Apple's 2017 iPhone 8 event live blog

Email not displaying correctly? View it in your browser.

Computerworld Mobile/Wireless Computing

Sep 12, 2017
Featured Image

What the analysts are saying about Apple’s iPhone launch

Here's what the analysts are saying about Apple's iPhone launch. Seen any other comments? Send it in to see them added here. To be updated after the keynote. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Apple's 2017 iPhone 8 event live blog
11 tech breakthroughs that led to today’s smartphones
How Android One could complete Google's grand Android plan
Apple’s iOS 11 GM leak: Where’s the money?

Video/Webcast: Avaya

Avaya IP Office Journey to the Cloud

Business today is undergoing transformation. Employees are mobile and expect to collaborate round the clock, worldwide. And customers expect a rich and engaging interactive experience. Read More

Thumbnail Image

Apple's 2017 iPhone 8 event live blog

Apple's big iPhone launch begins at 1 p.m. ET. Join us for updates and insights in real-time as the event unfolds. Read More

Thumbnail Image

11 tech breakthroughs that led to today’s smartphones

With the imminent release of the next generation of iPhones, let's look at what early pioneers did to get us to where we are today Read More

Thumbnail Image

How Android One could complete Google's grand Android plan

With the company's low-cost, closely controlled phone program reportedly coming to America, the missing piece of the puzzle may finally be apparent. Read More

Thumbnail Image

Apple’s iOS 11 GM leak: Where’s the money?

Why is it that we think we know what Apple will reveal tomorrow but still don’t know what’s in the U.S. President’s tax returns? Who really paid for these leaks? Read More

White Paper: Gigamon

ESG Research Report: Network Security Trends

Register for the Enterprise Strategy Group's Research Insights Paper, Understanding the State of Network Security Today, to learn more about the challenges, changes, best practices and solution requirements for network security operations and tools. Key recommendations include improving network visibility and reducing security vulnerabilities through a platform-based approach. Download now! Read More

IDG Enterprise's Digital Edge 50: Pushing Digital Boundaries

The 2017 Digital Edge 50 awards recognize 50 organizations for digital transformation initiatives with significant, measurable business impact. Entries were judged by a panel of executive peers, including past winners, who evaluated projects on complexity, scale, business outcomes and innovation. Winning entries span more than 15 industries and seven countries outside the U.S. -- Australia, Belgium, China, France, India, Singapore and Switzerland. View the special report

Subscribe to Computerworld Daily News

Sign up for our popular daily tech news newsletter. You'll get Computerworld's top stories, first thing in the morning. We deliver breaking news and in-depth features on topics like Windows 10 and enterprise mobility, as well as authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Mobile/Wireless Computing as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.