Thursday, March 31, 2016

Richi Jennings: Microsoft's rude A.I. bot Tay: Officially a piece of CaaP [updated]

Jonny Evans: iOS 9.3 is Apple's most stable iOS yet, data claims

Email not displaying correctly? View it in your browser.

Computerworld Blogs

Mar 31, 2016
Featured Image

Richi Jennings: Microsoft's rude A.I. bot Tay: Officially a piece of CaaP [updated]

Microsoft's artificial intelligence strategy is to unleash more bots like Tay. Redmond doesn't mean more nasty, racist or homophobic chatbots, but a forest of A.I. personalities for different uses -- Satya Nadella named it 'Conversation as a Platform'... Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Jonny Evans: iOS 9.3 is Apple's most stable iOS yet, data claims
Darlene Storm: 1,418 remotely exploitable flaws found in automated medical supply system
Sandra Henry-Stocker: Looking into system performance: The artistry of top
David Knight: A feast of the sensors
Ben Kepes: Taking the pulse of your information security culture
Sharky: How NOT to get the most out of training

White Paper: Juniper Networks

2016 Predictions: Security Solutions

The security market will continue to evolve alongside new requirements arising from the Internet of Things, cloud computing and sophisticated targeted attacks. Read More

Thumbnail Image

Jonny Evans: iOS 9.3 is Apple's most stable iOS yet, data claims

Criticisms have been 'blown out of proportion' Read More

Thumbnail Image

Darlene Storm: 1,418 remotely exploitable flaws found in automated medical supply system

There are over 1,400 remotely exploitable flaws in Pyxis SupplyStation systems; many of those vulnerabilities, ICS-CERT warned, "an attacker with low skill would be able to exploit." The vulnerabilities are in seven third-party software packages, but no patches will be issued. Read More

Thumbnail Image

Sandra Henry-Stocker: Looking into system performance: The artistry of top

The top command's many options allow you to be creative when you're looking into system performance. (IDG Contributor Network) Read More

Thumbnail Image

David Knight: A feast of the sensors

Key to the emergence of the IoT are sensors. What do sensors do, and how are they affecting the evolution of applications? (IDG Contributor Network) Read More

Thumbnail Image

Ben Kepes: Taking the pulse of your information security culture

If you have been a manager in a company of any size, you likely understand the concept of corporate culture. But do you understand the concept of a corporate security culture? If not, this article will explain what a corporate security culture is, why it is important, and how to foster its development. (IDG Contributor Network) Read More

Sharky: How NOT to get the most out of training

This mainframe application is being migrated to Unix, and for once that means the mainframer responsible for it isn't lsong his job. But for this pilot fish, there IS a downside. Read More

White Paper: Juniper Networks

3 Major Challenges to Securing Your Data

Is your enterprise planning to leverage cloud computing and mobile computing in order to improve business agility, increase employee productivity, and lower capital expenses? Read More

Survey: What are the roles of IT and infosec in the enterprise?

CIO, CSO and Computerworld are jointly conducting a survey to explore the interaction of information security and traditional IT teams in enterprises today. We want to know who's responsible for which security duties at your organization, where roles and responsibilities overlap, and what challenges your organization faces in aligning infosec concerns with IT strategy and business goals. Take the survey today!

The 2016 Premier 100 Technology Leaders

Check out our March Digital Magazine, featuring this year's class of honorees: The 2016 Premier 100 Technology Leaders. It's a chaotic world for this year's honorees, but that's just how they like it, as they embrace countless ways to spearhead change at their organizations, from shaking up the IT structure to driving technology investments. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Blogs as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 8:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive