojisi Hukuku (1)
  • Bilişim Teknolojisi Hukuku (9)
  • Bilişim ve İnternet (2)
  • Bilişim ve Teknoloji Hukuku Enstitüsü (24)
  • Bilişim ve Teknoloji Hukuku Sertifika programı (1)
  • Binding Corporate Rules (BCRs) (2)
  • Bioinformatic (1)
  • Biological Engineering (1)
  • Biology (2)
  • Biometric Methods (31)
  • Biometry (5)
  • Birleşme ve Devralma (1)
  • Bitcoin (8)
  • biyometrik yöntemler (2)
  • BKM (1)
  • BOOK (167)
  • BotNet (5)
  • Brain (8)
  • Brain Computer Interface (5)
  • Brain-to-Brain-Interface (1)
  • Broadband (5)
  • BSI (4)
  • BTK (4)
  • Buisness (1)
  • Bulut Bilişim (1)
  • Business (3)
  • Business Continuity Management (3)
  • BYOD (2)
  • CA (1)
  • Cars (4)
  • Cars; Technology and Innovation (32)
  • Case Management (1)
  • Cellular Networks (1)
  • CEN (3)
  • Censorship (17)
  • Certification Authority (CA) (1)
  • CERTs (1)
  • Child Protection (2)
  • Clayton M. Christensen (1)
  • Cloud Computing (89)
  • Cloud Forensics (4)
  • Cloud Robotics (1)
  • CMK (1)
  • Code of Conduct (1)
  • Cognitive Sciences (1)
  • Common Creative (3)
  • Communication Techniques (9)
  • Computation (1)
  • Computational analysis and design (1)
  • Computational Biology (3)
  • Computational Imaging (1)
  • Computational Science (1)
  • Computer Forensics (15)
  • Computer Fraud and Abuse Act (1)
  • Computer Science (4)
  • Computer Science; Artificial Intelligence (AI) (1)
  • Consumer Protection (1)
  • Content (1)
  • Content Delivery Networks (CDN) (1)
  • Convergence (1)
  • Cookie Yasası (1)
  • Copula Estimation (1)
  • Copyright (8)
  • Counterfeiting (1)
  • Court Decisions on ICT (1)
  • Crashworthiness Analysis (1)
  • Creativity (6)
  • CRM (1)
  • Crowdsourcing (2)
  • Cryptographic Key Generation (1)
  • Cryptographic Key Management (7)
  • Cryptography (19)
  • Cryptology (9)
  • CWA (1)
  • Cyber Bullying (1)
  • Cyber Crime (4)
  • Cyber Crimes (11)
  • Cyber Legislation (1)
  • Cyber Money (1)
  • Cyber Security (155)
  • Cyber Threat (1)
  • Cyber Threats (54)
  • Cypherpunk (1)
  • Çevreci Bilişim (1)
  • Çevreci Bilişim (Green IT) (3)
  • Çevreci Bilişim Hukuku (Green IT Law) (1)
  • Data (2)
  • Data Breach (7)
  • Data Centers (13)
  • Data Mining (4)
  • Data Protection (114)
  • Data Recovery (2)
  • Data Retention (7)
  • Davranışsal Hedefleme (1)
  • DDos (2)
  • Denizcilik ve Haberleşme Bakanlığı (1)
  • Digital Agenda (1)
  • Digital Certifcate (1)
  • Digital Company (3)
  • Digital Divide (4)
  • Digital Due Process (1)
  • Digital Economy (3)
  • Digital Europe (1)
  • Digital Hospital (1)
  • Digital Library (1)
  • Digital Publishing (1)
  • Dijital Ekonomi (1)
  • Disclosure (1)
  • DMCA (3)
  • DNA (3)
  • DNA Collection (1)
  • DNA Encoding (1)
  • DNA Sequence (1)
  • DNA Signature (1)
  • DNS (2)
  • DNS Filtering (1)
  • Dogs (9)
  • Domain Names (3)
  • Douglas Engelbart (1)
  • e-Apostil (1)
  • e-Archiving (2)
  • e-Authentication (2)
  • e-Bay (1)
  • e-belge; e-haciz (1)
  • e-Book (4)
  • e-commerce (27)
  • e-Communication (3)
  • e-Communication Infrastructures (8)
  • e-Devlet (10)
  • e-discovery (14)
  • e-Evidence (3)
  • e-Fatura (3)
  • e-Genel Kurul Bilişim Sistemi (1)
  • e-General Assembly Informatics System (1)
  • e-Government (13)
  • e-Health (2)
  • e-Health Records (7)
  • e-Heath Records; Health IT (35)
  • e-ID (8)
  • e-Identity (2)
  • e-Inclusion (1)
  • e-Invoicing (5)
  • e-İhale (1)
  • e-İmza (5)
  • e-kapasite; e-skills (1)
  • e-Keşif (3)
  • e-Kimlik Kartları (1)
  • e-Learning (9)
  • e-money (6)
  • e-Oy; e-Demokrasi; e-Parlamento (1)
  • e-Participation (1)
  • e-Pass (1)
  • e-Payment (15)
  • e-Prescription (1)
  • e-sağlık (4)
  • e-Signature (6)
  • e-Tebligat; (2)
  • e-Tebligat; Uluslararası e-Tebligat (1)
  • e-Ticaret (6)
  • e-Transformation (1)
  • Eavesdropping (4)
  • Economy (11)
  • Edgar Allan Poe (1)
  • Education (5)
  • edX (1)
  • EGKS (7)
  • Ekonomi (1)
  • Electronic Frontier Foundation (EFF) (3)
  • Elektronik Delil (1)
  • Elektronik Genel Kurul Sistemi (1)
  • Elektronik Haberleşme (2)
  • Elektronik İmza (3)
  • elektronik sağlık kayıtları (2)
  • Emoticon (1)
  • Emotional Intelligence (EI) (1)
  • EnCase (1)
  • Encryption (7)
  • Energy (6)
  • ENISA (25)
  • Environment (27)
  • epSOS (1)
  • Erdoğan Büyükkasap (1)
  • ESK (1)
  • Ethernet (1)
  • Ethics (1)
  • ETSI (2)
  • ETSI; ICT Events (4)
  • EU (1)
  • Eulerian Motion (1)
  • Eurobarometer (1)
  • Evidence (1)
  • Exploit (3)
  • Extreme Sports (3)
  • F1 (10)
  • Facebook (7)
  • Fatih Project (1)
  • FCC (4)
  • Fibre Optic (1)
  • Fikri Mülkiyet (2)
  • Filtreleme (2)
  • Finance (2)
  • Finansal Tablolar (1)
  • Flight Kinematics (1)
  • FoI (1)
  • Forensic Analysis (1)
  • Forensic Science (2)
  • Free Fall (1)
  • FTC (5)
  • Gaming (1)
  • Gaziantep (13)
  • GE (1)
  • Geek News (4)
  • Gender Equality (1)
  • Genetics (3)
  • Global Change (1)
  • Google (4)
  • GPS (2)
  • Green Button (1)
  • Green IT (21)
  • GSO; Gaziantep (21)
  • Güvenli İnternet (6)
  • Hackathon (1)
  • Hague Securities Convention (1)
  • Hak ve Özgürlükler ve İnternet (2)
  • Hash Algorithms (3)
  • hay (1)
  • Haystack (277)
  • Health and IT (11)
  • Health IT (20)
  • Heliski (1)
  • HIMSS (1)
  • HIPAA (1)
  • High Order Methods (1)
  • High-Tech Sports (1)
  • Honeypot (1)
  • Honeywords (1)
  • Human Brain Project (11)
  • IAB (2)
  • IAPP (2)
  • IBM (1)
  • ICANN (8)
  • ICT (5)
  • ICT Companies (71)
  • ICT Events (124)
  • ICT Infrastructures (5)
  • ICT news (109)
  • ICT Products (162)
  • ICT Regulations (2)
  • ICT Standards (17)
  • ICT statistics (1)
  • ICT Trends (2)
  • ICT4Peace Foundation (1)
  • ICTA (4)
  • IDC (1)
  • Identity Theft (1)
  • IGF İstanbul 2014 (1)
  • INET İstanbul (1)
  • Information Economy (2)
  • Information Management (2)
  • Information Security (217)
  • Information Society (11)
  • Information Technologies (11)
  • Information Theory (2)
  • Innovation (4)
  • Intellectual Property; Copyright (29)
  • Intelligent Content (1)
  • Internet (25)
  • Internet Activism (2)
  • Internet Advertising (1)
  • Internet Content (2)
  • Internet Governance (35)
  • Internet Improvement Board (1)
  • Internet Laws and Regulations (2)
  • Internet of Things (IoT) (2)
  • Interoperability (3)
  • IoT (1)
  • IPv6 (2)
  • Isaac Newton (1)
  • ISACA (3)
  • ISO (1)
  • ISO 27001 (1)
  • ISO Standards (3)
  • ISO/IEC (5)
  • ISO/IEC 27032:2012 (1)
  • ISOC (2)
  • IT Law Institute (2)
  • ITU (9)
  • i-Transportation (1)
  • İnternet Alan Adları (1)
  • İnternet Bankacılığı (3)
  • İnternet Erişiminin Engellenmesi (6)
  • İnternet Yönetişimi (3)
  • İnternet'te Sansür (5)
  • İnternette Eser Sahipliği ve Teknolojik Koruma (2)
  • İstanbul (4)
  • İstanbul Bilgi University IT Law Institute (13)
  • İstanbul Bilgi Üniversitesi (1)
  • İstanbul Bilgi Üniversitesi Bilişim ve Teknoloji Hukuku Enstitüsü (5)
  • İstanbul Chamber of Commerce (İTO) (1)
  • J.R.R. TOLKIEN (3)
  • Joseph Alois Schumpeter (1)
  • Kayıtlı Elektronik Posta (4)
  • Kemal Merkit (2)
  • Kenan Sofuoğlu (2)
  • kimlik doğrulama (1)
  • Kişisel (1)
  • Kişisel Sağlık Verileri (7)
  • Kişisel Verileri Koruma Kurulu (1)
  • Kişisel verilerin korunması (67)
  • Kitap (1)
  • Kriptografi (1)
  • KVKK (2)
  • Language Processing (1)
  • Law and Economy (1)
  • LES (1)
  • Linux (1)
  • LTE (4)
  • m-Payment (4)
  • m2m (2)
  • Machine Learning (6)
  • Machine-to-Machine M2M (2)
  • Mahremiyet (15)
  • Marmara Üniversitesi Hukuk Fakültesi (1)
  • Master Programı (8)
  • Mathematic (1)
  • Measurements (1)
  • Media (1)
  • Medicine (6)
  • Medicine-Innovation and Technology (14)
  • Memory (1)
  • merkezi tüzel kimlik projesi (1)
  • MetaData (1)
  • Mezopotamya Rallisi (1)
  • MKK (12)
  • Mobile e-Signature (1)
  • Mobile Economy (1)
  • Mobile Forensics (1)
  • Mobile Marketing (2)
  • Mobile Networks (4)
  • Mobile Payments (5)
  • Mobile Phone (1)
  • Mobile Roaming (1)
  • Mobile Robotics Network (1)
  • Mobile Security (5)
  • Mobile Systems (8)
  • Mobile Trends (2)
  • Mobility (2)
  • Molecular Programming (1)
  • Money Laundering (1)
  • Motorbikes (5)
  • Motorsports (2)
  • Multi Stakeholder Internet Governance (2)
  • Multistakeholder Internet Governance (1)
  • Music (2)
  • Music and IT (16)
  • National Medical Day (1)
  • Net Neutrality (11)
  • Network (2)
  • Network Communications (1)
  • Network Economy (1)
  • Network Security (2)
  • Networks (2)
  • Neural Information Processing (1)
  • Neural Networks (3)
  • Neuroscience (2)
  • New TCC (6)
  • Next Generation Communication Technologies (2)
  • NFC (7)
  • NIST (67)
  • NoC (2)
  • NTIA (2)
  • Nuclear Forensics (1)
  • OASIS (1)
  • OECD (1)
  • Online Advertising (3)
  • Online Behavioral Advertising (OBA) (15)
  • Online Education (1)
  • Online Gambling (1)
  • Online Games (7)
  • Online Reklamcılık (2)
  • Online Reputation Management (ORM) (2)
  • Online Rights (1)
  • Online Transactions (1)
  • Online Uyuşmazlık Çözüm Yöntemleri (ODR) (1)
  • Open Access (1)
  • Open Compute Project (4)
  • Open Data (3)
  • Open Government (2)
  • Open Internet (1)
  • Open Source (5)
  • Open University (1)
  • Operating Systems (2)
  • Özel Hayatın Gizliliği (2)
  • Passwords (2)
  • Passwords cracking (1)
  • Patent (16)
  • PayPal (1)
  • Personal and Corporate Security (1)
  • Personal Identity Verification (1)
  • Personalisation (1)
  • Personally Identifiable Information (PII) (2)
  • PGP (2)
  • Phishing; Information Security (2)
  • PIN (1)
  • Piracy (3)
  • PKI (1)
  • PPP (1)
  • pri (2)
  • Privacy (169)
  • Privacy Auditing (1)
  • Privacy by Design (3)
  • Privacy Enhancing Technologies (PETs) (1)
  • Privacy Policy (2)
  • Prof.Dr. Uğur ALACAKAPTAN (1)
  • Public Key Encryption (1)
  • QR Code (2)
  • Quantum Computing (3)
  • Quantum Mechanics (1)
  • Rally (3)
  • Ray Kurzweil (1)
  • Registered e-Mail (2)
  • Regulatory Compliance (2)
  • Renan Öztürk (1)
  • Renewable Energy (2)
  • Research and Development (1)
  • Respect for the Masters (20)
  • Restrict Access (1)
  • RFID (2)
  • Robotics (26)
  • safe harbour ilkeleri (1)
  • SafeGov; Collaboration Agreement (1)
  • Safer Internet (3)
  • Safer Internet Day (1)
  • Safety (3)
  • Sağlık Bilişimi (1)
  • Samsung (1)
  • SANKO; Gaziantep (10)
  • SANS (4)
  • Sc (1)
  • Science (33)
  • Science and Engineering (1)
  • Science and Innovation (13)
  • Science and Technology (19)
  • Secrecy (1)
  • Security (5)
  • Security Protocols (1)
  • Security Standards (1)
  • security weaknesses (1)
  • SGK (2)
  • Siber Güvenlik (10)
  • Silicon Electronics (1)
  • Siyaset (2)
  • SKI (1)
  • Skydive (2)
  • Smart Grid (1)
  • SMEs (1)
  • Social and Information Networks (3)
  • Social Business (1)
  • Social e-Commerce (1)
  • Social Engineering (1)
  • Social Media (46)
  • Social Networks (13)
  • Social Responsibility (5)
  • Software (4)
  • Software and Conformance Testing (2)
  • software security (1)
  • Sound Systems (1)
  • Spam (1)
  • Spectrum (1)
  • SPK (2)
  • SSL (1)
  • Steganography (1)
  • Stephen Hawking (1)
  • Steve Jobs (11)
  • Storage (1)
  • Surveillance (57)
  • Sustainability (1)
  • Tahkim (1)
  • Tax (9)
  • TBMM Bilişm ve İnternet Araştırma Komisyonu-Arama Konferansı (1)
  • TCC (2)
  • Technology (18)
  • Technology and Innovation (15)
  • Technology News (8)
  • Telecommunication (2)
  • Telekomünikasyon (1)
  • Telekomünikasyon Sektöründe Kişisel Verilerin Korunması (2)
  • Telekomünikasyon; Telekomünikasyon Yoluyla Yapılan İletişimin Denetlenmesi (1)
  • Telemedicine (1)
  • The Gold Bug (1)
  • The Green Deal (1)
  • The HOBBIT (9)
  • The Internet of Things (8)
  • The Right to Acces to Information (1)
  • The Right To Be Forgotten (2)
  • The Sedona Conference (2)
  • Thesis (1)
  • tıbbi verilerin mahremiyeti ve güvenliği (4)
  • Ticari Sır; Telekomünikasyon (1)
  • Timestamp (1)
  • TLS (2)
  • Tracking (7)
  • Trademark Infringement (1)
  • Transanatolia (3)
  • Transparency (2)
  • TSM (1)
  • TSP (1)
  • TTK (1)
  • Turkey (3)
  • Turkish Airlines (2)
  • Tüketicilerin Korunması (1)
  • Türk Ticaret Kanunu (2)
  • Türkiye (3)
  • Twitter (3)
  • UDACITY (1)
  • Ulaştırma (1)
  • ulusal ve uluslararası standartlar (2)
  • Venture Capital (2)
  • Veri Koruması (8)
  • Veri Koruması Direktifi (2)
  • Veri Saklama (7)
  • Veri Saklama Direktifi (3)
  • Video Rendering (1)
  • Virtual Cell (1)
  • Virtual Education (1)
  • Virtual Memory System (1)
  • Virtual Reality (1)
  • W3C (52)
  • Watering Hole Attack (1)
  • Wearable Technology (3)
  • Web (4)
  • Web 2.0 (8)
  • Web Accesssibility (3)
  • Web Films (1)
  • web siteleri (1)
  • Web Trust (1)
  • WebSites Criteria (1)
  • WHO (1)
  • Wi-Fi (4)
  • Wikipedia (2)
  • Wired (2)
  • Wireless Networks (4)
  • Wiretap (2)
  • Wiretapping (2)
  • World Economic Forum (WEF) (2)
  • XBRL (1)
  • Yahoo (1)
  • Yandex (1)
  • YASAD (1)
  • Yeni Dijital Düzen Konferansı (1)
  • Yeni TTK (7)
  • Yeni Türk Ticaret Kanunu ve Dijital Şirket (6)
  • Youtube (2)
  • Zombi Bilgisayarlar (1)

Arşiv

  • ► 2017 (5)
    • ► Mayıs (2)
    • ► Nisan (2)
    • ► Mart (1)
  • ► 2016 (7)
    • ► Nisan (5)
    • ► Mart (2)
  • ► 2015 (21)
    • ► Aralık (1)
    • ► Kasım (2)
    • ► Eylül (2)
    • ► Ağustos (3)
    • ► Haziran (1)
    • ► Nisan (2)
    • ► Mart (7)
    • ► Şubat (1)
    • ► Ocak (2)
  • ► 2014 (104)
    • ► Kasım (1)
    • ► Eylül (3)
    • ► Ağustos (1)
    • ► Temmuz (1)
    • ► Haziran (3)
    • ► Mayıs (5)
    • ► Nisan (9)
    • ► Mart (30)
    • ► Şubat (31)
    • ► Ocak (20)
  • ▼ 2013 (2416)
    • ► Aralık (38)
    • ► Kasım (22)
    • ► Ekim (86)
    • ► Eylül (77)
    • ► Ağustos (101)
    • ▼ Temmuz (241)
      • The top 10 new reasons to be afraid of hackers
      • The Machine Zone: This Is Where You Go When You Ju...
      • Breakpoint: Why the Web will Implode, Search will ...
      • Warrantless Cellphone Tracking Is Upheld
      • BİLİŞİM ve TEKNOLOJİ HUKUKU ENSTİTÜSÜ MASTER PROGR...
      • The Hole in Our Collective Memory: How Copyright M...
      • Privacy and Safety on Facebook: A Guide For Surviv...
      • Scene Reconstruction from High Spatio-Angular Reso...
      • The Ethics of Saving Lives With Autonomous Cars Ar...
      • Apple's Unkept Promises: Cheap iPhones Come at Hig...
      • Lego's World Map
      • "Happy Birthday Nasa" - NASA's 55th Anniversary: 5...
      • Minor evidence of fingerprint recognition in futur...
      • Asiana 214: Airplane as Hero, and Other Analyses
      • Texas students fake GPS signals and take control o...
      • Is There a Theory of Everything?
      • "Biodynamic" and "Luigi Colani"
      • Typography in ten minutes
      • Quantum Cryptography
      • Making Perfect Takeoffs & Landings in Light Airpla...
      • Gulfstream G650
      • Could the Government Get a Search Warrant for Your...
      • Motorcycle futurism: space age dreams come to life...
      • Most IT pros assume big brother is spying on corpo...
      • Black Hat USA 2013
      • Spy agencies ban Lenovo PCs on security grounds
      • Director Peter Jackson Liveblogs Last Day of Hobbi...
      • Pinterest Allows Users to Opt-Out of Being Tracked...
      • Information Consumerism: The Price of Hypocrisy
      • Türkiye'nin 500 Sanayi Kuruluşu -2012 Açıklandı
      • Social Mobilization and the Networked Public Spher...
      • The National Cybersecurity Center Seeks Comments o...
      • Threat Awareness Forum of Sophos
      • Treehouse: A Better Way To Learn Technology
      • Edit Wikipedia on the go
      • This Is Your Year — Go Big With Mobile Drafting In...
      • The End of Night: Searching for Natural Darkness i...
      • RITHM: Music Messaging
      • Why You Should Think Twice Before Shaming Anyone o...
      • Do-Not-Track Group To Weigh Shaky Future During Ke...
      • No Keyboard, and Now No Touch Screen Either
      • The Pixel Painter: A 97-Year-Old Man Who Draws Usi...
      • Officials say new anti-leak measures set at NSA
      • Akamai Releases First Quarter 2013 'State of the I...
      • How Protecting Your Privacy Could Make You the Bad...
      • New NIST Standard Reference Material to Help Calib...
      • NIST Releases Updates to Digital Signature Standar...
      • Bottlenose dolphins can use learned vocal labels t...
      • American Historical Association: Universities Ough...
      • TrackOffUs
      • WIKIMANIA
      • "Segway is Not Safe" Court Says
      • Google Serves 25 Percent of North American Interne...
      • Paper-thin e-skin responds to touch, holds promise...
      • Korea’s Internet Explorer dependency blamed for ha...
      • The Firefox Nebula
      • Black Boxes in Cars: A Question of Privacy
      • Seeing Snow in Space
      • Yarrly: An Anonymous, Remixable Photo App For Andr...
      • Facebook founder Mark Zuckerberg secretly filmed f...
      • Amazon told: time is up for tax avoidance
      • Inside the insane 50,000-watt Ibiza speaker stack ...
      • ThinkGeek
      • The new Google Maps app for iPhone and iPad is her...
      • Apple, Samsung in Renewed Settlement Talks, but De...
      • TSA will use electronic ‘Randomizers’ to randomly ...
      • Ungrounded
      • Patient Room 2020
      • Schoep Passed Away :( I'm so sorry for Schoep and ...
      • VoIP phone hackers pose public safety threat
      • Amazon Rejected as Domain Name After South America...
      • Google Inc. Announces Second Quarter 2013 Results
      • Energy-Efficient Fault-Tolerant Systems (Embedded ...
      • The New York Times Launches News App for Leap Moti...
      • Netflix presses ahead with HTML5, as free software...
      • iWatch’s novelty emerges as Apple taps sensor and ...
      • CSS Counter Styles Level 3
      • IREX VI - Temporal Stability of Iris Recognition A...
      • The Danger of Mixing Cyberespionage With Cyberwarf...
      • Food Huggers
      • Teddy The Guardian
      • 'Free iPhone' Text Message Spammer Settles FTC Cha...
      • Letter From ICT Companies To The US Government
      • UBER: Now Serving Ice Cream
      • Life Cycle Assessment of Renewable Energy Sources ...
      • Strategic Approaches for Human Capital Management ...
      • New Nike Free Hyperfeel Functions as an Extension ...
      • The End of Digital Tyranny: Why the Future of Comp...
      • 7 New Outdoor Products for Your Dog
      • Future Nissans will get AT&T connectivity thanks t...
      • Cloudability
      • Mobile Trends 2020 Africa: A Collaborative Outlook...
      • Everything you need to know about PRISM
      • The Creepy, Long-Standing Practice of Undersea Cab...
      • The Social-Media Bubble Is Quietly Deflating
      • BANKALARIN İÇ SİSTEMLERİ HAKKINDA YÖNETMELİKTE DEĞ...
      • LoL: Lots of Love
      • We Should All Have Something To Hide
      • What Base Text to Use for the Do Not Track Complia...
      • MIT Whiz Wants to Turn Your Skin Into a Computer I...
    • ► Haziran (133)
    • ► Mayıs (107)
    • ► Nisan (227)
    • ► Mart (363)
    • ► Şubat (276)
    • ► Ocak (745)
  • ► 2012 (647)
    • ► Aralık (209)
    • ► Kasım (203)
    • ► Ekim (135)
    • ► Eylül (76)
    • ► Ağustos (8)
    • ► Temmuz (2)
    • ► Haziran (6)
    • ► Mayıs (3)
    • ► Nisan (1)
    • ► Şubat (1)
    • ► Ocak (3)
  • ► 2011 (44)
    • ► Kasım (1)
    • ► Eylül (15)
    • ► Ağustos (4)
    • ► Temmuz (4)
    • ► Haziran (2)
    • ► Mayıs (1)
    • ► Nisan (2)
    • ► Mart (3)
    • ► Şubat (1)
    • ► Ocak (11)
  • ► 2010 (50)
    • ► Aralık (9)
    • ► Kasım (6)
    • ► Ekim (6)
    • ► Eylül (1)
    • ► Ağustos (7)
    • ► Haziran (3)
    • ► Mayıs (4)
    • ► Nisan (2)
    • ► Mart (2)
    • ► Şubat (2)
    • ► Ocak (8)
  • ► 2009 (61)
    • ► Aralık (6)
    • ► Kasım (3)
    • ► Ekim (4)
    • ► Eylül (9)
    • ► Ağustos (5)
    • ► Temmuz (2)
    • ► Haziran (7)
    • ► Mayıs (7)
    • ► Nisan (4)
    • ► Mart (5)
    • ► Şubat (4)
    • ► Ocak (5)
  • ► 2008 (41)
    • ► Aralık (9)
    • ► Kasım (3)
    • ► Ekim (4)
    • ► Eylül (1)
    • ► Ağustos (5)
    • ► Temmuz (12)
    • ► Haziran (5)
    • ► Mayıs (2)
 
© 2009 Bilişim Hukuku Günlüğü