Jonny Evans: Opinion: If you can't win, cheat. The Samsung/Apple story | Sharon Gaudin: Scientists getting closer to building Star Wars-like lightsabers | ||||||||||
Computerworld Blogs | ||||||||||
Richi Jennings: Silk Road busted by Feds; Ross Ulbricht arrested: Bad news for Tor and Bitcoin? WEBCAST: Dell VMware A Smarter Approach to Data Protection The three videos in this series will explore the dramatic impact that unprecedented data growth and other developments have had on the data center, the need for an end-to-end approach to data protection, and how Dell and VMware enable enterprises to transform IT into a center of business innovation. View Now In this Issue
WEBCAST: Dell VMware How to Transform IT into a Center of Business Innovation Although IT supports virtually every business process, many organizations are hard-pressed to take advantage of technology advances when they're trapped into spending most of the IT budget on maintenance instead of innovation. View Now Jonny Evans: Opinion: If you can't win, cheat. The Samsung/Apple story Sharon Gaudin: Scientists getting closer to building Star Wars-like lightsabers Jonny Evans: FCC 'Obamacare' shutdown may delay Apple's new iPads WEBCAST: IBM Corporation Proof that Smarter Government is also Better Government This videocast on October 23 at noon ET will give you a rare opportunity to hear from your peers & IBM experts about the power of business analytics to make your budgeting and finance processes as fast, accurate and transparent as you need them to be. Learn More. JR Raphael: Note 3 in the real world: The first things you notice about Samsung's new phone
My wife is wonderfully low tech, with an old, vanilla mobile phone. Last weekend she surprised me by deciding she now wants a phone with all the bells and whistles. I was worried that she'd been bitten by the new iPhone bug, which hit 9 million other people in one weekend, but her change of mind was more educated. She was learning from our kids. Read More
Rob Walker: Using predictive analytics to make your data actionable (part 2) Sharky: Why IT support gets gray | ||||||||||
In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up. This free, 28-page magazine-style report is available now [Registration required] To read the report, click here. KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE + CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL NEW COMPUTERWORLD JOB BOARD | ||||||||||
Get more IT peer perspective online: You are currently subscribed to computerworld_blogs as jonsan98@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Computerworld, please send an e-mail to online@computerworld.com. Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. ** |
0 comments:
Post a Comment