Thursday, June 27, 2013

BYOD blues: What to do when employees leave

  13 exciting new open source projects | There is no universal right to be forgotten, says top EU court advisor
 
  Computerworld IT Management/Outsourcing

Forward this to a Friend >>>


BYOD blues: What to do when employees leave
The bring your own device (BYOD) trend is gaining steam, thanks to the cost benefits and increased productivity that can come from allowing employees to provision their own technology. Mobile workers are more likely to put in more hours, so if your employees want to buy their own equipment and do more work on their own time, it's a win for the company. Read More


WHITE PAPER: 8x8

When Disaster Tests Your Business, Cloud Can Save It
Find out why the survivors of Hurricane Sandy and other recent calamities say they wish they'd had cloud-based business VoIP communications, rather than "the vulnerability and limitations of the premises-based communications we had in place." Read Now

WHITE PAPER: Mimecast North America Inc

The Total Economic Impact of Mimecast's UEM Solution
This research provides a framework to evaluate the potential financial impact of unifying your email management in the cloud. Learn More. Learn More.

13 exciting new open source projects
Browser-based toolkits, add-ons to old favorites, tools programmers will love -- here are the most promising projects emerging from the open source community today. Read More

There is no universal right to be forgotten, says top EU court advisor
The senior advisor to Europe's top court said Tuesday that Google is not responsible for third party information in its search results and that there is no universal "right to be forgotten" under the current data protection laws. Read More


WHITE PAPER: EMC Corporation

EMC Next Generation Backup and Recovery
Read this IDC analysis of ten midsize companies that have deployed EMC backup and recovery solutions to learn key IDC findings including: - Average payback period of 7 months ROI of 450% over 3 years - Reduced restore times from 17 to 2 hours - Reduced backup windows from 11 to 3 hours Learn more.

Source code for Carberp financial malware gets leaked online
The source code for the Carberp financial malware has been leaked online, increasing the risk that other cybercriminals will create their own variants based on it, according to researchers from Russian cybercrime investigations firm Group-IB. Read More

EMC's Syncplicity lets enterprises lock down data sharing
EMC is giving enterprises greater control over how corporate data gets distributed and to whom, plus more mobile capabilities, with the latest update to its Syncplicity service. Read More

A data center story for the ages: the fuel bucket brigade
The improbable story of the data center saved by a fuel bucket brigade is not told with fondness, even if there is a sense of pride and humor in its retelling. Read More

 

DIGITAL SPOTLIGHT: CLOUD COMPUTING

In our in-depth report on cloud computing, we take a closer look at platform-as-a-service, security-as-a-service and back-end-as-a-service, weighing the benefits and challenges of each service and sharing tips from early adopters.

This free, 12-page magazine-style report is available now [Registration required]

To read the report, click here.

CALL FOR NOMINATIONS: PREMIER 100 IT LEADERS

Now's your chance to get a worthy CIO or other top IT executive nominated for next year's Premier 100 IT Leaders awards! Deadline is Friday, Aug. 30.

To make a nomination, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we run the numbers on BYOD, document cool new technologies making their way into the enterprise, and share tips from top companies on how to cope with exploding demand. This free, 12-page magazine-style report is available now [Registration required]

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Although the National Security Agency's secretly collecting phone records of millions of Verizon customers may be nothing new, the current scope of the data collection is "breathtaking." Do you think the U.S. government be allowed to collect phone records and mine Internet data on citizens?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.

 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_management_outsourcing as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:21 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive