With IPO looming, Twitter takes on losses, wary investors | Hackers steal data on 2.9 million Adobe customers | |||||||||
Computerworld First Look | |||||||||
Microsoft dings Ballmer's bonus over Windows 8, Surface RT struggles WHITE PAPER: Akamai Technologies, Inc. Demonstrate the Business Value of Security This Forrester report highlights the most common mistakes made in the budgeting process and offers Forrester's step-by-step Information Security Value Model to guide you through a strategy to support smart investment and resource allocation. Learn More In this Issue
WHITE PAPER: HP and Intel® Xeon® processors Future-Proofing Your Data Center Storage Learn how investing in increased flexibility and automation can provide additional agility for businesses to respond to new opportunities quickly. Learn more. With IPO looming, Twitter takes on losses, wary investors Hackers steal data on 2.9 million Adobe customers The must-have iPad office apps, round 6 Snapchat seen overmatched in fight with Facebook Twitter IPO docs show rapid growth, steep losses U.S. indicts 13 Anonymous members for DDoS attacks Samsung execs may have peeked at secret Apple info WHITE PAPER: SAS New Product Forecasting Using Structured Analogies Learn about a new patent-pending approach that may be helpful in certain new product forecasting situations. Make manual overrides to the statistical forecasts, and get a better sense of the risks and uncertainties in new product forecasts through visualization of past new product introductions. View Now Instagram says ads are on the way IBM buys e-commerce tool maker Xtify Michael Horowitz: The Microsoft way Preston Gralla: Microsoft beats Yale in the "Bing It On" search challenge Next-gen Nokia Siemens carrier systems goes virtual Yahoo abandons T-shirt rewards for vulnerability information Richi Jennings: OOPS! Adobe abode hacked: Credit cards copied, source silently snatched | |||||||||
In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up. This free, 28-page magazine-style report is available now [Registration required] To read the report, click here. KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE + DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL NEW COMPUTERWORLD JOB BOARD | |||||||||
Get more IT peer perspective online: You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Computerworld, please send an e-mail to online@computerworld.com. Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. ** |
0 comments:
Post a Comment