Computerworld

IDG’s Top Enterprise Stories

February 13, 2019

Image: The long, slow death of commercial Unix

The long, slow death of commercial Unix

Unix was the standard for mission-critical computing. Now it’s clinging for life. How will it end? Read more ▶

Your Must-Read Stories

•

How to use deep learning to write Shakespeare

•

7 ways to ensure IT gets the credit it deserves

•

JDK 12: The new features coming to Java 12

•

Microsoft cheat sheets: Dive into Windows and Office apps

•

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

•

Why you should use SQLite

•

What happens when an Office 365 subscription expires?

eBook: GitHub

Secure software development strategy essentials

In this guide, you'll learn how to secure your engineering team's processes and provide the flexibility they need to do their best work. We'll also address the unique regulatory and technical challenges that software companies face and how GitHub can help. Read more ▶

Image: How to use deep learning to write Shakespeare

How to use deep learning to write Shakespeare

LSTM recurrent neural networks can be trained to generate free text. Let’s see how well AI can imitate the Bard Read more ▶

Image: Get TotalAV Essential AntiVirus for $19.99 (80% off)

FROM OUR BUSINESS PARTNERS

Get TotalAV Essential AntiVirus for $19.99 (80% off)

TotalAV works in harmony with all existing softwares already installed on your device, providing an unrivaled one-two punch of protection and performance maintenance for PC and Mac users alike. Read more ▶

Image: 7 ways to ensure IT gets the credit it deserves

7 ways to ensure IT gets the credit it deserves

Often ignored, overlooked or even snubbed, IT needs to claim its rightful place in the enterprise spotlight. Here's the steps you can take to raise IT's profile and morale. Read more ▶

 
 
Image: JDK 12: The new features coming to Java 12

JDK 12: The new features coming to Java 12

Beta builds are available, with switch expressions to improve coding and allow pattern matching, and raw string literals to simplify multiline expressions Read more ▶

Image: Microsoft cheat sheets: Dive into Windows and Office apps

Microsoft cheat sheets: Dive into Windows and Office apps

These guides will help you find your way around several generations of Microsoft’s Office apps for Windows — and Windows itself. Read more ▶

Image: What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

What is a man-in-the-middle attack? How MitM attacks work and how to prevent them

A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Detecting MitM attacks is difficult, but they are preventable. Read more ▶

Image: Why you should use SQLite

Why you should use SQLite

Learn why this compact embedded relational database shines for many desktop, mobile, and edge computing applications Read more ▶

Image: What happens when an Office 365 subscription expires?

What happens when an Office 365 subscription expires?

If you're using Microsoft's cloud-based Office 365 and the subscription lapses, here's how much time you have to renew -- or backup your data and move on. Read more ▶

White Paper: j2 Global

How Cloud Faxing Lowers Costs and Strengthens Data Security

The objective of this paper is to explore the fax security benefits and vulnerabilities faced by businesses, the costly nature of addressing them, and how other companies have overcome these challenges while strengthening overall fax security. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.