Computerworld

IDG’s Top Enterprise Stories

October 10, 2019

Image: 10 IT-business collaboration mistakes to avoid

10 IT-business collaboration mistakes to avoid

Ignoring conflict, missing out on post-mortems, failing to prioritize trust — here’s what is holding you back when co-creating and collaborating with business colleagues.  Read more ▶

Your Must-Read Stories

•

What employers look for when they Google you (3 key takeaways)

•

6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

•

Here's why there won’t be a quick enterprise blockchain revolution

•

10 open source projects proving the power of Google Go

•

Schneider Electric launches wall-mounted server rack

•

Presidential campaign websites fail at privacy, new study shows

•

9 critical questions about Microsoft's first Android phone

White Paper: Matillion

Optimizing Business Analytics by Transforming Data in the Cloud

Companies understand the value of data. But before data can be analyzed, it must be collected and prepared for analytics engines, and this process can be inefficient and costly. Read more ▶

Image: What employers look for when they Google you (3 key takeaways)

What employers look for when they Google you (3 key takeaways)

Insider Pro reached out to recruiters and HR pros to find out how they research job candidates online, what they’re looking for and what they think if a candidate has no online presence. Read more ▶

Image: Master data analytics and deep learning with this $35 Python certification bundle

DEALPOST

Master data analytics and deep learning with this $35 Python certification bundle

The Complete Python Certification Bootcamp Bundle contains 12 courses on how to use Python for apps, data analysis, deep learning, and more. Read more ▶

Image: 6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

6 known RCE vulnerabilities in enterprise VPNs and how to minimize the risk

Enterprise VPNs might not always be as safe as you think. Be aware of these RCE vulnerabilities in popular enterprise VPN solutions. Read more ▶

 
 
Image: Here's why there won’t be a quick enterprise blockchain revolution

Here's why there won’t be a quick enterprise blockchain revolution

While corporate CIOs see the distributed ledger technology as innovative, blockchain is unlikely to become technically and operationally scalable anytime soon. Read more ▶

Image: 10 open source projects proving the power of Google Go

10 open source projects proving the power of Google Go

Go has become the programming language of choice for forward-thinking projects, especially cloud projects Read more ▶

Schneider Electric launches wall-mounted server rack

Like a flat-screen TV that's mounted to save floor space, the EcoStruxure Micro Data Center 6U can be hung from the wall in space-constrained data centers and edge computing environments. Read more ▶

Image: Presidential campaign websites fail at privacy, new study shows

Presidential campaign websites fail at privacy, new study shows

A non-partisan analysis of 23 presidential campaign websites reveals glaring privacy issues. Read more ▶

Image: 9 critical questions about Microsoft's first Android phone

9 critical questions about Microsoft's first Android phone

Microsoft's Surface Duo deserves your attention, but some of the things we don't yet know about the device may prove to be the most pivotal. Read more ▶

Case Study: Etleap

Etleap Data Governance Case Study

Leading security firm reduces risk and unifies data for analysis while meeting GDPR requirements. Etleap and AWS help Okta source data with an analyst-friendly, governed ETL solution. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.