Issue highlights
|
RESOURCE COMPLIMENTS OF: Agenda 15
Business and technology leaders who have transformed their organizations. Top thought leaders literally writing the book on digital transformation. Award-winning innovators showing the way to the new digital enterprise. From March 30 to April 1, they will all be at AGENDA15, an all-new conference for business and technology executives. BE THERE.
|
Apple has patched the FREAK flaw in both OS X and iOS, issuing updates for both operating systems to protect users of its Safari browser. READ MORE
|
The White House has established a $100 million program that endorses fast-track, boot camp IT training efforts and other four-year degree alternatives. But it's drawing criticism for the underlying message it sends in the H-1B battle. READ MORE
|
New BitTorrent Sync 2.0 aims for business users with user-management and NAS-synchronization features, but its decentralized design complicates integration into larger organizations. READ MORE
|
The NativeScript development tool uses JavaScript and Typescript to build native apps for iOS, Android, and Windows Phone. READ MORE
|
The company said last week it would directly employ a number of security guards rather than use guards placed by contractors. READ MORE
|
Tech leaders and career experts weigh in what you can do to ease fears and keep the remaining workforce productive. READ MORE
|
WHITE PAPER: CDW
Security threats are out there, lurking. With the security landscape constantly changing, protecting your network can prove difficult. We get it. Our Security Assessment Services experts can help you identify security risks and vulnerabilities so you can keep your organization safe from threats. VIEW NOW
|
The concept of using idle CPU cycles instead of investing millions in supercomputers is not lost on IT departments or companies with big processing tasks. READ MORE
|
HP adopts specifications from Open Compute Projects for its new line of low-cost servers. READ MORE
|
CISOs are held in generally low regard in the executive suite. The way to reverse that, say those who are familiar with, or have held, the position, is to be more than a geek. READ MORE
|
Software developers strongly object to a recent study’s conclusion that code refactoring isn’t beneficial. READ MORE
|
'Unindexed,' an art-technology project, explored the permanence of the web. READ MORE
|
We've got 5 copies to give to some lucky readers. Enter for your chance to win! READ MORE
|
WHITE PAPER: CDW
Increasingly sophisticated cyberattacks have led organizations to adopt correspondingly sophisticated levels of security control. Information security professionals now expect cyberattacks to be part of their normal operating environment VIEW NOW
|
BECOME AN ITWORLD INSIDER
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.
|
|
댓글 없음:
댓글 쓰기