Search This Blog

Thursday, July 23, 2015

Windows revenue takes another bad beating

Computerworld Wrap-Up
July 23, 2015

Windows revenue takes another bad beating

Microsoft's Windows revenue again declined by double digits, the third straight such quarter, with sales of licenses to computer makers down 22% from the same period last year. READ MORE

 

Issue highlights

1. Researchers disclose four unpatched vulnerabilities in Internet Explorer

2. Google lures businesses to Nearline with 100 PB of free cloud storage

3. NOW ON CIO: FCC ruling could finally make telecoms eradicate 'robocalls'

4. Apple hands out Beats headphones for back-to-school promo

5. INSIDER Getting serious about portfolio and program management

6. WordPress gets a patch for critical XSS flaw

7. NOW ON CSO: Hacked Opinions: Vulnerability disclosure – Jeff Williams

8. New York eases limits on Uber's growth

9. JR Raphael: How I use Android: App designer and Android blogger Liam Spradlin

10. Jonny Evans: Who's gonna win the Apple Watch guesswork wars?

11. Darlene Storm: Free tools to find out if your computer is infected with Hacking Team malware

Webcast: Meridium

Asset Performance Management

View this on-demand webcast to learn how the proliferation of data from multiple sources is opening opportunities across other domains for it to extend its expertise and influence - to the benefit of the business. Learn More

Researchers disclose four unpatched vulnerabilities in Internet Explorer

The reports contain limited information, making exploit development hard and unlikely. READ MORE

Google lures businesses to Nearline with 100 PB of free cloud storage

Google on Thursday had its sights fixed firmly on Amazon as it launched its new, low-cost Nearline cloud storage service out of beta and into general availability. READ MORE

NOW ON CIO: FCC ruling could finally make telecoms eradicate 'robocalls'

Consumers and regulators have repeatedly asked telecom companies to block 'robocalls.' They've refused and issued excuses in the past, but a recent letter from 44 U.S. AGs and a new FCC ruling may finally force them to take action. READ MORE

Apple hands out Beats headphones for back-to-school promo

Apple kicked off its annual back-to-school promotion in the U.S., switching the deal to a free pair of Beats headphones for customers who buy eligible Macs. READ MORE

INSIDER

Getting serious about portfolio and program management

It's been 10 years since Johanna Rothman co-authored 'Behind Closed Doors: Secrets of Great Management.' She was just getting started. READ MORE

: NexGen Storage

How Hybrid Flash Array Helps Businesses Do More With Less

Download the case study now and see how BridgePay built a competitive advantage and scaled transactions by 500% in the same storage footprint using some of the most advanced and differentiated technology available today. Learn More

WordPress gets a patch for critical XSS flaw

Developers of the WordPress blogging platform have released a critical security update to fix a flaw that can be exploited to take over websites. READ MORE

NOW ON CSO: Hacked Opinions: Vulnerability disclosure – Jeff Williams

Contrast Security's Jeff Williams talks about disclosure, bounty programs, and vulnerability marketing. READ MORE

New York eases limits on Uber's growth

It's probably safe to say goodbye to "de Blasio" mode in Uber's app in New York. READ MORE

JR Raphael: How I use Android: App designer and Android blogger Liam Spradlin

He designs Android apps you love and writes Android blogs you read -- so how does Liam Spradlin use Android in his own life? READ MORE

Jonny Evans: Who's gonna win the Apple Watch guesswork wars?

Wall Street's finest spreadsheet warriors have laid down their very best guesses on Apple Watch sales. READ MORE

Darlene Storm: Free tools to find out if your computer is infected with Hacking Team malware

Rook Security offers Milano, a free tool to scan your PC for any possible Hacking Team malware infection. Facebook offers osquery to detect Hacking Team's Remote Control System on OS X. Lookout has mobile covered and can detect surveillance malware on Android and iOS platforms. READ MORE

White Paper: Centrify Corporation

7 Ways to Protect Your Data in Shadow IT and Shadow Data

Is protecting your company's sensitive data a challenge? Most companies are running over 500 apps on their network at any given time. Re-used passwords are common, but open up the possibility of data breaches that can expose sensitive data. View now>>

Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.

Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated leadership in their organizations through the use of IT and have the strategic vision to align technology with business goals. Nominations close July 31. To make a nomination, click here.

Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service? That's what we want to find out. For the third year, Computerworld is polling readers to find out how they feel about their mobile data provider, how much they pay, how they use their mobile data connections and more. Take the survey here.

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report on the top organizations across the country that offer technology pros challenging projects, robust salaries and flexible work/life options. To read the issue, click here.

Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!

Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

To sign up now, click here.

Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.

Follow Computerworld

You are currently subscribed to computerworld_dailynews as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright (C) 2015 Computerworld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@computerworld.com. **

 

No comments: