|
eGuide: Citrix Systems Mobile payments, mobile apps, mobile health - new pieces to the increasingly complex and always changing security environment. Enterprises are struggling to keep up with mobile security demands, and one-fifth of IT pros say their companies had a mobile data breach. Yet mobile is here to stay, so organizations must shore up their security strategies. Read More ▶ |
Television stations have volunteered to sell off 126MHz of "beach front" wireless spectrum to mobile carriers in an ongoing U.S. Federal Communications Commission auction, potentially bringing higher speeds and more reliable networks to customers. Read More ▶ | |
Intel could be on the verge of exiting the market for smartphones and standalone tablets, wasting billions it spent trying to expand in those markets. Read More ▶ | |
Demand for Android talent is hot. Here's how to get started and stand out Read More ▶ | |
|
Qualcomm has talked about putting "silicon brains" in mobile devices and is now providing tools to train smartphones to recognize people, objects, gestures and even emotions. Read More ▶ | |
Nvidia and Samsung have avoided a potentially ugly court battle with a settlement that ends all outstanding intellectual property litigation between the two companies. Read More ▶ | |
Smartphones, mesh networks and cloud computing are enabling the long-awaited smart home. Standards and open-source software could make them ubiquitous. Read More ▶ | |
And just like that, social networking is no more. The sites formerly known as social networks are pivoting to something else. Read More ▶ | |
Driver distraction is becoming a major problem. What can we do? Read More ▶ | |
May also save Apple Watch, iPads, iPod touch and other smartphones Read More ▶ | |
White Paper: CDW Corporation The 802.11ac standard significantly improves the performance and scalability of wireless networks compared with existing gear based on the older 802.11n standard. Read More ▶ |
Computerworld is seeking case studies that illustrate intriguing ways big data is being used everywhere from research to commerce. We will showcase a select group of the most innovative and fascinating case studies in our digital magazine and online in September 2016. The deadline for submissions is May 2. Submit your case study today! ▶ |
CIO, CSO and Computerworld are jointly conducting a survey to explore the interaction of information security and traditional IT teams in enterprises today. We want to know who's responsible for which security duties at your organization, where roles and responsibilities overlap, and what challenges your organization faces in aligning infosec concerns with IT strategy and business goals. Take the survey today! ▶ |
Check out our March Digital Magazine, featuring this year's class of honorees: The 2016 Premier 100 Technology Leaders. It's a chaotic world for this year's honorees, but that's just how they like it, as they embrace countless ways to spearhead change at their organizations, from shaking up the IT structure to driving technology investments. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here ▶ |
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ |
Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ |
Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ |
0 comments:
Post a Comment