Friday, July 25, 2014

Amazon's Fire Phone makes a strange first impression

  Darlene Storm: Zero-day broker exploits vulnerability in I2P to de-anonymize Tails users | Jonny Evans: Apple steals your wallet with future iPhone
 
 
  Computerworld Blogs

Forward this to a Friend >>>


JR Raphael: Hands on: Amazon's Fire Phone makes a strange first impression
Amazon's Fire Phone is like no other phone you've used before -- but after 24 hours with the device, it's hard to say whether that's actually a good thing. Read More
 


WHITE PAPER: SAS

The Impact of Customer-Centric Marketing on Manufacturers
Manufacturers have traditionally fostered close relationships with retailers and channel partners who sell their products rather than interacting directly with consumers. But this is changing. Learn how manufacturers can succeed in this new era of customer-centric manufacturing. Learn more

WHITE PAPER: AT&T

A user-centric path to mobile security
Mobile technology has revolutionized the way millions of people do their jobs. Employees now have unprecedented levels of flexibility, including the ability to work anytime from anywhere. Learn More

Darlene Storm: Zero-day broker exploits vulnerability in I2P to de-anonymize Tails users
Vulnerability broker Exodus Intelligence found a critical hole in the I2P component used in the privacy-orientated operating system Tails, warning that users should not count on any one security solution to keep their IP anonymous despite Edward Snowden touting Tails for privacy. Read More
 

Jonny Evans: Apple steals your wallet with future iPhone
Apple and Visa are ready to turn your iPhone into your wallet, after years of steady work to develop such services. Read More
 


WHITE PAPER: Red Hat

A Modern Approach to the Data Deluge
Read this whitepaper to learn how infrastructure leaders can confidently manage cost, complexity, and risk, capitalize on emerging technologies, and drive future innovation across their organizations with Red Hat Storage Server, an open, software-defined storage platform. Read Now

Preston Gralla: Will Microsoft's Surface line ever make a profit?
  Microsoft's quarterly earnings report this week had a bit of deja vu: The company's bottom line once again took a hit because of woes with the Surface line. This time around, it was cancelling the Surface Mini. Will the Surface line ever make a profit? Read More
 

Richi Jennings: Google assimilates Twitch into the YouTube collective
Google: Resistance is futile. If you are a gamer, odds are good you've heard of Twitch. For those that don't know, Twitch is the go-to destination for watching live streaming videogame play online. It also happens to consume a higher percentage of Internet bandwidth than Hulu or Facebook. Bandwidth? Enter Google (NASDAQ:GOOG), which has reportedly decided to purchase Twitch for one beeeelion dollars. In IT Blogwatch, bloggers welcome their new primary colored overlord. Read More
 

Sharky: Lunch -- the hard way
This systems analyst pilot fish is trying to keep things working at a manufacturing plant in the southern U.S. -- and management isn't making it easy. Read More
 

 

FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

INTERNET OF THINGS: GET THE LATEST!
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!

SUBSCRIBE TO COMPUTERWORLD DAILY NEWS
 

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

To sign up now, click here.

DIGITAL SPOTLIGHT: CONSUMERIZATION
 

Learn how four long-time BYOD implementers have changed their focus to keep up with morphing requirements, especially with regards to locking down corporate data.

View the Digital Spotlight now.

Computerworld's Premier 100 IT Leaders 2015
 

Computerworld has launched its annual search for technology professionals who have demonstrated leadership in their organizations through the use of IT and have the strategic vision to align technology with business goals.

Nominations are being collected now through Friday, July 25.

For more information about the program, please visit our website.

Questions? Please email us at Premier100@computerworld.com

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Apple is releasing its first public beta of OS X Yosemite. Is that a smart move?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 
 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_blogs as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:44 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive