Microsoft steers same strategic course in Surface do-over | Utility cuts IT workforce, hires Indian outsourcers | |||||||||
Computerworld First Look | |||||||||
IT purchasing: Who decides what tech to buy? WEBCAST: Dell VMware An End-to-End Approach to Data Protection Traditional approaches to data protection are no longer enough. Why not? Because data volumes are exploding. Because there's little or no tolerance for data loss and downtime. View Now In this Issue
WHITE PAPER: SAS New Product Forecasting Using Structured Analogies Learn about a new patent-pending approach that may be helpful in certain new product forecasting situations. Make manual overrides to the statistical forecasts, and get a better sense of the risks and uncertainties in new product forecasts through visualization of past new product introductions. View Now Microsoft steers same strategic course in Surface do-over Utility cuts IT workforce, hires Indian outsourcers Millions flood healthcare insurance sites as feds grapple with glitches Move over, Curiosity! NASA plans new Mars rover More NSA leaks to come, Guardian says Antone Gonsalves: Why we fear the mobile wallet Heat it, bend it, slam it and the latest gadget glass won't break Darlene Storm: Hacking the Internet of Things at DerbyCon: Weaponizing your coffee pot WHITE PAPER: Mitel Networks 9 Cloud Myths Debunked What's preventing your organization from enhancing its communications and collaboration capabilities? Private, public and hybrid cloud approaches can have a dramatic impact on improved efficiency, agility, and support for business growth. View Now Report: Ford CEO downplays chatter that he's in line to replace Ballmer Yahoo concerned that release of redacted FISA papers may mislead Apple can push iOS email across German borders again Apple's 64-bit A7 chip is a 'marketing gimmick' SAP ramps up venture capital efforts NSA encryption-defeating efforts will backfire, privacy advocates say Splunk dives deeper into business analytics Samsung wants to connect Galaxy Gear smartwatch to TVs | |||||||||
In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up. This free, 28-page magazine-style report is available now [Registration required] To read the report, click here. KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE + DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL NEW COMPUTERWORLD JOB BOARD | |||||||||
Get more IT peer perspective online: You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Computerworld, please send an e-mail to online@computerworld.com. Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. ** |
0 comments:
Post a Comment