Computerworld

IDG’s Top Enterprise Stories

April 17, 2019

Image: 7 steps to revenue-driven IT

7 steps to revenue-driven IT

Organizations are increasingly turning to IT for revenue-generating initiatives. Here’s how IT can drive value at the intersection of company and client. Read more ▶

Your Must-Read Stories

•

How to protect your privacy in Windows 10

•

Apple settles with Qualcomm - the 5G iPhone looks more real

•

How to deal with backup when you switch to hyperconverged infrastructure

•

What is a side channel attack? How these end-runs around encryption put everyone at risk

•

Google Cloud Code gives Kubernetes development a boost

•

How to protect yourself from PC hardware and hardware driver vulnerabilities

•

Move data to the cloud with Azure Data Migration

White Paper: Flexera Software

Flexera Technopedia Product EOL/EOS 2018 Report

Don't let obsolete technology get you down. Read more ▶

Image: How to protect your privacy in Windows 10

How to protect your privacy in Windows 10

Worried about privacy issues in Windows 10? Here's what you can do. Read more ▶

Image: Learn how to get certified in Microsoft Azure for just $29

FROM OUR BUSINESS PARTNERS

Learn how to get certified in Microsoft Azure for just $29

Read more ▶

Image: Apple settles with Qualcomm - the 5G iPhone looks more real

Apple settles with Qualcomm - the 5G iPhone looks more real

Apple and Qualcomm have reached a settlement that means both sides can work together, at least for the next six years. Read more ▶

 
 
Image: How to deal with backup when you switch to hyperconverged infrastructure

How to deal with backup when you switch to hyperconverged infrastructure

Vendors of hyperconverged infrastructure provide options for making it easier to backup data on-site, in the cloud or both, but which is best? Read more ▶

Image: What is a side channel attack? How these end-runs around encryption put everyone at risk

What is a side channel attack? How these end-runs around encryption put everyone at risk

Side channel attacks on cryptography break confidentiality by exploiting information produced by the encryption — such as van Eck phreaking in a TEMPEST attack, courtesy the van across the street. Read more ▶

Image: Google Cloud Code gives Kubernetes development a boost

Google Cloud Code gives Kubernetes development a boost

Pre-release plug-ins for Visual Studio Code and IntelliJ promise to speed up the build, deploy, and debug cycle for cloud-native apps Read more ▶

Image: How to protect yourself from PC hardware and hardware driver vulnerabilities

How to protect yourself from PC hardware and hardware driver vulnerabilities

Attackers have hijacked PC motherboard update software and hardware drivers to install malware. Here's how to identify vulnerable systems and prevent driver-delivered malware. Read more ▶

Image: Move data to the cloud with Azure Data Migration

Move data to the cloud with Azure Data Migration

Getting data from databases to Azure needn’t be hard Read more ▶

White Paper: Flexera Software

Essential Strategies for Managing Cloud Costs

Is your enterprise IT budget stuck in the clouds? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.