Preston Gralla: Microsoft's Surface 2 and Surface Pro 2: Too-high prices mean they're non-starters | New Dell won't abandon the PC | |||||||||
Computerworld Microsoft | |||||||||
Google wages war on Microsoft's Office with free iOS, Android apps WHITE PAPER: Mitel Networks Network World Report: Getting Ahead of BYOD Organizations are being flooded with employee-owned gadgets and valiantly trying to accommodate requests to provide access to corporate resources while maintaining control enough to minimize risk and meet compliance requirements. Learn More In this Issue
WHITE PAPER: SonicWALL Anatomy Of A CyberAttack As the severity of cyber-attacks continues to grow, it pays to know the strategies cyber-criminals use to attack your network, the types of malware they favor and the tools you need to stop them. Read our new e-book "The Anatomy of a Cyber-Attack" to learn the latest strategies cyber-criminals are using. Read Now Preston Gralla: Microsoft's Surface 2 and Surface Pro 2: Too-high prices mean they're non-starters New Dell won't abandon the PC Preston Gralla: Time to break up Microsoft? Not so fast Preston Gralla: Steve Ballmer finally admits Microsoft blew it by focusing too much on Windows WEBCAST: VCE Reduced Costs & Improve Asset Utilization with Vblock IDC suggests IT organizations deploy converged infrastructure systems that manage server, storage and network as unified IT assets. Learn about the significant business benefits 5 companies experienced when doing so. Learn More. Microsoft OS chief says goal is one API to rule them all Four needling questions for Microsoft as it hosts Wall Street analysts Microsoft inches toward Office on iPad, Android tablets Microsoft expands buyback deal to goose sales of Surface, Windows phones HP's first Windows 8.1 tablet to hit stores in November | |||||||||
In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up. This free, 28-page magazine-style report is available now [Registration required] To read the report, click here. KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE + CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL NEW COMPUTERWORLD JOB BOARD | |||||||||
Get more IT peer perspective online: You are currently subscribed to computerworld_microsoft as jonsan98@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Computerworld, please send an e-mail to online@computerworld.com. Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. ** |
0 comments:
Post a Comment