Monday, January 5, 2015

iPhone owners sue Apple over storage space, allege fraud

  Two-factor authentication oversight led to JPMorgan breach | US lawmaker asks Sony for details on data breach

 
  Computerworld Storage

iPhone owners sue Apple over storage space, allege fraud
A pair of Florida men have sued Apple for allegedly misrepresenting the amount of storage room available to owners of 16GB iPhones and iPads. Read More
 


WHITE PAPER: OpenText

Magic Quadrant for Enterprise Content Management
Enterprise content management offerings address a range of user constituencies and business requirements, an increasingly common one being for delivery of personalized content in context. In light of this and other demands, we assess 22 vendors to help you identify the right one for your needs. Learn More

WHITE PAPER: OpenText

Is ECM Just a Cost of Doing Business?
This paper outline the finding of the most recent research commissioned by OpenText. From the results of extensive customer interviews with some of the world's best-known brands across a wide variety of industries, OpenText has uncovered a wealth of information about the ROI of ECM. Learn More

Two-factor authentication oversight led to JPMorgan breach
The attackers who stole information about 83 million JPMorgan Chase customers earlier this year gained a foothold on the company's network because a server reportedly lacked two-factor authentication. Read More
 


WHITE PAPER: Box

eBook: Securing Business Information in the Cloud
For security and IT pros concerned with protecting sensitive information across multiple endpoints and applications. Explore how cloud can enable us to go back to basics of security to address the challenges of distributed computing and make our organizations more secure. Learn More>>

US lawmaker asks Sony for details on data breach
A senior U.S. lawmaker wants Sony Pictures Entertainment to provide details about its recent data breach and its cybersecurity practices, saying the information will help Congress decide whether new laws are needed. Read More
 

Snowden docs show Tor, TrueCrypt, Tails topped NSA's 'most wanted' list in '12
The National Security Agency saw Tor, Linux distribution Tails and TrueCrypt as the biggest threats to agency's ability to intercept Internet traffic. Read More
 

 

Digital Spotlight: Mobile Security
 

Read how to make your workers smart about mobile security by moving beyond policies and penalties and embracing an approach designed to identify and correct specific problem behaviors.

View the Digital Spotlight now. [Registration required]

Is your IT department a great place to work?
 

Computerworld is seeking to identify the 100 top workplaces for IT professionals for our 22d annual Best Places to Work in IT list.

We invite Computerworld readers, HR and PR professionals and other interested parties to nominate organizations, in any industry, that they think are providing great working environments for IT employees, including challenging work, fair pay and ample training opportunities.

Nominate a company now through Dec. 31, 2014.

Computerworld's Digital Magazine
 

Computerworld's monthly Digital Magazine showcases articles, analysis and commentary on important trends in enterprise IT, in core departments such as News Analysis, Features, Opinions and Shark Tank. The new digital format offers seamless navigation, with easy scrolling and zooming, and links to useful related stories. The December edition is available now [Registration required]:

To read the issue, click here.

Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!

Subscribe to Computerworld Daily News
 

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

To sign up now, click here.

Join the Computerworld conversation on Google+
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.


 
 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_storage as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2015 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 6:38 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive