The desktop lover's guide to supercharging Windows 8.1 | Obamacare could help fuel a tech start-up boom | |||||||||
Computerworld First Look | |||||||||
Shutdown could test IT security at federal agencies WEBCAST: Dell VMware A Smarter Approach to Data Protection The three videos in this series will explore the dramatic impact that unprecedented data growth and other developments have had on the data center, the need for an end-to-end approach to data protection, and how Dell and VMware enable enterprises to transform IT into a center of business innovation. View Now In this Issue
WEBCAST: Dell VMware How to Transform IT into a Center of Business Innovation Although IT supports virtually every business process, many organizations are hard-pressed to take advantage of technology advances when they're trapped into spending most of the IT budget on maintenance instead of innovation. View Now The desktop lover's guide to supercharging Windows 8.1 Obamacare could help fuel a tech start-up boom Intel to acquire network security firm Sensory Networks Aruba announces cloud-based Wi-Fi management service NASA's Cassini finds plastic ingredient on Saturn's moon DRAM prices up 35% since China fab plant fire Tech firms push Congress for transparency on NSA surveillance WHITE PAPER: CA Technologies Applying Best Practice DevOps for Mission Success Joe User has a great idea for a new application that could help him and other agency users do their jobs better and faster. How can Joe's agency take this vision and transform it into a real working app that will move the agency mission forward? Read now! Seagate, TDK show off HAMR to jam more data into hard drives Rivals to again review Google's promises in EU antitrust case Security company scours 'Dark Web' for stolen data Symantec seizes part of massive P2P botnet ZeroAccess After getting star billing, Oracle's Fusion Applications take a supporting role BMC puts Hadoop on the company timesheet DoCoMo shows 'touch display' for computer glasses Sharp gives health check-ups a futuristic touch | |||||||||
In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up. This free, 28-page magazine-style report is available now [Registration required] To read the report, click here. KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE + DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL NEW COMPUTERWORLD JOB BOARD | |||||||||
Get more IT peer perspective online: You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Computerworld, please send an e-mail to online@computerworld.com. Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. ** |
0 comments:
Post a Comment