|
White Paper: ForgeRock In the great Internet of Things (IoT) gold rush, early adopters have largely left behind identity and access management. As a result, many organizations are scrambling to deal with the consequences. Read More ▶ |
Apple today replaced the iOS 9.3 update with a new version after the original crippled some older devices last week. Read More ▶ | |
The U.S. Government has managed to access the iPhone used by San Bernardino shooter Syed Rizwan Farook, bypassing a passcode that had the Federal Bureau of Investigation stymied for several weeks. Read More ▶ | |
Oracle is seeking as much as $9.3 billion in damages in a long-running copyright lawsuit against Google over its use of Java in Android, court filings show. Read More ▶ | |
|
Some handy tricks that can save you time when typing on your Android phone or tablet. Read More ▶ | |
Canonical's first convergence device is here with the ability to switch between a desktop and mobile device, similar to Microsoft's Lumia 950 and 950XL. Read More ▶ | |
Apple can't yet boast of significantly longer battery life in devices, but the company is looking to change that. Read More ▶ | |
Google could offer deeper integration with its apps, and more info about its customers. Read More ▶ | |
Bsquared is a small player in IoT engineering services, but it's branching out into building IoT infrastructure software. The company says its DataV software stack can make enterprise IoT deployment easier. Read More ▶ | |
The DOJ has closed its case against Apple and found a way to unlock the iPhone used by the San Bernardino terrorist. Now the real debate begins about how to protect U.S. citizens and maintain our civil rights. Read More ▶ | |
White Paper: IBM Corporation Good mobile app development requires more than a compelling user interface. In fact, the majority of the cost and effort happens behind the UI - the app testing, integration, security, quality assurance and ongoing management. Read More ▶ |
CIO, CSO and Computerworld are jointly conducting a survey to explore the interaction of information security and traditional IT teams in enterprises today. We want to know who's responsible for which security duties at your organization, where roles and responsibilities overlap, and what challenges your organization faces in aligning infosec concerns with IT strategy and business goals. Take the survey today! ▶ |
Check out our March Digital Magazine, featuring this year's class of honorees: The 2016 Premier 100 Technology Leaders. It's a chaotic world for this year's honorees, but that's just how they like it, as they embrace countless ways to spearhead change at their organizations, from shaking up the IT structure to driving technology investments. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here ▶ |
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ |
Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ |
Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ |
0 comments:
Post a Comment