Ubuntu 16.10 ups cloud ante with Kubernetes, OpenStack

Email not displaying correctly? View it in your browser.

InfoWorld Daily: Morning Edition

Oct 14, 2016
Featured Image

10 highest-paying IT security jobs

IT security is of major concern to all organizations, and they're willing to pay to get top talent. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Ubuntu 16.10 ups cloud ante with Kubernetes, OpenStack
31% off SanDisk Ultra Fit 128GB USB 3.0 Flash Drive - Deal Alert
You call that a fine? No wonder Comcast abuses you
Bitbucket Pipelines: Continuous delivery in the cloud
Boost your productivity with these seven apps

Video/Webcast: EMA Analyst Research

Optimizing Digital Transaction Performance: Why Most IT Organizations Fail and How You Can Succeed

Get key insights to safeguard and improve your organization's digital transaction performance, drawing from new EMA research on IT analytics and digital transformation. Read More

Thumbnail Image

Ubuntu 16.10 ups cloud ante with Kubernetes, OpenStack

Canonical doubles down on features for building clouds and infrastructure, with the latest OpenStack and a custom-built Kubernetes to go with it. Read More

Thumbnail Image
DealPost

31% off SanDisk Ultra Fit 128GB USB 3.0 Flash Drive - Deal Alert

>From a global leader in flash memory technology, the SanDisk Ultra Fit USB 3.0 Flash Drive is an ultra-small, low-profile drive with a storage capacity of 128GB, and enough speed to transfer a full-length movie in less than 30 seconds. Read More

Thumbnail Image

You call that a fine? No wonder Comcast abuses you

This week, the company received ‘the biggest cable fine ever’ for overcharging customers, but that’s not saying much. Read More

Thumbnail Image

Bitbucket Pipelines: Continuous delivery in the cloud

Atlassian's tool helps teams build, test, and deploy applications without having to set up a CI/CD server. Read More

Thumbnail Image
INSIDER

Boost your productivity with these seven apps

End users share their recommendations for useful business applications. Read More

White Paper: Veriato, Inc.

3 Steps to Protect Your Data During The High Risk Exit Period

Someday, sometime, an employee with access to sensitive data, intellectual property, or trade secrets is going to leave your company, which makes their departure risky to the organization. Sure, you've "trusted" them as part of their employment, but when the time comes to change jobs, you can't always be certain about the motive for the move. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Daily: Morning Edition as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.