Tuesday, July 22, 2014

'Nadella Effect' makes Ballmer $2.8B richer

9 tips for CIOs as summer vacations hit | Red Alert app warns of imminent missile attacks in Israel

Computerworld First Look

Forward this to a Friend >>>


'Nadella Effect' makes Ballmer $2.8B richer
Former Microsoft CEO Steve Ballmer's 'devices and services' strategy may be in tatters, discarded by his successor, Satya Nadella, but Ballmer must be smiling all the way to the bank. Read More


WHITE PAPER: HP

Protecting Your Mid-Size Business from Security Threats
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. And 60% of small businesses fail within six months of falling victim to a cyber attack. Learn More

WHITE PAPER: Mobiquity Inc.

Five Steps to Developing a Successful Mobile Strategy
Don't lose time and money with a "throw an app against a wall to see if sticks" approach to mobile. It won't work. You need a well-thought-out strategy to take full advantage of mobile. This white paper lays out the five important steps to a robust enterprise mobile strategy. Learn more.

9 tips for CIOs as summer vacations hit
Have trouble leaving the office behind when you go on vacation? Here are nine tips to help give CIOs peace of mind when they (and their staff and fellow employees) head out for summer R&R. Read More

Red Alert app warns of imminent missile attacks in Israel
Red Alert: Israel is a free app for both iOS and Android that provides real-time alerts when missiles or rockets are fired into Israel. It's also become a specialized kind of social network. Read More

AirMagnet Wi-Fi security tool takes aim at drones
In its quest to help enterprises seek out and neutralize all threats to their Wi-Fi networks, AirMagnet is now looking to the skies. Read More

Salesforce.com's trademark infringement is anything but social, lawsuit claims
Salesforce.com recently launched a new product called Social Studio in spite of the fact that an existing, competing product had already used that name for years, marketing software vendor StrongView Systems alleges in a new trademark-infringement lawsuit. Read More

Black Hat presentation on TOR suddenly cancelled
A presentation on a low-budget method to unmask users of a popular online privacy tool, TOR, will no longer go ahead at the Black Hat security conference early next month. Read More


WHITE PAPER: IBM

Big Data Hadoop Solution Report, Q1 2014
Read this report from Forrester Research and find out why IBM InfoSphere BigInsights was named a leader among 9 companies evaluated, and how it stands in relation to other big data Hadoop vendors. Read now

Goodwill Industries probes possible payment card breach
Goodwill Industries International said Monday federal authorities are investigating a possible payment card breach at its U.S.-based retail outlets. Read More

Apple's new iPhone 6 could have biggest initial production
Apple is ordering a combined 70 to 80 million units of two big-screen versions of its next iPhone, its largest initial production to date, according to a report in The Wall Street Journal. Read More

W3C wants to open the social Web for the enterprise
The World Wide Web Consortium wants to bring the power of social media to the enterprise. Read More

Darlene Storm: Backup your data now: New, more powerful ransomware using Tor spotted in the wild
Critoni is a new ransomware that has been spotted in the wild. Also dubbed as CTB-Locker (Curve-Tor-Bitcoin Locker) on forums frequented by cyber thugs, the ransomware uses Tor and is being touted as a more powerful version of Cryptolocker. This might be a wise time to backup your data. Read More

Robert L. Mitchell: Why I came crawling back to Comcast
Out of the frying pan, into the fire. Five years ago I kicked out Comcast, cut the cable TV cord, and went to my local telco provider, FairPoint Communications, for high-speed Internet service. Now I'm giving Comcast a second chance. I'm already starting to have second thoughts. Read More

Richi Jennings: iOS backdoor? Yes... No... Diagnostics!!
iPhone: Reminds me of a Gibson. Have you ever wanted to be able to magically hack mobile phones like hackers do in the movies? If recent claims are true that security holes, backdoors, and packet sniffers are present in every iPhone, iPad, or other iOS device -- you can! In IT Blogwatch, bloggers hack the planet. Read More


FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

YOUR STRATEGIC GUIDE TO BIG DATA CHALLENGES & OPPORTUNITIES

In this special issue, we examine the biggest challenges with big data projects, including the immaturity of the tools, a lack of people with expertise in big data technologies, the challenge of making the right investments and hardware that can't handle big data projects.

This free, 17-page magazine-style report is available now. [Registration required]

To read the report, click here.

DIGITAL SPOTLIGHT: YOUR STRATEGIC PLAN FOR THE CLOUD

In our in-depth report, we look at the lessons learned from early adopters about ramping up, scaling back and avoiding disasters in the cloud. We'll also tell you why IT pros with cloud chops have seen their fortunes rise and offer tips on how to hammer out an iron-clad cloud service agreement.

This free, 28-page magazine-style report is available now. [Registration required]

To read the report, click here.

INTERNET OF THINGS: GET THE LATEST!
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!

DIGITAL SPOTLIGHT: CONSUMERIZATION

Learn how four long-time BYOD implementers have changed their focus to keep up with morphing requirements, especially with regards to locking down corporate data.

View the Digital Spotlight now.

Computerworld's Premier 100 IT Leaders 2015

Computerworld has launched its annual search for technology professionals who have demonstrated leadership in their organizations through the use of IT and have the strategic vision to align technology with business goals.

Nominations are being collected now through Friday, July 25.

For more information about the program, please visit our website.

Questions? Please email us at Premier100@computerworld.com

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Apple and IBM announced a surprise partnership that melds IBM's big data and analytics capabilities with Apple's iPhone and iPad. Who's the big winner?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 5:48 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive