Computerworld

IDG’s Top Enterprise Stories

April 18, 2019

Image: 12 open-source tools that make Docker better

12 open-source tools that make Docker better

From bringing GUIs to Docker tools to using Docker to streamline development and testing, these 12 projects help float Docker’s boat Read more ▶

Your Must-Read Stories

•

When developers shouldn’t trust low-code platforms

•

What is project portfolio management? Aligning projects to business goals

•

Wipro breach highlights third-party risk from large IT services providers

•

Startup MemVerge combines DRAM and Optane into massive memory pool

•

Want to the know future of IoT? Ask the developers!

•

Cisco Talos details exceptionally dangerous DNS hijacking attack

•

What's a crypto wallet (and how does it manage digital currency)?

Video/Webcast: Avi Networks

Reconsider TCPdump and Move Forward with Modern Troubleshooting

Are you tired of troubleshooting with TCPdump? The Avi Vantage Platform is here to help. Read more ▶

Image: When developers shouldn’t trust low-code platforms

When developers shouldn’t trust low-code platforms

Low-code and lock-in often go hand in hand. Watch out for these red flags when choosing a solution Read more ▶

Image: Learn how to get certified in Microsoft Azure for just $29

FROM OUR BUSINESS PARTNERS

Learn how to get certified in Microsoft Azure for just $29

Read more ▶

Image: What is project portfolio management? Aligning projects to business goals

What is project portfolio management? Aligning projects to business goals

To successfully achieve company-wide objectives, it is vital for project, program, and portfolio managers and executives to understand the purpose and benefits of PPM. Read more ▶

 
 
Image: Wipro breach highlights third-party risk from large IT services providers

Wipro breach highlights third-party risk from large IT services providers

After outsourcing giant Wipro suffered a phishing incident, attackers used its email system to target the company’s customers. The breach demonstrates the dangers of supply chain and third party risk. Read more ▶

Image: Startup MemVerge combines DRAM and Optane into massive memory pool

Startup MemVerge combines DRAM and Optane into massive memory pool

MemVerge software combines regular DRAM with Intel’s Optane DIMM persistent memory into a single clustered storage pool that doesn't require any changes to applications. Read more ▶

Image: Want to the know future of IoT? Ask the developers!

Want to the know future of IoT? Ask the developers!

A new survey of internet of things (IoT) developers reveals that connectivity, performance, and standards are growing areas of concern as IoT projects hit production. Read more ▶

Image: Cisco Talos details exceptionally dangerous DNS hijacking attack

Cisco Talos details exceptionally dangerous DNS hijacking attack

Cisco Talos says state-sponsored attackers are battering DNS to gain access to sensitive networks and systems Read more ▶

Image: What's a crypto wallet (and how does it manage digital currency)?

What's a crypto wallet (and how does it manage digital currency)?

Cryptocurrency wallets store secret keys used to digitally sign transactions for blockchain distributed ledgers, but their future goes far beyond being just a keeper of cryptocurrencies. They could one day represent your professional and financial status, or even your personal identity. Read more ▶

Video/Webcast: Sungard & AWS

2019 IT New Year Resolutions

The utilization of data and analytics applications to identify critical findings can provide an organization with competitive and operational advantage. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.