Wednesday, February 19, 2014

How to set up Microsoft's Web Application Proxy

 

Computerworld First Look - Newsletter - computerworld.com

  California fights drought with big data, cloud computing | Researcher claims two hacker gangs exploiting unpatched IE bug

 
  Computerworld First Look

Forward this to a Friend >>>


 

INSIDER
How to set up Microsoft's Web Application Proxy
Implementing WAP involves a lot of moving pieces; here's what admins need to know for a successful rollout. Read More
 

 


WHITE PAPER: IBM

A Practical Guide to a Successful Cloud Strategy
Read the executive brief for usable advice on selecting the right cloud computing vendor to maximize your chance for success—one that allows you to build on your cloud strategy as your company grows. Learn More

WHITE PAPER: IBM Corporation
 
Must-have capabilities for today's warehouse environment
Speed, simplicity and affordability: 3 capabilities businesses need from their warehousing environment. IBM DB2 with BLU Acceleration gives organizations a complete, multipurpose environment to rapidly distill insight from their data, make timely decisions and capitalize on opportunities View Now

California fights drought with big data, cloud computing
California is facing its worst drought in more than 100 years and with no end in sight. Conserving water has never been more important, and the problem this poses may offer Silicon Valley a new opportunity. Read More
 

Researcher claims two hacker gangs exploiting unpatched IE bug
Two different hacker groups are exploiting the same still-unpatched vulnerability in Internet Explorer (IE) with almost-identical attack code, a security researcher said Tuesday. Read More
 

White House defers to FCC on net neutrality
The administration of U.S. President Barack Obama said in response to a petition that it continues to back an open Internet, but declined to direct the U.S. Federal Communications Commission on how to go about preserving Internet neutrality, as it is an independent agency. Read More
 

EMV smartcards offer security benefits even without PIN, Visa says
A senior executive from Visa Inc. dismissed concerns over the manner in which the Europay MasterCard Visa (EMV) chip card standard is being implemented in the U.S. and insisted the move will yield significant security benefits for retailers, consumers and banks. Read More
 

BlackBerry CEO 'outraged' by T-Mobile iPhone promotion
  Relations between BlackBerry and T-Mobile have turned frosty after a promotion last week saw T-Mobile BlackBerry users offered a cheap iPhone. Read More
 


WHITE PAPER: IBM

Simplify and Consolidate Data Protection for Better Results
Learn how IBM Tivoli Storage Manager Operations Center simplifies user experience and speeds problem resolution. Read Now

Qualcomm faces China probe into alleged overcharging
  A Chinese anti-monopoly investigation into Qualcomm is examining whether the U.S. company has been abusing its market position and overcharging clients, the nation's regulators said. Read More
 

In win for U.S., New Zealand court upholds search warrants on Megaupload founder Dotcom
A court in New Zealand has ruled that warrants used to search the homes of Megaupload founder Kim Dotcom and his colleague Bram van der Kolk were valid, but objected to the removal to the U.S. by the Federal Bureau of Investigation of copies of the electronic items seized. Read More
 

BMC makes the help desk more social
BMC Software wants to bring some social networking magic to the formal world of the IT help desk. Read More
 

Most U.S. voters would pay more for faster school broadband
Nearly seven in 10 U.S. voters would pay a higher tax on their mobile phone bills if the money went toward wiring schools with faster broadband networks, according to a new survey. Read More
 

John Martin: The future of storage is software-defined
The Storage Networking Industry Association recently hosted an industry summit, "The Future of Computing – The Convergence of Memory and Storage through Non-Volatile Memory (NVM)." For a glimpse into the future, from some of the industry's true thought leaders, check out the presentations and audio recordings. This view into the rapid developments in flash memory and other NVM technologies has given me a new-found appreciation for the concept of a software-defined data center (SDDC). Read More
 

Richi Jennings: Google calls stupid Glass-wearers ''Glassholes.'' Well, DUH!
Ed. loves this image of Scoble wearing Google Glass. Google (NASDAQ:GOOG) PR offers cute list of things to do and not to do. Glass Explorers take note: Google doesn't want you to be nerdy. Otherwise, it might spoil it for everyone (but especially for Google). Yes, in a belated realization that real people find Glass as creepy as a school for stuffed bunnies, the enormous ad-broker suggests some rules to live by. In IT Blogwatch, bloggers ponder the prison of the prism. Not to mention: A school for stuffed whatnow?.. Read More
 

 

FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY
 

In our in-depth report, we chronicle how Android is exploding in the enterprise, document how mobile device management is morphing to meet new demands, reflect on the ways Google has developed into a surprisingly powerful ecosystem for end users, and share observations on BYOD's role in spawning a new army of empowered workers.

This free, 28-page magazine-style report is available now. [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
  A recent survey found that 40% of tech support workers had to remove malware from devices after employees visited adult content sites. Is this a problem at your company?

NEW COMPUTERWORLD JOB BOARD
  Search multiple listings now and get new job alerts as they are posted.


 

Get more IT peer perspective online:
  LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
 
  If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **



 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive