Thursday, November 14, 2013

Time to take the mobile out of mobile security

  Darlene Storm: DOJ appeals: Lavabit can't shut down to thwart electronic surveillance | Jonny Evans: 9 great gifts for iPhone using cyclists

 
  Computerworld Blogs

Forward this to a Friend >>>


Antone Gonsalves: Time to take the mobile out of mobile security
  Rather than treat security on smartphones and tablets as something new, companies should see it as an extension of the same tactics used for years to lockdown data. Read More
 


WHITE PAPER: CDW

Repercussions of Poor Backups
Small and midsize businesses cannot tolerate the downtime and data loss from poor or failed backups. Whether you want to manage your own backup process or outsource it, learn key criteria to simplify configuration and administration, protect VMs by providing granular object recovery, and deduplicate data across physical and virtual environments. View Now

WHITE PAPER: LogMeIn

The Rising Financial Impact of Customer Service
This document will highlight the financial link between better customer service and increased company profitability. Learn More. Learn More.

Darlene Storm: DOJ appeals: Lavabit can't shut down to thwart electronic surveillance
Even while the Dark Mail Alliance works on Dark Mail to guarantee email privacy, the unhappy DOJ filed a US appellate brief in the Lavabit surveillance case primarily claiming that an email service can promise security, but it still has to hand over the encryption keys to the government if ordered to do so. Read More
 

Jonny Evans: 9 great gifts for iPhone using cyclists
Whether you're a twice-a-day commuter or a rufty-tufty mountain biker, you probably carry your smartphone when you ride. With this in mind here's the Appleholic's essential gift selection for the cyclist or bikers in your life. Read More
 

JR Raphael: Andy Rubin's absence and the evolution of Android
With KitKat, Android is headed in a noticeably different direction -- and when you look at things closely, the recent departure of its long-time leader seems anything but coincidental. Read More
 


WHITE PAPER: Salesforce.com
 
5 Secrets: Build your Sales Pipeline and Keep It Growing
The typical strategy for meeting sales targets is to set aggressive individual rep quotas, rely on your top reps to achieve them, and then hope to get enough from the rest of your team to get over the top. Read now!

Preston Gralla: Windows Phone shipments rocket 156% in a year. Are the numbers lying?
Windows Phone shipments leaped 156% in the latest quarter, by far the biggest growth percentage of any smartphone OS. Even the normally staid IDC called that "amazing." But are the numbers really as good as they look? Read More
 

Rob Walker: Adapt or die: Analytics should drive your enterprise evolution
As humans have evolved throughout our existence, so has the way in which we work. What has allowed our species to survive for millions of years? It comes down to learning. From learning the best methods for building a fire to learning the proper way to gather food, learning from mistakes and successes meant life over death. Our ability to learn processes, adopt them over time and then teach them to others has been key to our successful existence. Read More
 

Steve Pate: Virtualized environments. Real risk.
It's not always obvious when you've been hacked. New reports from security investigators are estimating that the recent Adobe breach may in fact be the biggest known breach of all time – with more than 152 million user accounts stolen. With today's virtualized infrastructure, an unprecedented amount of data can exist in one place, making it a virtual treasure trove. Virtualized environments pose very real risks, but with the right knowledge, you can address these risks and take full advantage of the benefits. Read More
 

Sharky: Looks like there was a memory replacement too
Administrative assistant downloads and installs a virus, so IT replaces her hard drive, reports a pilot fish on the scene. But the next day she calls to complain that she can't access any of her files after the migration. Read More
 

 

FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt.

COMPUTERWORLD'S 2014 SALARY SURVEY
 

How will your salary compare with your IT peers? Computerworld's 28th Annual Salary Survey will feature the latest IT salary trends and advice on where to find the best-paying jobs. This year's survey participants can enter a drawing to win 1 of 3 American Express gift cards for $500 each! The drawing is open to legal U.S. residents, age 18 or older.

Take our annual Salary Surveytoday!

DIGITAL SPOTLIGHT: SECURITY
 

In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up.

This free, 28-page magazine-style report is available now [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
A recent survey shows that 90% of drivers would consider using an autonomous car if it would cut their insurance rates. Are you one of them?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 
 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_blogs as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:50 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive