Search This Blog

Wednesday, July 08, 2015

Microsoft to offer free Windows 10 upgrades for 2 to 4 years

Computerworld Wrap-Up
July 08, 2015

Microsoft to provide free upgrades to Windows 10 for 2 to 4 years

Microsoft has quietly revealed more information about how long it will provide updates for Windows 10. READ MORE

 

Issue highlights

1. Update: Computer issues halt trading on NYSE

2. Microsoft writes off $7.6B, admits failure of Nokia acquisition

3. United Airlines flights resume after 'network connectivity' issues resolved

4. INSIDER 5 reasons why newer hires are the company's biggest data security risk

5. NOW ON CIO: Healthcare needs more IT security pros – stat

6. Ira Winkler: The OPM lawsuit will only make the lawyers rich

7. Cybercriminals start using Flash zero-day exploit leaked from Hacking Team

8. Jonny Evans: Just say no to connected cars

9. Hacker group that hit Twitter, Facebook, Apple and Microsoft intensifies attacks

10. INSIDER Self-service BI review: Tableau vs. Qlik Sense vs. Power BI

11. FBI, DOJ want companies to back off end-to-end encryption

12. Jonny Evans: Warning: iOS accounts for 18% of all online sales

13. Darlene Storm: Did hackers remotely execute 'unexplained' commands on German Patriot missile battery?

: SkyHigh Networks

The Definitive Guide to Cloud Security

Dive into the framework developed by Gartner for managing cloud security. Learn what Gartner defines as a Cloud Access Security Broker (CASB), the top 10 questions to ask your team around cloud visibility & threat prevention, and the 6 primary areas of cost savings that a CASB vendor can deliver. view Now>>

Update: Computer issues halt trading on NYSE

A computer glitch halted trading on the New York Stock Exchange today for more than three hours. READ MORE

Microsoft writes off $7.6B, admits failure of Nokia acquisition

Microsoft today wrote off billions of dollars related to its Nokia acquisition, taking an "impairment charge" valued at nearly the full amount it paid for the Finnish firm's smartphone business and patents last year. READ MORE

United Airlines flights resume after 'network connectivity' issues resolved

United Airlines passengers faced major travel delays today after the carrier suspended all U.S. flights due to computer problems. READ MORE

INSIDER

5 reasons why newer hires are the company's biggest data security risk

Those fresh-faced new hires and interns who have invaded the office this summer bring with them eager minds and new perspectives, but they also carry a higher data security risk. READ MORE

NOW ON CIO: Healthcare needs more IT security pros – stat

Technology is bringing amazing changes to the healthcare industry, but it's also bringing the need for more IT security professionals. READ MORE

Ira Winkler: The OPM lawsuit will only make the lawyers rich

Class-action lawsuits are pursued by lawyers for a reason: They're a great way for them to make a lot of money. Too little of that money is ever seen by the victims, though. READ MORE

White Paper: SkyHigh Networks

19 Habits of Highly Effective Cloud Governance Programs

Based on data from working with 350+ corporations on safe cloud adoption, this white paper details the key traits that the most successful cloud governance programs share. Learn what 19 habits you should build into your governance programs. View Now>>

Cybercriminals start using Flash zero-day exploit leaked from Hacking Team

They profit from the one-day window until Adobe expects to release a patch. READ MORE

Jonny Evans: Just say no to connected cars

Around 5% of new vehicles already include some form of embedded technology inside. But have you thought about the consequences? READ MORE

Hacker group that hit Twitter, Facebook, Apple and Microsoft intensifies attacks

The hackers that targeted Twitter, Facebook, Apple and Microsoft developers two years ago have escalated their economic espionage efforts as they seek confidential business information and intellectual property they can profit from. READ MORE

INSIDER

Self-service BI review: Tableau vs. Qlik Sense vs. Power BI

All three next-gen BI solutions make data discovery and analysis remarkably easy, but Tableau does it best. READ MORE

FBI, DOJ want companies to back off end-to-end encryption

U.S. tech companies should retain access to the encrypted information of their customers, instead of providing end-to-end encryption, in order to give police the tools they need to investigate crimes and terrorist activity, two senior law enforcement officials said. READ MORE

Jonny Evans: Warning: iOS accounts for 18% of all online sales

iPhones and iPads account for 18 percent of all online transactions across the planet. READ MORE

Darlene Storm: Did hackers remotely execute 'unexplained' commands on German Patriot missile battery?

Oh good, just what we need, vulnerable weapon systems being breached. It was reported that hackers gained access to a German Patriot missile battery and issued "unexplained commands." Yikes! READ MORE

White Paper: SkyHigh Networks

Protecting Corporate Data in the Cloud

How can you protect corporate data in the cloud and limit the damage of breaches when they occur? Learn what two high risk cyber security blind spots your company should be monitoring, and how other companies are protecting their data. view Now>>

Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.

Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated leadership in their organizations through the use of IT and have the strategic vision to align technology with business goals. Nominations close July 14. To make a nomination, click here.

Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service? That's what we want to find out. For the third year, Computerworld is polling readers to find out how they feel about their mobile data provider, how much they pay, how they use their mobile data connections and more. Take the survey here.

Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report on the top organizations across the country that offer technology pros challenging projects, robust salaries and flexible work/life options. To read the issue, click here.

Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!

Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

To sign up now, click here.

Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.

Follow Computerworld

You are currently subscribed to computerworld_dailynews as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright (C) 2015 Computerworld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@computerworld.com. **

 

No comments: