Wednesday, October 2, 2013

IT purchasing: Who decides what tech to buy?

  Microsoft steers same strategic course in Surface do-over | Utility cuts IT workforce, hires Indian outsourcers

 
  Computerworld First Look

Forward this to a Friend >>>


IT purchasing: Who decides what tech to buy?
IT purchasing can be complicated and costly, and contract negotiations aren't every CIO's core strength. Enter the procurement partner. Read More
 


WEBCAST: Dell VMware

An End-to-End Approach to Data Protection
Traditional approaches to data protection are no longer enough. Why not? Because data volumes are exploding. Because there's little or no tolerance for data loss and downtime. View Now

In this Issue


WHITE PAPER: SAS

New Product Forecasting Using Structured Analogies
Learn about a new patent-pending approach that may be helpful in certain new product forecasting situations. Make manual overrides to the statistical forecasts, and get a better sense of the risks and uncertainties in new product forecasts through visualization of past new product introductions. View Now

Microsoft steers same strategic course in Surface do-over
Microsoft's refreshed Surface 2 tablets, which the company unveiled last week and will start selling Oct. 22, illustrate that Microsoft has not changed its ongoing strategy in mobile, analysts said. Read More
 

Utility cuts IT workforce, hires Indian outsourcers
  Northeast Utilities in Connecticut on Tuesday confirmed that it plans to turn over part of its IT operations to two India-based outsourcing firms, despite a recent push by state lawmakers to keep it from doing so. Read More
 

Millions flood healthcare insurance sites as feds grapple with glitches
As Obamacarehealth insurance exchange opened for enrollment, state and federal sites providing the service were inundated with requests, ultimately leading to slowdowns or outages. Read More
 

Move over, Curiosity! NASA plans new Mars rover
NASA is working on the next robotic rover to send to Mars and it's already looking for ideas about what tools the rover should take with it. Read More
 

More NSA leaks to come, Guardian says
The flood of stories on government spying will not be slowing soon -- in fact the majority of the most important documents detailing how the U.S. National Security Agency collects personal data have not been published yet, journalists from U.K. newspaper The Guardian said on Tuesday. Read More
 

Antone Gonsalves: Why we fear the mobile wallet
Despite advances in technology, people still trust their back pockets to keep their credit cards safe more than their smartphones. Read More
 

Heat it, bend it, slam it and the latest gadget glass won't break
Glass manufacturers are pushing the boundaries of what's possible with the material, and some of the latest gadget glass is on show this week by Nippon Electric Glass at the Ceatec 2013 expo. Read More
 

Darlene Storm: Hacking the Internet of Things at DerbyCon: Weaponizing your coffee pot
If you are not a morning person, then you might be a bit brain-dead until you have serious doses of caffeine. So if your high-tech coffee pot connected to the Internet of Things had been hijacked by a bad guy, how would you even know if it, or another of your connected appliances, were being used against you? At the security conference DerbyCon 3.0, Daniel Buentello gave a very interesting presentation titled "Weaponizing your coffee pot." Read More
 


WHITE PAPER: Mitel Networks
 
9 Cloud Myths Debunked
What's preventing your organization from enhancing its communications and collaboration capabilities? Private, public and hybrid cloud approaches can have a dramatic impact on improved efficiency, agility, and support for business growth. View Now

Report: Ford CEO downplays chatter that he's in line to replace Ballmer
Ford President and CEO Alan Mulally, considered a front-runner among candidates to replace Microsoft CEO Steve Ballmer, has reportedly tried to put the brakes on the accelerating rumors. Read More
 

Yahoo concerned that release of redacted FISA papers may mislead
Yahoo has asked that it be allowed to review declassified documents of a secret court about a dispute over data collection between the Internet company and the government, as the release of the redacted documents could mislead the public. Read More
 

Apple can push iOS email across German borders again
  Apple switched on its push email services for iOS devices in Germany again after posting a bond of a 100 million euros (US$135 million). Read More
 

Apple's 64-bit A7 chip is a 'marketing gimmick'
  Apple's 64-bit A7 processor in the iPhone 5s is more a marketing stunt than a technical enhancement and though it will not deliver any immediate benefits to smartphone users, there are other reasons to move to 64-bit, a Qualcomm executive said. Read More
 

SAP ramps up venture capital efforts
SAP's venture capital arm has raised $1 billion over the past year as the company tries to land stakes in hot startup companies, both to generate profit down the road and to align itself with the industry's newest technologies. Read More
 

NSA encryption-defeating efforts will backfire, privacy advocates say
The U.S. National Security Agency's efforts to defeat encryption will backfire by eroding trust in U.S.-based Internet services and in the agency's own efforts to aid U.S. companies with cybersecurity, a group of privacy advocates said Tuesday. Read More
 

Splunk dives deeper into business analytics
Splunk continues to enhance its flagship machine data search engine so it can be used by business analysts and managers, in addition to its typical audience of system and network administrators. Read More
 

Samsung wants to connect Galaxy Gear smartwatch to TVs
Samsung's upcoming Galaxy Gear smartwatch is seen as an extension of the smartphone, but research is under way to see how the wearable device could work with electronics such as TVs. Read More
 

 

DIGITAL SPOTLIGHT: SECURITY
 

In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up.

This free, 28-page magazine-style report is available now [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
In our in-depth report, we run the numbers on BYOD, document cool new technologies making their way into the enterprise, and share tips from top companies on how to cope with exploding demand. This free, 12-page magazine-style report is available now [Registration required]

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Despite months of leaks regarding Apple's announcement this week, it still managed some surprises. What do you think the most important news from Apple's iPhone unveiling was?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 
 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive