10 best gadgets from CES 2017

Email not displaying correctly? View it in your browser.

CIO

CIO Blogs Discussion

Jan 31, 2017
Featured Image

Café owners putting the smackdown on Wi-Fi freeloaders

What’s a poor café owner to do when the laptop crowd sucks up free Wi-Fi all day and spends almost nothing? Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

10 best gadgets from CES 2017
Worst idea ever: Buying wireless service from Comcast
When it comes to success, nothing tops passion
Connected cars are ripe for hacking
How to protect your online privacy in the Trump era
Win the war for talent by improving employee experience
Consciously overcoming unconscious bias
The year of Alexa and the coming decade of A.I.
New iOS app Don't Leave It! does one thing well
Why Amazon Echo will become the dominance home assistant player
Apple's iOS 10.3 beta includes tool to find AirPods

Video/Webcast: Neustar Inc

2016: A Security Minefield - Will You Be Ready for 2017?

Ransomware. Politically-motivated hacking. Distributed denial-of-service - and now mega-DDoS attacks targeting the foundations of the Internet, thanks to vulnerabilities in the burgeoning Internet of Things. 2016 has been a landmark year for information security in many ways. What can we expect in 2017? Read More

Thumbnail Image

10 best gadgets from CES 2017

>From mini robots to selfie drones and super-thin TVs: Here's the best we saw at CES 2017. Read More

Thumbnail Image

Worst idea ever: Buying wireless service from Comcast

Comcast makes its cable and broadband customers miserable, so why does it think it can score by selling wireless phone service? Read More

Thumbnail Image

When it comes to success, nothing tops passion

Serial entrepreneur Jordan French talks passion and the drive behind doing what you love. Read More

Thumbnail Image

Connected cars are ripe for hacking

Modern technology could make connected cars safer than ever for drivers, but security from potential hackers is imperative. Read More

Thumbnail Image

How to protect your online privacy in the Trump era

You may not have anything to hide, but do you really want some government agency peeking into your private digital life? I didn't think so. Read More

Thumbnail Image

Win the war for talent by improving employee experience

Employee experience — it’s similar to employee engagement. It includes perks and casual Fridays, and also how performance reviews are run, and the quality of the working relationship with the boss. How do you do employee experience? Read More

Thumbnail Image

Consciously overcoming unconscious bias

To build high-performing teams in our businesses and organizations, we need to overcome unconscious bias. Read More

Thumbnail Image

The year of Alexa and the coming decade of A.I.

CES was all abuzz about Alexa and Davos was talking about the impact of the advancements of artificial intelligence. You need to educate your leadership, nominate a thought leader, get your data in order and begin your A.I. plan. Read More

Thumbnail Image

New iOS app Don't Leave It! does one thing well

Whenever you walk out of a designated range without your earbuds, keys, or other item, Don't Leave It! reminds you. The iOS-only app works well, but it's not your only location-based reminder option. Read More

Thumbnail Image

Why Amazon Echo will become the dominance home assistant player

Google is among the companies hoping to compete against Amazon's Echo AI system. But it might already be too late in the game. Read More

Thumbnail Image

Apple's iOS 10.3 beta includes tool to find AirPods

Worried one of your AirPods will go missing? Apple feels your pain, adding a new tool to iOS 10.3 that will cause a lost AirPod to play a sound and reveal its location on a map. Read More

White Paper: Neustar Inc

Cybersecurity Essentials for 2017

For cybersecurity professionals, 2016 presented a year of distributed denial of service (DDoS) attacks that were unprecedented. Week after week, the public was inundated with news of hacks, attacks, and data leaks. It didn't take long for everybody to realize the old axiom of cybersecurity still holds true - there are two types of companies: those who are hacked and know about it, and those who are hacked and soon will find out. Read More

CIO Insider

1. 7 agile certifications to take your career to the next level
2. The essential guide to anti-malware
3. How to wake the enterprise from IoT security nightmares
4. Free security tools to support cybersecurity efforts
5. Study: 62% of security pros don’t know where their sensitive data is

Editor's Picks

1. Why Google’s Sergey Brin changed his tune on AI
2. 5 tech jobs that will boom (and 2 that will bust) in 2017
3. Wine, women and data science
4. Your guide to top tech conferences
5. 6 new 2-in-1 devices to watch for in 2017
Twitter Facebook LinkedIn Google+

You are currently subscribed to CIO Blogs Discussion as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CIO, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@cxo.com.