Computerworld

IDG’s Top Enterprise Stories

March 05, 2019

Image: Windows by the numbers: Windows 7 is one obstinate OS

Windows by the numbers: Windows 7 is one obstinate OS

Even as its end-of-support deadline draws ever closer, Windows 7 apparently gained users in February, casting doubt on just how well how customer migrations to Windows 10 are doing. Even Windows XP gained users. Read more ▶

Your Must-Read Stories

•

CCIE relevancy: Is Cisco's venerable network certification on top of programmability, automation trends?

•

How to write an R package

•

What is Mimikatz? And how to defend against this password stealing tool

•

What is an IT auditor? A vital role for risk assessment

•

What is shadow IoT? How to mitigate the risk

•

Culture change 101: Collaborate with HR to drive transformation

•

How Azure Maps differs from Bing Maps for developers

White Paper: Logicalis

Nail Down Network Management First

One common goal is to embrace new opportunities. Learn how a strong network core can link your vital internal and external services. Read more ▶

Image: CCIE relevancy: Is Cisco's venerable network certification on top of programmability, automation trends?

CCIE relevancy: Is Cisco's venerable network certification on top of programmability, automation trends?

The Cisco Certified Internetwork Experts (CCIE) certification is a career pinnacle for many network professionals. But not everyone thinks it's worth the investment in time and money. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Image: How to write an R package

How to write an R package

R packages are great for organizing your own work, not only sharing with others. See how to create an R package in a few simple steps, thanks to packages like devtools, usethis, and roxygen2 Read more ▶

 
 
Image: What is Mimikatz? And how to defend against this password stealing tool

What is Mimikatz? And how to defend against this password stealing tool

Mimikatz is a leading post-exploitation tool that dumps passwords from memory, as well as hashes, PINs and Kerberos tickets. Read more ▶

Image: What is an IT auditor? A vital role for risk assessment

What is an IT auditor? A vital role for risk assessment

An IT auditor is responsible for analyzing and assessing an organization’s technological infrastructure to find problems with efficiency, risk management and compliance. Read more ▶

Image: What is shadow IoT? How to mitigate the risk

What is shadow IoT? How to mitigate the risk

When someone in your organization starts using internet-connected devices without IT’s knowledge, that’s shadow IoT. Here's what you need to know about its growing risk. Read more ▶

Image: Culture change 101: Collaborate with HR to drive transformation

Culture change 101: Collaborate with HR to drive transformation

There’s no silver bullet for culture change, but CIOs should consider partnering with their CHROs on technology architectures and processes intended to shape and influence culture. Read more ▶

Image: How Azure Maps differs from Bing Maps for developers

How Azure Maps differs from Bing Maps for developers

Microsoft’s newest mapping service has a deep enterprise and IoT focus Read more ▶

White Paper: Logicalis

Getting IoT Right:Tips for Successful IoT/Analytics Projects

Check out tips for Successful IoT/Analytics Projects here. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.