Now enter Lenovo as a potential BlackBerry suitor | Apps deployed on iPhone and iPad dominate in the enterprise | |||||||||
Computerworld Wrap-Up | |||||||||
Microsoft rips page from Apple's playbook, sells app gift cards WEBCAST: CDW CDW Software Asset Management SAM is a process, not a one off project. Chances are you've either been audited, or you will be soon. In fact, nearly two-thirds of all US business entities will be audited within the next 12 months. View Now In this Issue
WHITE PAPER: Salesforce.com 2013 Gartner Magic Quadrant Report for Salesforce Automation New Gartner research positions salesforce.com in the Leaders Quadrant for Sales Force Automation. Download the 2013 Gartner Magic Quadrant Report and find out what Gartner analysts have to say about Salesforce. Read now! Now enter Lenovo as a potential BlackBerry suitor Apps deployed on iPhone and iPad dominate in the enterprise Microsoft fires off Windows 8.1, first round in fast-track updates Twitter reportedly kicking off roadshow Oct. 25 Hackers attack PR Newswire, get user data Apple, others can now comment on Samsung's proposed patent remedies Cornell team building heart-monitoring, bug-fighting smart clothes WHITE PAPER: Mitel Networks Building the Case Focusing on top- and bottom-line business results helps IT leaders garner support for unified communications. Learn More Mobile, broadband growth drive Q3 Verizon sales, profit hikes Oracle acquires Compendium to boost online marketing wares OpenStack's new code release packed with enterprise features VMware says virtualized desktops bring better 3D graphics Darlene Storm: Flying robots: From surveillance concerns to cool drone innovations Antone Gonsalves: Why the iPhone 5s is too good Preston Gralla: 5 tips and secrets for getting more out of Windows 8.1 | |||||||||
In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up. This free, 28-page magazine-style report is available now [Registration required] To read the report, click here. KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE + DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL NEW COMPUTERWORLD JOB BOARD | |||||||||
Get more IT peer perspective online: You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Computerworld, please send an e-mail to online@computerworld.com. Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. ** |
0 comments:
Post a Comment