8 business card apps for smartphones: Scan 'em and store 'em

Email not displaying correctly? View it in your browser.

Computerworld Mobile/Wireless Computing

Jun 13, 2017
Featured Image

4 hidden settings to make Chrome for Android even better

Supercharge your smartphone's browser with these powerful yet out-of-sight options. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

8 business card apps for smartphones: Scan 'em and store 'em
Supreme Court to look at mobile privacy. Uh-oh.
A.I. meets music: how new tech is changing how people play instruments
FTC vs. Qualcomm: No license, no chips

White Paper: Xpandion Inc

6 Must Know Facts About Indirect Access

Indirect access has become a hot topic amongst SAP users in recent months and we would to share some of our knowledge and experiences. This document will help you gain some understanding on how important indirect access usage can effect an organization. Read More

Thumbnail Image

8 business card apps for smartphones: Scan 'em and store 'em

If you can't keep track of your business cards, one of these 8 smartphone apps will help you scan and store all those new contacts. Read More

Thumbnail Image

Supreme Court to look at mobile privacy. Uh-oh.

A ruling favoring law enforcement’s argument that it should have access to information such as geolocation data would have implications for companies facing civil complaints. Read More

A.I. meets music: how new tech is changing how people play instruments

Music has evolved widely throughout history. How does technology help in this evolutionary process? Read More

Thumbnail Image

FTC vs. Qualcomm: No license, no chips

The court should refuse Qualcomm’s motion to dismiss the antitrust suit. Read More

White Paper: Xpandion Inc

Take Control over Licensing for Indirect Access

In recent years, enterprises have faced the difficult burden of paying for many additional SAP licenses as a result of users who access or use SAP systems indirectly. Accessing SAP indirectly means consuming SAP's data in other applications. Read More

Is IT having an identity crisis?

With the perceptions of IT’s value and its status within an organization in constant flux, tech leaders are being challenged every day to prove that value and enhance that status. We offer strategies for staying relevant at a time when IT’s role as purveyor of all technology is nothing but a distant memory. Read more about IT's identity crisis in Computerworld's Digital Magazine, which also includes News Analysis, Opinion, Shark Tank, Security Manager's Journal, the Grill and Shark Tank -- all free for download with registration. View the magazine here

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Mobile/Wireless Computing as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.