Computerworld

IDG’s Top Enterprise Stories

August 22, 2019

Image: Real-world backup woes and how to fix them

Real-world backup woes and how to fix them

How four enterprises solved problems with their backup and restore processes Read more ▶

Your Must-Read Stories

•

The ‘ride-along’: The transformational CIO’s secret weapon

•

A guided tour of Linux file system types

•

TypeScript 3.6 brings stricter checking to iterators and generators

•

Automated machine learning or AutoML explained

•

Autodesk brings automation to its IT help desk

•

Your guide to using iCloud in business

•

What is access control? A key component of data security

White Paper: Carbon Black

Cognitions of a Cybercriminal

Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behavior.Attackers are getting better at moving around inside systems without being detected. Read more ▶

Image: The ‘ride-along’: The transformational CIO’s secret weapon

The ‘ride-along’: The transformational CIO’s secret weapon

Learning how employees operate is a critical task for CIOs, for whom the ‘ride-along’ has become essential in serving customers and generating revenue. Read more ▶

Image: Master data analytics and deep learning with this $35 Python certification bundle

DEALPOST

Master data analytics and deep learning with this $35 Python certification bundle

The Complete Python Certification Bootcamp Bundle contains 12 courses on how to use Python for apps, data analysis, deep learning, and more. Read more ▶

Image: A guided tour of Linux file system types

A guided tour of Linux file system types

Linux file systems have evolved over the years, and here's a look at file system types Read more ▶

 
 
Image: TypeScript 3.6 brings stricter checking to iterators and generators

TypeScript 3.6 brings stricter checking to iterators and generators

The latest TypeScript version also introduces improvements for working with arrays and promises Read more ▶

Image: Automated machine learning or AutoML explained

Automated machine learning or AutoML explained

AutoML frameworks and services eliminate the need for skilled data scientists to build machine learning and deep learning models Read more ▶

Image: Autodesk brings automation to its IT help desk

Autodesk brings automation to its IT help desk

To handle demand for support from a growing workforce without adding helpdesk staff, CIO Prakash Kota has brought in a bot take over some of the busy-work. Read more ▶

Image: Your guide to using iCloud in business

Your guide to using iCloud in business

A growing number of companies are using iCloud -- Apple’s storage and syncing suite for Mac and iOS. Here's how to take advantage of iCloud’s ease of use and tight security. Read more ▶

Image: What is access control? A key component of data security

What is access control? A key component of data security

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges. Read more ▶

Video/Webcast: EMA Analyst Research

Achieve IT Operations Success with a Unified Approach to Network Monitoring

Attend this webinar to learn how enterprises can improve network operations by adopting a unified network monitoring platform. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.