Monday, July 30, 2012

Build a private social network that employees will actually use

  Mexico hotel giant puts its IT in Texas | Mountain Lion grabs 3% share of OS X in first 48 hours
 
  Computerworld First Look

Forward this to a Friend >>>


Build a private social network that employees will actually use
More and more companies are creating private social networks that help their employees learn from each other and drive the business forward. Here are tips from four companies that are finding success with internal social networks. Read More


RESOURCE COMPLIMENTS OF: Cisco

Webcast Demonstrates New Collaboration Advances
An insightful webcast demonstrates how you can harness the power of people-centric collaboration in today's post-PC world. You'll learn about new collaboration tools and technologies and witness firsthand why they're making the experience more immersive and more mobile, in boardrooms, bistros, and everywhere in between. Watch the webcast today. See how these solutions make collaboration possible from iPads to boardrooms. And learn how they're enabling organizations to accelerate decisions, be more productive, and save countless dollars in the process. View the webcast and see for yourself.

In this Issue


RESOURCE COMPLIMENTS OF: FileMaker, Inc

Create, deploy and manage custom business apps for iPad
The FileMaker Platform is a complete software suite to create, deploy, and manage custom business apps for iPad and iPhone. Design and build stunning iOS apps. Integrate mobile apps into existing enterprise systems. Deploy and instantly update your apps. Secure your apps with industry-standard authentication. Learn more, Watch overview video, Read the white paper >

Mexico hotel giant puts its IT in Texas
The U.S. has been shipping application development work offshore for years, but cloud computing may help make America a data center services exporter. Read More

Mountain Lion grabs 3% share of OS X in first 48 hours
Apple's OS X Mountain Lion is off to a solid start in its first 48 hours and now powers more than 3% of all Macs, an online advertising network said. Read More

Microsoft announces new hardware for Windows 8
Microsoft on Monday announced new keyboards and mice optimized for tablets and laptops running the Windows 8 operating system. Read More

A new app lets you send pictures via sound
Columnist Mile Elgan finds a new app called Chirp that could revolutionize how we all communicate and share data. Read More

Court filings reveal early iPhone, iPod prototypes
Documents submitted to a court in California as part of the patent battle between Apple and Samsung Electronics provide a fascinating look at the iPhone and iPad designs considered by Apple before the devices went on sale. Read More

Taiwanese university claims Apple's Siri infringes its patents
A Taiwanese university has sued Apple for alleged patent infringement in its Siri voice assistant, as part of an initiative to help Taiwan's local electronic firms fight back against intellectual property disputes brought by their foreign rivals. Read More

Fraudsters tempt Olympic fans with bogus streaming websites
The Olympic Games in London have sparked interest from fraudsters, with a raft of sites supposedly offering live video streams of events, according to security vendor Trend Micro. Read More


WHITE PAPER: Symantec

An interactive eGuide: Backup Solutions
In this eGuide, Computerworld and sister publications CSO, CIO, and Network World, examine many of the issues that mid-sized companies grapple with today regarding disaster recovery, business continuity, and backup. Read on for expert advice and analysis to help companies protect themselves in the face of disaster. Read Now!

Researcher creates proof-of-concept malware that infects BIOS, network cards
Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer's BIOS (Basic Input Output System) and can compromise the operating system at boot time without leaving traces on the hard drive. Read More

The new Kindle Fire: What we know
With Microsoft and Google taking turns grabbing the spotlight on the tablet stage, when will it be Amazon's turn to create some sizzle? Read More

Tools released at Defcon can crack widely used PPTP encryption in under a day
Security researchers released two tools at the Defcon security conference that can be used to crack the encryption of any PPTP and WPA2-Enterprise sessions that use MS-CHAPv2 for authentication. Read More

NSA chief asks hackers at Defcon for help securing cyberspace
National Security Agency Director General Keith B. Alexander addressed the attendees of the Defcon hacker conference in Las Vegas on Friday and asked for their help to secure cyberspace. Read More

Zuckerberg shoots down Facebook phone rumors
Facebook CEO Mark Zuckerberg said his company does not plan to create a Facebook-branded smartphone during a conference call with financial analysts and reporters this week. Read More

Twitter suffers malware spam outbreak
A widespread spam attack linking to malware has broken out on Twitter, according to the security firm Sophos. Read More

Facebook to test first Open Compute racks
Facebook has taken delivery of the first set of innovative server racks it helped design, technology that the company hopes other organizations with large data centers will adopt. Read More

Richi Jennings: DEF CON 20 roundup: Critical lessons for all
So that was DEF CON 20. The infamous security convention has wound up, leaving hackers of all hat colors bemused, befuddled, and bewildered. This year saw an official NSA appearance, which posed more questions than it answered. It also brought worrying threats to enterprise VPN and Wi-Fi networks. In IT Blogwatch, bloggers count their Lost Wages. Read More

 
 
 

PREMIER 100 -- CALL FOR NOMINATIONS

Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld has launched its annual search for technology professionals who have demonstrated leadership in their organizations through the use of information technology and have the strategic vision to align IT with business goals. Nominations are being collected now through August 29, 2012.

SHARK TANK OF THE DAY

One at a time -- remember?

Flashback to 1999, when this electric utility is converting to a new Y2k-compliant accounting system -- which means 150 million transactions to convert for the previous five years.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

The latest version of Mac OS X, Mountain Lion, is now available. Will you be upgrading to Apple's new operating system?

COMPUTERWORLD'S IT SALARY SURVEY 2012

A majority of IT workers say they're under pressure to increase productivity and take on new tasks. But the vast majority are still happy they picked IT as their career.

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:31 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive