Computerworld

IDG’s Top Enterprise Stories

July 24, 2019

Image: The 6 best password managers

The 6 best password managers

Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure. Read more ▶

Your Must-Read Stories

•

IT’s soft skills shortage — and how to train up for success

•

Getting help for Linux shell built-ins

•

How to write your own ggplot2 functions in R

•

9 steps to lock down corporate browsers

•

Get started with Rust in Windows programming

•

Hybrid cloud is not what it used to be

•

31 hardware and firmware vulnerabilities: A guide to the threats

Video/Webcast: Iron Mountain

Securing Your Brand With Secure IT Asset Disposition

In this webcast, Christopher Greene of Iron Mountain joins IDG Content Director Joan Goodchild to discuss best practices for Secure IT Asset Disposition (SITAD) and what businesses need to know to dispose and remarket assets securely and lawfully Read more ▶

Image: IT’s soft skills shortage — and how to train up for success

IT’s soft skills shortage — and how to train up for success

Soft skills are essential to IT success, yet most organizations fail to prioritize soft skills training for IT pros. Here’s how to upskill your staff where it counts. Read more ▶

Image: There’s finally a communication app tailormade for on-the-go teams. Try it free.

DEALPOST

There’s finally a communication app tailormade for on-the-go teams. Try it free.

This intuitive collaboration platform is made for teams that move. Read more ▶

Image: Getting help for Linux shell built-ins

Getting help for Linux shell built-ins

Linux built-ins are commands that are part of a user’s shell. Sandra Henry-Stocker explains how to recognize them and get help on their use. Read more ▶

 
 
Image: How to write your own ggplot2 functions in R

How to write your own ggplot2 functions in R

You no longer have to worry about quoted and unquoted column names when using ggplot2, thanks to the latest version of the rlang package Read more ▶

Image: 9 steps to lock down corporate browsers

9 steps to lock down corporate browsers

Don’t let your users’ web browsing put your company at risk. Here are nine things you can do to help secure browsers in the enterprise. Read more ▶

Image: Get started with Rust in Windows programming

Get started with Rust in Windows programming

Microsoft signals that it might support Mozilla’s memory-safe alternative to C and C++ Read more ▶

Image: Hybrid cloud is not what it used to be

Hybrid cloud is not what it used to be

Hybrid cloud has changed since the days it was first defined by NIST. The evolution was necessary — and good for most enterprises Read more ▶

Image: 31 hardware and firmware vulnerabilities: A guide to the threats

31 hardware and firmware vulnerabilities: A guide to the threats

Meltdown and Spectre raised the alarm over vulnerabilities that attackers can exploit in popular hardware and its firmware. Here's a roundup of the ones that present the most significant threats. Read more ▶

White Paper: Lenovo

Why Lenovo For Higher Education

Colleges and universities are transforming to meet the demands of new students. Technology plays a critical role in making improvements to both physical and process infrastructure. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.