Monday, January 30, 2017

A phone you can wash with soap? Yep

Jonny Evans: How to use Guided Access to secure your iPad or iPhone

Email not displaying correctly? View it in your browser.

Computerworld Blogs

Jan 30, 2017
Featured Image

Rebecca Linke: Want a phone you can wash with soap? Now you can have one

Kyocera has introduced its second washable smartphone. Aside from that interesting feature, is it worth getting? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Jonny Evans: How to use Guided Access to secure your iPad or iPhone
Larry Alton: 3 ways businesses are saving time with A.I.
David Knight: Who owns the data from the IoT?
Evan Schuman: Could web rental efficiency gut DIY chains?
Sharky: Priorities

Video/Webcast: Neustar Inc

2016: A Security Minefield - Will You Be Ready for 2017?

Ransomware. Politically-motivated hacking. Distributed denial-of-service - and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017? Read More

Thumbnail Image

Jonny Evans: How to use Guided Access to secure your iPad or iPhone

Every little helps in the security wars Read More

Thumbnail Image

Larry Alton: 3 ways businesses are saving time with A.I.

As A.I. technology continues to grow, businesses and entrepreneurs are learning how they can utilize this powerful tool. Although it can be used for various applications, there is one thing A.I. technology can save that many of us desire. Read More

Thumbnail Image

David Knight: Who owns the data from the IoT?

Data ownership, rights and licensing are becoming important as businesses start to share and monetize the output from their IoT systems. Read More

Thumbnail Image

Evan Schuman: Could web rental efficiency gut DIY chains?

When Elias Chavando launched his startup, Rentus.com, last year, his sole major differentiator was simply technology. He knew that there are many businesses in the rental business, but they're overwhelmingly antiquated, with many still using paper and pencil to track inventory and revenue. Read More

Sharky: Priorities

It's the busiest time of the year, and suddenly the network has slowed to a crawl -- but the IT manager insists all is fine. Read More

White Paper: Neustar Inc

Cybersecurity Essentials for 2017

For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didn't take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. Read More

Ready for action: 6 big ideas in digital transformation

This 49-page report features advice from IT executives at the U.S. Postal Service, Hunter Douglas, Blue Cross Blue Shield, Nationwide Insurance and more for using digital technologies to become more agile, more flexible and more profitable. Purchase the report here

December Digital Magazine: 2017 Tech Forecast

Check out the December Digital Magazine, featuring our Tech Forecast 2017 special report, which outlines the top priorities in hiring, spending and projects for IT leaders. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Blogs as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 8:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive