4 approaches to diversity and inclusion leadership

Email not displaying correctly? View it in your browser.

IDG’s Top Enterprise Stories

Our top picks from IDG's editors
Mar 26, 2018
IDG
Featured Image

Serverless in the cloud: AWS vs. Google Cloud vs. Microsoft Azure

With AWS Lambda, Google Cloud Functions, and Microsoft Azure Functions, a little bit of business logic can go a very long way Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

4 approaches to diversity and inclusion leadership
Why Spectre demands more elegantly coded software
Java 11 roadmap: The new features you can expect
Busting bias in AI
Penn State secures building automation, IoT traffic with microsegmentation
Are you letting GDPR’s privacy rules trump security?
Shedding light on broadband performance for an optimized SD-WAN
How to use AirDrop with iOS and MacOS

White Paper: Illumio

5 Steps to Build a Smart Segmentation Strategy

Deployed at the network layer, segmentation was first developed to improve network performance. But as cybersecurity experts have become convinced that a "perimeter first" approach to security is not feasible, it's become increasingly clear that segmentation is also the foundation for securing the interior of your data center. Read More

Thumbnail Image

4 approaches to diversity and inclusion leadership

There’s no one-size-fits-all diversity and inclusion strategy. Here’s how four tech companies handle D&I — some with executive representation, some without. Read More

Thumbnail Image
INSIDER

Why Spectre demands more elegantly coded software

Write it well, write it efficiently, write it as though the underlying hardware isn’t going to get any faster. Because it isn’t Read More

Thumbnail Image

Java 11 roadmap: The new features you can expect

CORBA, Java EE, and JavaFX support will be removed, while just a handful of new features are being added—so far Read More

Thumbnail Image
INSIDER

Busting bias in AI

Bias in AI systems can lead to unintended consequences. Making sure you you understand the ways AI systems are interpreting the data they receive is one way to address the problem. Read More

Thumbnail Image

Penn State secures building automation, IoT traffic with microsegmentation

Penn State chose microsegmentation technology from Tempered Networks to isolate and cloak traffic from its smart building systems, which rely on the BACnet communications protocol to share data related to HVAC, lighting, access control, fire detection and more. Read More

Thumbnail Image

Are you letting GDPR’s privacy rules trump security?

An extreme approach to protecting privacy can actually make personal data less safe. Don’t overreact. Read More

Thumbnail Image

Shedding light on broadband performance for an optimized SD-WAN

ThousandEyes' monitoring of broadband performance enables network professionals to make an educated decision before moving to a broadband-based SD-WAN. Read More

Thumbnail Image

How to use AirDrop with iOS and MacOS

Here's how to turn on AirDrop and use it to move files between an iPhone and a Mac. Read More

White Paper: Illumio

How to Use Micro-Segmentation to Secure Your Data Center and Public Cloud

The "perimeter only" approach to security is no longer enough. Although many cybersecurity influencers today are talking about micro-segmentation, there is relatively little discussion about how to use it to effectively. This guide breaks down the five essential steps to building a rock-solid micro-segmentation strategy and provides real-world examples to help you put a plan in place. Read More

Get more from the experts at these enterprise websites from IDG:

CIO | Computerworld | CSO | InfoWorld | Network World

You are currently subscribed to IDG’s Top Enterprise Stories as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Privacy Policy

Learn more about INSIDER

Copyright © 2018 IDG Communications, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.