Wednesday, December 21, 2016

Tech Forecast 2017: 5 key technologies to double down on now

Despite risk, 1,000 in tech pledge not to help Trump's data efforts

Email not displaying correctly? View it in your browser.

Computerworld Data Management

Dec 21, 2016
Featured Image

Tech Forecast 2017: 5 key technologies to double down on now

IT leaders plan to use these key technologies to deliver business results in 2017. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Despite risk, 1,000 in tech pledge not to help Trump's data efforts
Google researchers help test cryptographic flaws
First look: IBM's Watson Analytics comes to the iPad
Yahoo breach means hackers had 3 years to abuse user accounts
Apple's macOS file encryption can be bypassed without latest fixes
8 big data predictions for 2017
With a McDonald's case study in tow, Inkling scoops up cash
Tech companies like Privacy Shield but worry about legal challenges
Worm on the sensor: What happens when IoT data is bad?
14 eyebrow-raising things Google knows about you
Microsoft opens MS MARCO dataset for teaching computers to talk
Sharky: How it works -- and why it matters

White Paper: AVI-SPL

Connecting Collaboration Tech from Multiple Vendors: 5 Experts Share Insights with IT

Many IT and facilities professionals have the technical pieces of their collaboration solution - the room-based video conferencing assets and a UCC solution such as Microsoft Skype for Business or Cisco Spark. What they need now is a way to put the puzzle pieces together. We asked experts from Cisco, Crestron, Biamp, NEC, and AVI-SPL to share their insights and advice for companies trying to create a unified collaborative enterprise. Read More

Thumbnail Image

Despite risk, 1,000 in tech pledge not to help Trump's data efforts

Participating in the pledge means agreeing not to help the government create a database that can be used to target people based on race or religion or "facilitate mass deportations." Read More

Thumbnail Image

Google researchers help test cryptographic flaws

Security experts from Google have developed a test suite that allows developers to find weaknesses in their cryptographic libraries and implementations. Read More

Thumbnail Image

First look: IBM's Watson Analytics comes to the iPad

The Web app has much more power, but the mobile version can be useful for analyzing tweets, for instance. Read More

Thumbnail Image

Yahoo breach means hackers had 3 years to abuse user accounts

Security researchers are disturbed that it took Yahoo three years to discover that details on more than 1 billion user accounts had been stolen in 2013. Read More

Thumbnail Image

Apple's macOS file encryption can be bypassed without latest fixes

Without the macOS update released this week, Apple's disk encryption can be easily bypassed by connecting a specially crafted device to a locked Macbook. Read More

Thumbnail Image
INSIDER

8 big data predictions for 2017

Research firm Ovum estimates the big data market will grow from $1.7 billion in 2016 to $9.4 billion by 2020. As the market grows, enterprise challenges will shift, skills requirements will change, and the vendor landscape will morph through mergers and acquisitions. Read More

Thumbnail Image

With a McDonald's case study in tow, Inkling scoops up cash

One of the more interesting end user computing companies I've come across scores an impressive funding round. Read More

Thumbnail Image

Tech companies like Privacy Shield but worry about legal challenges

Privacy Shield, the new international framework allowing companies to transfer customer data between the EU and the U.S., is getting good reviews so far, but some companies aren't betting on it for the long term. Read More

Thumbnail Image

Worm on the sensor: What happens when IoT data is bad?

Bad data is common in IoT, and though it's hard to get an estimate of how much information streaming in from connected devices can't be used, a lot of people are thinking about the problem. Read More

Thumbnail Image

14 eyebrow-raising things Google knows about you

Some are fascinating, others are frightening, but here's how to find out what Google has on you. Read More

Thumbnail Image

Microsoft opens MS MARCO dataset for teaching computers to talk

Microsoft is trying to help create machines that can have conversations by releasing a new set of data for free. Read More

Thumbnail Image

Sharky: How it works -- and why it matters

This programmer believes she doesn't actually need to know the how and why of the way her code interacts with a database -- after all, she says, "I don't need to know how a car works in order to drive it." Read More

White Paper: Dyn Inc

Gartner Report: If External DNS Fails, So Does Your Digital Business

Read this Gartner Research Report and more about: why DNS is mission-critical to all organizations that connect to the Internet, the challenges businesses face maintaining visibility and availability of key resources, and the advantages of an externally sourced, managed, and focused DNS as a service on cost, resilience, reliability, and performance Read More

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here

Is your company a best place to work?

Computerworld is seeking to identify the 100 top workplaces for IT professionals for our 24th annual Best Places to Work in IT list. We invite Computerworld readers, HR and PR professionals and other interested parties to nominate organizations, in any industry, that they think are providing great working environments for IT employees, including challenging work, fair pay and ample training opportunities. Nominate a company now through Dec. 28, 2016. Make your nomination here

December Digital Magazine: 2017 Tech Forecast

Check out the December Digital Magazine, featuring our Tech Forecast 2017 special report, which outlines the top priorities in hiring, spending and projects for IT leaders. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Data Management as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive