9 museums that want your legacy tech | Google buys Flutter, a gesture recognition startup | ||||||||||
Computerworld First Look | ||||||||||
Review: The iPhone 5S really is the best iPhone yet WEBCAST: Dell Wyse and VMware Accelerating Time to Value with Desktop Virtualization With today's dispersed and mobile workforce, many companies are turning to desktop virtualization to keep pace with computing requirements. But it takes best practices and trusted partners to more quickly and cost-effectively deliver value. View Now In this Issue
WHITE PAPER: Datawatch Foster Better Decisions with Big Data Visualization Read this paper to learn how strong visualization tools are providing better, simplified business intelligence from a variety of sources, whether real-time or industry-specific - to allow your organization to make better business decisions faster. Learn More 9 museums that want your legacy tech Google buys Flutter, a gesture recognition startup US demanded access to encryption keys of email provider Lavabit Oracle scoffs at charge that Ellison is overpaid
My wife is wonderfully low tech, with an old, vanilla mobile phone. Last weekend she surprised me by deciding she now wants a phone with all the bells and whistles. I was worried that she'd been bitten by the new iPhone bug, which hit 9 million other people in one weekend, but her change of mind was more educated. She was learning from our kids. Read More
WHITE PAPER: Mitel Networks 9 Cloud Myths Debunked What's preventing your organization from enhancing its communications and collaboration capabilities? Private, public and hybrid cloud approaches can have a dramatic impact on improved efficiency, agility, and support for business growth. View Now Scientists say Mars crater may be 'game-changing' supervolcano Toyota expands electric-vehicle sharing program Bitcoin forum goes offline after hack Blizzident's 3D-printed toothbrush cleans teeth in 6 seconds Richi Jennings: Silk Road busted by Feds; Ross Ulbricht arrested: Bad news for Tor and Bitcoin? | ||||||||||
In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up. This free, 28-page magazine-style report is available now [Registration required] To read the report, click here. KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE + DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL NEW COMPUTERWORLD JOB BOARD | ||||||||||
Get more IT peer perspective online: You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Computerworld, please send an e-mail to online@computerworld.com. Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. ** |
0 comments:
Post a Comment