LinkedIn

LinkedIn - News, Features, and Slideshows

News

  • Attention, rockstar developers: Get a talent agent

    You've heard the timeworn advice: Leverage LinkedIn, post code to GitHub, bone up on the latest buzzy tech. But a little-known career trick is giving some of today's top developers an edge: Hire an agent to find work for you.

  • LinkedIn restricts API usage

    LinkedIn is restricting access to most of its application programming interfaces (APIs) to companies that have struck up partnerships with the social networking company.

  • Who's calling, please?

    Some security weaknesses can't be found with a scan or a vulnerability assessment of the infrastructure. As a security manager, you have to keep your eyes open for things that aren't as secure as they should be, based on any evidence that comes your way. That happened to me a few weeks ago, in just about the best way possible. We were able to take steps to tighten security in a particular area after an incident that could have been damaging but actually wasn't. I wish all our security lessons could be so benign.

  • Mozilla upgrades Firefox to v.35, streamlines video calling

    Mozilla today released its newest browser, Firefox 35, which features a streamlined version of the plug-in-free Hello video calling service and faster access to an app marketplace that has dreams of becoming the next Chrome Web Store.

  • LinkedIn pays almost $6M for wage law violations

    Professional networking company LinkedIn agreed to pay close to US$6 million in overtime back wages and damages to employees at its branches in California, Illinois, Nebraska and New York, the U.S. Department of Labor said Monday.

  • Is Bring Your Own Identity a security risk or advantage?

    The "Bring Your Own Identity" (BYOID) trend in which websites let users authenticate using identities established through Facebook, LinkedIn, Google, Amazon, Microsoft Live, Yahoo or other means raises some questions in the minds of IT and business managers. And a survey conducted by Ponemon Institute shows a vast difference in how the IT and business sides think about this so-called BYOID method of authentication.

[]