Search This Blog

Monday, August 17, 2015

Edge browser fails to win over Windows 10 users

Computerworld Wrap-Up
August 17, 2015

Edge browser fails to win over Windows 10 users

Microsoft's new Edge browser is being used by a only minority of those running Windows 10, according to data from a pair of analytics vendors. READ MORE

Twitter
 

Issue highlights

1. Samsung unveils 15TB SSD based on densest flash memory

2. Windows 10's usage share ascent routs Windows 7's

3. IDG Contributor Network: Here's why tech companies should avoid the Amazon workplace culture problem

4. NOW ON CIO: 6 agile principles that apply to everythin

5. Review: Best open-source reporting tools

6. Security Manager's Journal: Selling IT on getting the most out of a new firewall

7. Rhonda Chicone: A serious take on silly-sounding cybersecurity terms

8. IBM partners to make Linux mainframes more mainstream

9. BitTorrent programs can be abused to amplify distributed denial-of-service attacks

10. NOW ON CSO: 10 security technologies destined for the dustbin

11. Darlene Storm: Hack to steal cars with keyless ignition: Volkswagen spent 2 years hiding flaw

12. Jonny Evans: The Apple Car rumors seem very, very credible

13. IT Blogwatch: Can Android M Marshmallow finally beat Apple iOS?

White Paper: Apperian

BYOD eBook: From Security to Success

Download this e-Book to learn best practices for executing a BYOD policy. Learn More

Samsung unveils 15TB SSD based on densest flash memory

Samsung has taken the wraps off an enterprise-class SAS SSD that stores 15.36TB in a 2.5-in. laptop drive form factor. READ MORE

Windows 10's usage share ascent routs Windows 7's

Early data shows Microsoft's new OS has come out of the gate faster than the venerable Windows 7 did six years ago. READ MORE

IDG Contributor Network: Here's why tech companies should avoid the Amazon workplace culture problem

Data-driven employee evaluations can turn humans into robots. READ MORE

NOW ON CIO: 6 agile principles that apply to everythin

Agile isn't just for software developers -- the methodology has applications and makes a positive impact anywhere it's applied in your business. Here are six agile principles you can use almost anywhere. READ MORE

Review: Best open-source reporting tools

Always on the lookout for open source alternatives to pricey commercial offerings, we wondered if open-source reporting tools could hold a candle to the established commercial products. READ MORE

Security Manager's Journal: Selling IT on getting the most out of a new firewall

The IT department was reluctant to take full advantage of the advanced functionality. So our manager annoyed them into compliance. READ MORE

White Paper: Websense, Inc.

The Key to Security, Growth and Innovation

With financial losses estimated to be at least $400 million–and security incidents grew up to 66%. But, don't allow fear to stifle growth. The "Data Theft Prevention," report focuses on how to stay secure while you innovate, from a broader, in-scope, more intelligent in application perspective. Learn More

Rhonda Chicone: A serious take on silly-sounding cybersecurity terms

Don't laugh. Names like 'cyber hygiene' and 'cyber palette' describe some very serious concepts. READ MORE

IBM partners to make Linux mainframes more mainstream

The company is working with Suse and Canonical to expand its Linux offerings. READ MORE

BitTorrent programs can be abused to amplify distributed denial-of-service attacks

Attackers could launch crippling attacks by reflecting the traffic through millions of computers running BitTorrent programs. READ MORE

NOW ON CSO: 10 security technologies destined for the dustbin

Systemic flaws and a rapidly shifting threatscape spell doom for many of today's trusted security technologies. READ MORE

Darlene Storm: Hack to steal cars with keyless ignition: Volkswagen spent 2 years hiding flaw

126 types of cars have been hackable for years and can be stolen thanks to a keyless security flaw; Volkswagen spent two years suing the researchers and trying to keep the vulnerabilities a secret. READ MORE

Jonny Evans: The Apple Car rumors seem very, very credible

Rumor and speculation continue to grow as Apple's plans for car design drive into view. READ MORE

IT Blogwatch: Can Android M Marshmallow finally beat Apple iOS?

Google has confirmed the name of Android M -- Marshmallow. The new version will first make it to the expected new Nexus devices due for release later this year. Soon after, it'll be available for OTA upgrades for older pure-Android shinies. But after that, who knows? READ MORE

: CDW

2 Quick Steps for Incrementally Migrating to Office 365

Because accessing productivity software from the cloud is so different from running it locally, many IT decision-makers approach the move to Office 365 as a major enterprise technology migration. As a result, they often defer implementation until they believe they have the wherewithal to switch all users over in one fell swoop Learn More

Peruse our library of free digital magazines!
Choose from a collection of smartly designed digital magazines, which include our most popular departments -- News Analysis, Features, Opinions and Shark Tank -- all free for download with registration. These digital magazines also feature Computerworld signature packages, including our IT Careers 2015 Special Report, with the latest on hot skills and hiring trends, and our Forecast 2015 report, with unique insights into the IT budgets, project priorities and staffing strategies of top IT leaders.

Computerworld's 2016 Premier 100 Technology Leaders: A Call for Nominations
Computerworld is seeking to honor technology professionals who have demonstrated leadership in their organizations through the use of IT and have the strategic vision to align technology with business goals. Nominations close July 31. To make a nomination, click here.

Computerworld's 2015 mobile data service satisfaction survey is underway!
Which carrier's users are the most satisfied with their mobile data service? That's what we want to find out. For the third year, Computerworld is polling readers to find out how they feel about their mobile data provider, how much they pay, how they use their mobile data connections and more. Take the survey here.

Computerworld's 2015 cloud computing survey is underway!
Computerworld is conducting a brief survey regarding cloud computing initiatives, and we would value your input. This confidential survey should take no more than 10 minutes of your time. Take the survey here.

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

Special Report: Computerworld's 100 Best Places to Work in IT for 2015
In this edition of Computerworld's July Digital Magazine: Our 22nd annual report on the top organizations across the country that offer technology pros challenging projects, robust salaries and flexible work/life options. To read the issue, click here.

Free Shark Tank T-shirt
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

Internet of Things: Get the latest news!
Our bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the Internet of Things (IoT). Subscribe now and stay up to date!

Subscribe to Computerworld Daily News
Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP.

To sign up now, click here.

Computerworld Job Board
Search multiple listings now and get new job alerts as they are posted.

Follow Computerworld

You are currently subscribed to computerworld_dailynews as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

Copyright (C) 2015 Computerworld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@computerworld.com. **

 

No comments: