Monday, July 7, 2014

TSA makes travelers turn on devices before boarding

Jonny Evans: iOS: Recover photos, messages and more with PhotoRescue | Michael Horowitz: Secure email in a hostile environment

Computerworld Blogs

Forward this to a Friend >>>


Richi Jennings: In newest security scare, TSA makes U.S. bound travelers turn on devices before boarding
TSA: A pre-flight show before the in-flight movie. Take shoes off and put in tray -- check. Frisking and/or random harassment -- check. Adding to an ever-growing list of obstacles, clumsy indignities, and degradation, the U.S. Transportation Security Administration (TSA) has decided to help weary travelers by tacking on another needless security check. This time it's only for certain U.S. bound flights: Electronic devices must be charged and working before boarding (or the traveler gets the hose again). In IT Blogwatch, bloggers purchase hand-powered chargers. Read More


WHITE PAPER: SAS

Unlocking the Promise of Demand Sensing & Shaping
Many organizations have limited insight into big data. These limitations have significant opportunity costs and can have a negative effect on identifying and understanding customer demand patterns and related supply constraints. This paper explains how the use of advanced analytical techniques and big data can enhance supply chain networks. Learn more

WHITE PAPER: EMC Corporation

WHY EMC BACKUP FOR VNX
Learn why you should use EMC Backup for next-generation VNX, including how EMC backup can reduce virtualized application backup times by 90% and speed recovery by 30x to keep pace with data growth and new demands of virtualization. Learn More

Jonny Evans: iOS: Recover photos, messages and more with PhotoRescue
Many users attempting to install the recent iOS 7.1.2 update may have needed to reclaim space in order to upgrade their phone -- for many, this meant deleting photos, music or even messages. There is another way that lets you keep your data and make space, PhoneRescue. Read More

Michael Horowitz: Secure email in a hostile environment
Three ways to increase the security of email when in a hostile environment such as a computer hacker conference. Read More

Richi Jennings: Sheryl Sandberg's News Feed apology leans at first, then falls flat
Sandberg: Have you heard about my book? Facebook (NASDAQ:FB) desperately wants to repeat its "happy mood" News Feed experiment. Why? For reasons unknown, many users haven't cottoned on to the idea they've been treated with the same kind of regard normally given to albino lab rats. Time for spin control, and so enters Facebook COO and self-promotion expert, Sheryl Sandberg. If anyone should know how to handle the press and fix Facebook's problem, it should be her, right? In IT Blogwatch, bloggers lean in another direction. Read More

Jonny Evans: Apple hires Swiss luxury precision for iWatch team
Apple wants to add the "Swiss made" label when it ships the first in its future family of wearable devices, iWatch, this year. That's unlikely to happen, but it suggests the company is aiming pretty high as it recruits yet more talent to its wearable tech dream team. Read More


WHITE PAPER: SAS

Data Viz: 7 Considerations for Visualization Deployment
Rising data volumes, increasing data complexity, and the availability of new data sources can make it seem hard to find and disseminate important information. Read this white paper to learn more about some ideas you should consider before visualization deployment. Read more

Barbara Krasnoff: Short takes: Native Union's Jump Drive provides lightweight portable power
The Native Union Jump Cable is small, nicely designed and a good way to keep your battery topped up when needed. Read More

Sharky: Today, of course, we'd do this with a cloud outage
Flashback to the late 1960s, when this pilot fish has just gotten a job in a bank's data processing department -- and one day his new boss tells him to grab a disk pack and run for a cab. Read More

Sharky: And that's the SECOND reason we can't help
As this pilot fish arrives for his shift on the help desk at an Internet service provider, he's told about a user who's been calling all day with a printer problem -- and though it's not an ISP issue, she's very persistent. Read More

Sharky: Honest, I barely touched it!
Contractor pilot fish's nightly routine includes a walk-through of this software company's server lab. And when he spots a UPS with a blinking amber LED, he knows how to start troubleshooting: push the self-test button. Read More


FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

YOUR STRATEGIC GUIDE TO BIG DATA CHALLENGES & OPPORTUNITIES

In this special issue, we examine the biggest challenges with big data projects, including the immaturity of the tools, a lack of people with expertise in big data technologies, the challenge of making the right investments and hardware that can't handle big data projects.

This free, 17-page magazine-style report is available now. [Registration required]

To read the report, click here.

DIGITAL SPOTLIGHT: YOUR STRATEGIC PLAN FOR THE CLOUD

In our in-depth report, we look at the lessons learned from early adopters about ramping up, scaling back and avoiding disasters in the cloud. We'll also tell you why IT pros with cloud chops have seen their fortunes rise and offer tips on how to hammer out an iron-clad cloud service agreement.

This free, 28-page magazine-style report is available now. [Registration required]

To read the report, click here.

INTERNET OF THINGS: GET THE LATEST!
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!

SUBSCRIBE TO COMPUTERWORLD DAILY NEWS

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

To sign up now, click here.

DIGITAL SPOTLIGHT: CONSUMERIZATION

Learn how four long-time BYOD implementers have changed their focus to keep up with morphing requirements, especially with regards to locking down corporate data.

View the Digital Spotlight now.

Computerworld's Premier 100 IT Leaders 2015

Computerworld has launched its annual search for technology professionals who have demonstrated leadership in their organizations through the use of IT and have the strategic vision to align technology with business goals.

Nominations are being collected now through Friday, July 18.

For more information about the program, please visit our website.

Questions? Please email us at Premier100@computerworld.com

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Android Wear, the 'L' operating system and Android auto -- those were just some of the announcements from this year's Google I/O. Which do you think was most important?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_blogs as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:49 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive