Computerworld

IDG’s Top Enterprise Stories

October 04, 2019

Image: “Do More with R” video tutorials

“Do More with R” video tutorials

Search for R video tutorials by task, topic, or package. Most videos are shorter than 10 minutes Read more ▶

Your Must-Read Stories

•

20 Slack tips, tricks and hacks for power users

•

Hiring STEM OPT employees: What businesses need to know

•

Is hybrid cloud certification right for you?

•

Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

•

Cobalt cybercrime group might be launching Magecart skimming attacks

•

JDK 14: The new features in Java 14

•

Google launches leaked-password checker, will bake it into Chrome in December

White Paper: Ramp

Video Distribution Behind the Firewall

This whitepaper provides insight into why an eCDN is important and dives into each of the most common types of eCDNs—multicasting, video caching and peer-to-peer. Read more ▶

Image: 20 Slack tips, tricks and hacks for power users

20 Slack tips, tricks and hacks for power users

Slack is a powerful collaboration tool with many hidden ways of doing things. Here’s how to get the most from it from users who know it best. Read more ▶

Image: Arcadia Power Can Help You Go Green & Lower Your Power Bill

DEALPOST

Arcadia Power Can Help You Go Green & Lower Your Power Bill

Read more ▶

Image: Hiring STEM OPT employees: What businesses need to know

Hiring STEM OPT employees: What businesses need to know

Everything you need to know about the DHS’s STEM Optional Practical Training program — and what is required to hire and employ STEM OPT student workers. Read more ▶

 
 
Image: Is hybrid cloud certification right for you?

Is hybrid cloud certification right for you?

Hybrid cloud training can help enterprise IT professionals who are trying to optimize private and public cloud resources. Read more ▶

Image: Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

Chinese cyberespionage group PKPLUG uses custom and off-the-shelf tools

A previously unknown group or collective associated with China is targeting victims in Asia, possibly for geopolitical gain. Read more ▶

Image: Cobalt cybercrime group might be launching Magecart skimming attacks

Cobalt cybercrime group might be launching Magecart skimming attacks

Researchers link Magecart-based skimming attacks to Cobalt (a.k.a. Carbanak), whose cyber attacks have netted millions of dollars. Read more ▶

Image: JDK 14: The new features in Java 14

JDK 14: The new features in Java 14

Switch expressions and NVM-supporting file mapping byte buffers are slated for the next version of standard Java due in 2020 Read more ▶

Image: Google launches leaked-password checker, will bake it into Chrome in December

Google launches leaked-password checker, will bake it into Chrome in December

The company plans to add a hacked-password alert system into its browser by the end of year; Firefox aims to do much the same thing this month. Read more ▶

Miscellaneous: ServiceNow Inc

ABERDEEN STUDY: Four Transformative Best Practices for Future-Ready Customer Service Experiences

Read the survey report and learn: · What makes an organization best in class? · How your service organization measures up · Four best practices to transform your service · What’s required to implement those practices? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.