Computerworld

IDG’s Top Enterprise Stories

April 19, 2019

Image: How H-1B changes will impact U.S. IT

How H-1B changes will impact U.S. IT

Many IT employers rely on foreign national talent with H-1B visas to fill thousands of technical roles. New and proposed changes have many tech companies worried about the consequences. Read more ▶

Your Must-Read Stories

•

Coming soon: A token taxonomy to define the world of blockchain

•

JavaScript tutorial: Higher-order functions

•

Assume breach is for losers: These steps will stop data breaches

•

5 steps to smarter data visualization

•

Oracle’s and IBM’s hybrid cloud defense may not hold

•

Microsoft aims for simplicity with Bosque programming language

•

How New York City plans to become a cybersecurity hub

White Paper: Hewlett Packard Enterprise

Analyst White Paper: Accelerate performance for production AI

Learn about the HPC storage requirements to accelerate performance for production AI scenarios with distributed AI servers. This paper shows the testing results from a variety of benchmarks from 1 to 32 GPUs up to 4 server nodes using flash-based WekaIO storage Read more ▶

Image: Coming soon: A token taxonomy to define the world of blockchain

Coming soon: A token taxonomy to define the world of blockchain

The Enterprise Ethereum Alliance is calling on businesses to collaborate on standards that describe digital currencies and other assets for business use so they work across platforms, regardless of the type of blockchain involved. Read more ▶

Image: Learn how to get certified in Microsoft Azure for just $29

DEALPOST

Learn how to get certified in Microsoft Azure for just $29

Read more ▶

Image: JavaScript tutorial: Higher-order functions

JavaScript tutorial: Higher-order functions

‘Higher-order functions’ is a fancy term for functions that take other functions as arguments or that return functions. Very powerful! Read more ▶

 
 
Image: Assume breach is for losers: These steps will stop data breaches

Assume breach is for losers: These steps will stop data breaches

Yes, you do need to be prepared should your organization be breached, but countering social engineering, patching, multi-factor authentication and a solid backup plan will keep them from happening. Read more ▶

Image: 5 steps to smarter data visualization

5 steps to smarter data visualization

Data visualizations are key to understanding your data, so help them look their best Read more ▶

Image: Oracle’s and IBM’s hybrid cloud defense may not hold

Oracle’s and IBM’s hybrid cloud defense may not hold

There's a lot of money on-premises, which keeps IBM and Oracle making money. But AWS, Microsoft, and even Google are targeting on-premises—with IT buy-in Read more ▶

Image: Microsoft aims for simplicity with Bosque programming language

Microsoft aims for simplicity with Bosque programming language

The new, open-source programming language is designed for writing code that is simple and obvious for both humans and machines Read more ▶

Image: How New York City plans to become a cybersecurity hub

How New York City plans to become a cybersecurity hub

America's largest city has been hit hard by the cybersecurity skills shortage and is working to grow its cybersecurity workforce. Read more ▶

White Paper: Hewlett Packard Enterprise (HPE)

IDC White Paper: Driving Business Transformation with Blockchain

In this white paper, we discuss the opportunities and challenges of using DLT and smart contracts in a variety of use cases across several industries Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.