Wednesday, May 22, 2013

IT on the fly: Building, then dismantling, IT ops

  Apple to build Macs in low-tax Texas | U.S. power companies under frequent cyberattack
 
  Computerworld First Look

Forward this to a Friend >>>


INSIDER
IT on the fly: The art of quickly building, then dismantling, IT operations
The CIOs for the London Olympics, President Obama's 2012 re-election campaign and other short-lived but intense operations know how to run successful IT shops in extraordinary situations -- and their insights can be applied in even the most ordinary of conditions. Insider (registration required) Read More


RESOURCE COMPLIMENTS OF: UL Environment

The New Marks of Leadership
The most trusted name in safety is making its mark on sustainability. UL Environment certifications, like GREENGUARD and ECOLOGO®, provide differentiation in the marketplace and third-party verification that a product is healthier and more sustainable. Look for the new marks and search for certified products at UL.COM/ENVIRONMENT. UL.COM/NEWMARKS

WEBCAST: 8x8

7 Reasons to Choose VoIP
Thinking about a new phone system for your business? Be sure to watch this informative webcast. Steve Strauss, small business columnist for USA Today and author of the Small Business Bible, shares his useful and powerful expertise. Learn more.

Apple to build Macs in low-tax Texas
Apple will build Macs in Texas using some parts made in the U.S., CEO Tim Cook said Tuesday, putting a little flesh on a pledge from last December. Read More

U.S. power companies under frequent cyberattack
A survey of U.S. utilities shows many are facing frequent cyberattacks that could threaten a highly interdependent power grid supplying more than 300 million people, according to a congressional report. Read More

Jive's Producteev task management app now free for unlimited users
Jive Software has eliminated the limit on the number of people who can use its social task management application Producteev for free within a company. Read More

Teens growing cool on Facebook but warming to Twitter, Pew study finds
Some teens are growing tired of the excessive sharing and "drama" on Facebook and more are turning to sites like Twitter and Instagram to express themselves, according to a new study. Read More

Chinese hackers said to have accessed law enforcement targets
More that three years after what came to be known as Operation Aurora, it appears that the cyber marauders were after more than just information on activists. Read More


WHITE PAPER: EMC Corporation

Manage the New Software-defined Data Center
Today's IT environments make service assurance anything but easy. Factors such as the dynamic nature of the virtual data center, the rapid pace of IT change and limited operational visibility and insight make providing service assurance more of a long-term goal than near-term reality for many IT leaders. Learn more.

Ericsson software automates Wi-Fi vs. cell choice in mixed networks
New network software from Ericsson is designed to make sure mobile users get the best possible connection when there is both a Wi-Fi and a cellular network available. Read More

Yahoo returns to list of most valuable brands
Yahoo again ranks as one of the world's 100 most valuable brands. Read More

Sharon Gaudin: Google Glass didn't make me a dork
Trying Google's Glass was a lot more fun than I had expected Read More

Darlene Storm: Zero-day vulnerabilities in first-person shooter game engines allow attackers to pwn your PC
Are you are gamer? If the answer is also "yes" to playing first-person shooters, then listen up. At NoSuchCon, ReVuln, a security firm that sells zero-day vulnerability information to government agencies and other companies, presented "Exploiting Game Engines For Fun & Profit." Game engines for many first-person shooter video games have critical security flaws offering "thousands of potential attack vectors," that allow for "millions of potential targets" aka FPS players. Read More

INSIDER
Robert L. Mitchell: CIO of the future: Innovator or ERP baby sitter?
IT organizations that fail to gain traction as leaders in business innovation may soon end up as nothing more than legacy ERP system baby sitters. CIOs need to move up the food chain quickly -- or move on. Read More

 

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we run the numbers on BYOD, document cool new technologies making their way into the enterprise, and share tips from top companies on how to cope with exploding demand. This free, 12-page magazine-style report is available now [Registration required]

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
One of the first Google Glass apps, Winky, lets Glass users take pictures with the blink of an eye, leading some to start talking about a potential privacy issues and social etiquette. Would you buy a pair of Google Glass when it becomes available?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.

 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:04 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive