Darlene Storm: Zero-day broker exploits vulnerability in I2P to de-anonymize Tails users | Jonny Evans: Apple steals your wallet with future iPhone | |||||||||
Computerworld Blogs | |||||||||
JR Raphael: Hands on: Amazon's Fire Phone makes a strange first impression WHITE PAPER: SAS The Impact of Customer-Centric Marketing on Manufacturers Manufacturers have traditionally fostered close relationships with retailers and channel partners who sell their products rather than interacting directly with consumers. But this is changing. Learn how manufacturers can succeed in this new era of customer-centric manufacturing. Learn more In this Issue
WHITE PAPER: AT&T A user-centric path to mobile security Mobile technology has revolutionized the way millions of people do their jobs. Employees now have unprecedented levels of flexibility, including the ability to work anytime from anywhere. Learn More Darlene Storm: Zero-day broker exploits vulnerability in I2P to de-anonymize Tails users Jonny Evans: Apple steals your wallet with future iPhone WHITE PAPER: Red Hat A Modern Approach to the Data Deluge Read this whitepaper to learn how infrastructure leaders can confidently manage cost, complexity, and risk, capitalize on emerging technologies, and drive future innovation across their organizations with Red Hat Storage Server, an open, software-defined storage platform. Read Now Preston Gralla: Will Microsoft's Surface line ever make a profit? Richi Jennings: Google assimilates Twitch into the YouTube collective Sharky: Lunch -- the hard way | |||||||||
FREE SHARK TANK T-SHIRT INTERNET OF THINGS: GET THE LATEST! SUBSCRIBE TO COMPUTERWORLD DAILY NEWS Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. To sign up now, click here. DIGITAL SPOTLIGHT: CONSUMERIZATION Learn how four long-time BYOD implementers have changed their focus to keep up with morphing requirements, especially with regards to locking down corporate data. View the Digital Spotlight now. Computerworld's Premier 100 IT Leaders 2015 Computerworld has launched its annual search for technology professionals who have demonstrated leadership in their organizations through the use of IT and have the strategic vision to align technology with business goals. Nominations are being collected now through Friday, July 25. For more information about the program, please visit our website. Questions? Please email us at Premier100@computerworld.com JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE + CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL NEW COMPUTERWORLD JOB BOARD | |||||||||
Get more IT peer perspective online: You are currently subscribed to computerworld_blogs as jonsan98@gmail.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Computerworld, please send an e-mail to online@computerworld.com. Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. ** |
0 comments:
Post a Comment