Computerworld

IDG’s Top Enterprise Stories

August 19, 2019

Image: 10 IT modernization mistakes to avoid

10 IT modernization mistakes to avoid

Modernizing IT takes more than just replacing old tech with newer models. It requires a nuanced strategy that considers business needs and objectives alongside technical capabilities. Read more ▶

Your Must-Read Stories

•

Windows 10 1803-to-1903 forced upgrades gather speed

•

How to work with worker services in ASP.Net Core

•

Beware rogue email rules and forms

•

Nvidia rises to the need for natural language processing

•

Extreme's acquisitions have prepped it to better battle Cisco, Arista, HPE, others

•

CloudBees readies Jenkins X SaaS platform

•

Get ready for the convergence of IT and OT networking and security

White Paper: Citrix

Delivering the Future of Work – Now

The CIO’s guide to building the unified, digital workspace for today’s hybrid and multi-cloud strategies. Read more ▶

Image: Windows 10 1803-to-1903 forced upgrades gather speed

Windows 10 1803-to-1903 forced upgrades gather speed

In one month, the percentage of Windows 10 PCs running this spring’s feature update almost doubled, though it still lags behind older versions. Read more ▶

Image: Master data analytics and deep learning with this $35 Python certification bundle

DEALPOST

Master data analytics and deep learning with this $35 Python certification bundle

The Complete Python Certification Bootcamp Bundle contains 12 courses on how to use Python for apps, data analysis, deep learning, and more. Read more ▶

Image: How to work with worker services in ASP.Net Core

How to work with worker services in ASP.Net Core

Learn how to use the new template available in ASP.Net Core 3.0 to build a worker service Read more ▶

 
 
Image: Beware rogue email rules and forms

Beware rogue email rules and forms

Creating malicious rules and forms in a compromised email client is an old but effective hacker trick that evades traditional antimalware software. Here’s how to make sure you can detect it. Read more ▶

Image: Nvidia rises to the need for natural language processing

Nvidia rises to the need for natural language processing

As the demand for natural voice processing grows for chatbots and AI-powered interactions, more companies will need systems to provide it. Nvidia says its platform can handle it. Read more ▶

Image: Extreme's acquisitions have prepped it to better battle Cisco, Arista, HPE, others

Extreme's acquisitions have prepped it to better battle Cisco, Arista, HPE, others

Extreme has bought cloud, SD-WAN and data center technologies that make it more prepared to take on its toughest competitors. Read more ▶

Image: CloudBees readies Jenkins X SaaS platform

CloudBees readies Jenkins X SaaS platform

The SaaS service follows CloudBees’s own commercial distribution of the open source Jenkins X Read more ▶

Image: Get ready for the convergence of IT and OT networking and security

Get ready for the convergence of IT and OT networking and security

Collecting telemetry data from operational networks and passing it to information networks for analysis has its benefits. But this convergence presents big cultural and technology challenges. Read more ▶

Miscellaneous: eSentire

Q1 2019 Quarterly Threat Report

Read the Q1 2019 Quarterly Threat Report to learn what targeted businesses in January, February and March 2019 and to find out what strategies you can implement to protect your organization. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.