Report: Ford CEO downplays chatter that he's in line to replace Ballmer | CTOs, don't neglect the C-suite | ||||||||||
Computerworld IT Management/Outsourcing | ||||||||||
IT purchasing: Who decides what tech to buy? WEBCAST: Dell VMware How to Transform IT into a Center of Business Innovation Although IT supports virtually every business process, many organizations are hard-pressed to take advantage of technology advances when they're trapped into spending most of the IT budget on maintenance instead of innovation. View Now In this Issue
WHITE PAPER: SonicWALL 10 Ways to Securely Optimize Your Network Learn 10 ways SonicWALL solutions can help optimize performance, enhance security, and increase employee productivity, without introducing latency. Read now. Report: Ford CEO downplays chatter that he's in line to replace Ballmer CTOs, don't neglect the C-suite Utility cuts IT workforce, hires Indian outsourcers SAP ramps up venture capital efforts Microsoft to pay execs who stay, pay those culled during reorg turmoil WHITE PAPER: Dell and Intel® IDC: The Benefits of Converged Systems in SMB Environments The motivations for adoption of converged systems are improved IT efficiency, faster time to market, and increased cost advantage. These efficiencies can be easily extended to remote offices and small and medium-sized businesses (SMBs) that need to simplify their IT operations while expanding their IT capabilities. Read now! IBM settles with U.S. over alleged discrimination in job ads Oracle scoffs at charge that Ellison is overpaid House Democrats push ahead on immigration, H-1B Cisco CEO Chambers gets 80% pay raise Preston Gralla: Is Bill Gates next on the Microsoft chopping block? | ||||||||||
In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up. This free, 28-page magazine-style report is available now [Registration required] To read the report, click here. KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE + DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL NEW COMPUTERWORLD JOB BOARD | ||||||||||
Get more IT peer perspective online: You are currently subscribed to computerworld_management_outsourcing as jonsan98@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Computerworld, please send an e-mail to online@computerworld.com. Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. ** |
0 comments:
Post a Comment