|
White Paper: SureID In response to an unprecedented level of espionage and cyber attacks aimed at compromising critical government IT infrastructure-from networks to applications-the federal government last year announced new standards. Regulations have been enacted in 2016 to apply these standards to federal contractors and their subcontractors. Read More ▶ |
Self-healing software? Ubiquitous wearables? We asked senior-level IT pros to predict what's in store for information technology. Here's that they had to say. Read More ▶ | |
Potential negative impacts can be offset by investments in education as well as by ensuring there is a safety net to help affected people, the White House argued. Read More ▶ | |
|
The applications of VR extend into nearly every sphere of life. Read More ▶ | |
We say a fond farewell to 18 men and women who left a lasting impression on the tech industry. Read More ▶ | |
A product manager at Google has sued the company over its allegedly illegal confidentiality rules, which, among other things, prohibit employees from speaking even internally about illegal conduct and dangerous product defects for fear that such statements may be used in lawsuits or sought by the government. Read More ▶ | |
President-elect Donald Trump's threat to impose tariffs on goods manufactured in Mexico and offshore may accelerate the movement to cloud computing, analysts said. Read More ▶ | |
The future has fewer jobs, but those that remain will be better. Read More ▶ | |
Nokia filed more patent infringement lawsuits against Apple on Thursday, a day after it weighed in on a licensing dispute with the company by filing claims in Germany and the U.S. Read More ▶ | |
Find out about Computerworld's annual Best Places to Work in IT program, including eligibility, survey contents, deadlines and more. Read More ▶ | |
White Paper: Cisco Systems The only way to defeat today's security threats is to address them holistically across the full attack continuum-before, during, and after an attack. Cisco's approach of continuous endpoint analysis in combination with an integrated, architectural approach to security is foundational to this model. Read More ▶ |
This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here ▶ |
Computerworld is seeking to identify the 100 top workplaces for IT professionals for our 24th annual Best Places to Work in IT list. We invite Computerworld readers, HR and PR professionals and other interested parties to nominate organizations, in any industry, that they think are providing great working environments for IT employees, including challenging work, fair pay and ample training opportunities. Nominate a company now through Dec. 28, 2016. Make your nomination here ▶ |
Check out the December Digital Magazine, featuring our Tech Forecast 2017 special report, which outlines the top priorities in hiring, spending and projects for IT leaders. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here ▶ |
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now ▶ |
Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now ▶ |
Search multiple listings now and get new job alerts as they are posted. Check them out now ▶ |
0 comments:
Post a Comment