A.R., A.I. and 5G to help drive mobile spending through '21

Email not displaying correctly? View it in your browser.

Computerworld First Look

Mar 14, 2018
Featured Image

Collaboration: Companies look to consolidate on team chat apps

With so many collaboration and communications tools now available, companies face app fragmentation and hurdles to ensuring their workers can actually connect. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

A.R., A.I. and 5G to help drive mobile spending through '21
Get a 299-Piece All-Purpose First Aid Kit For $12 Today
IT beware: University finds new 4G security holes
Jonny Evans: Essential Facebook security tips for iPhone users
JR Raphael: Android P is a perfect example of why OS updates still matter
Woody Leonhard: Turn Automatic Update off, temporarily, in anticipation of another round of pernicious patches

White Paper: Bitsight

40 Questions You Have in Your Vendor Security Assessment

Our goal with this guide is to help you get started with the creation of your vendor security risk assessment. This is not intended to be an out-of-box security assessment solution, but rather, a guide to get you headed in the right direction. We'll explain the top three frameworks you should be examining, questions you may want to consider (and why you should potentially consider them) and what else to include in your VRM program. Read More

Thumbnail Image

A.R., A.I. and 5G to help drive mobile spending through '21

Companies are expected to boost their deployment of augmented reality software and hardware this year as they bolster efforts to enable employee mobility. Read More

Thumbnail Image
DealPost

Get a 299-Piece All-Purpose First Aid Kit For $12 Today

The highly rated kit includes a first aid guide, vinyl gloves, bandages, cold compress, gauze pads, trauma pad, cotton-tipped applicators, first aid tape roll, antiseptics and all three common OTC pain medications. Neatly organized in a soft zippered pouch. Read More

Thumbnail Image

IT beware: University finds new 4G security holes

Researchers from Purdue University and the University of Iowa have found quite a few new security holes in the popular 4G mobile networks. Read More

Thumbnail Image

Jonny Evans: Essential Facebook security tips for iPhone users

Enterprise and consumer users often use Facebook on their mobile devices. It makes sense, then, that they take these steps to ensure they stay safe. Read More

Thumbnail Image

JR Raphael: Android P is a perfect example of why OS updates still matter

It's easy to see the present form of Android P as lacking in pizzazz, but our first glimpse at Google's next effort speaks volumes about the ongoing importance of the OS-level update. Read More

Thumbnail Image

Woody Leonhard: Turn Automatic Update off, temporarily, in anticipation of another round of pernicious patches

January’s patches were horrible. February’s were a little better. Take a moment now to make sure you aren’t tossed in with the cannon fodder, and wait to see what tomorrow will bring. Read More

White Paper: Jamf

Modern Device Management: Mac Alongside Windows

The rise of employee-choice programs, and the resulting growth of Apple in the enterprise, introduces new challenges and unknowns for previously Windows - dominated environments. This report outlines how Mac and Windows devices, tools and infrastructure can be integrated to deliver a more secure and productive environment. Read More

Subscribe to Computerworld First Look

Sign up for our popular daily newsletter. You'll get Computerworld's top stories, first thing in the morning. We deliver breaking news and in-depth features on topics like Windows 10 and enterprise mobility, as well as authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Register for IDG's AGENDA18 conference

AGENDA is the business leadership conference focused on driving your business forward in changing times. AGENDA18 will bring together more than 300 senior technology leaders and business stakeholders to share best practices, learn new techniques and engage in digital leadership training. Don't miss out: Register now

Get the Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — in-depth articles available only to Insider members. You get access not only to Computerworld's Insider content but to selected Insider content from InfoWorld, CIO.com, Network World, CSO, and other IDG publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld First Look as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.