Computerworld

IDG’s Top Enterprise Stories

February 22, 2019

Image: 7 mobile security threats you should take seriously in 2019

7 mobile security threats you should take seriously in 2019

Mobile malware? Some mobile security threats are more pressing. Every enterprise should have its eye on these seven issues this year. Read more ▶

Your Must-Read Stories

•

How to identify shell builtins, aliases and executable files on Linux systems

•

Asana vs. Mavenlink vs. Wrike: Project management platforms compared

•

Containers: The pros and cons you may not know about

•

Windows 10 Redstone: A guide to the Insider Preview builds

•

Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users

•

Power over Wi-Fi: The end of IoT-sensor batteries?

•

Samsung Galaxy Fold: Innovation infatuation

White Paper: Zapproved, Inc

How to Guide: Establishing Process

In Start Here: A How-to Guide to Establishing an Ediscovery Process, we’ve given stage-by-stage advice about how to achieve real, measurable improvements in your ediscovery. We cover every step from legal holds to post-matter resolution, complete with best practices and a helpful checklist for reference. In short, this practical guide can help you create and implement an effective, modern ediscovery process. Read more ▶

Image: How to identify shell builtins, aliases and executable files on Linux systems

How to identify shell builtins, aliases and executable files on Linux systems

Learn what a shell "builtin" on a Linux system is, as well as what commands identify builtins and allow you to retrieve useful information about your working environment. and how to determine if a command is one or if s Let's look at a group of commands that allow you to recognize builtins and understand exactly what they are -- along with other command types. Read more ▶

Image: HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

FROM OUR BUSINESS PARTNERS

HP's President's Day Sale Continues With up to 56% off Select Products - Deal Alert

For the next few days, HP's online store is offering some steep discounts on laptops, desktops, printers and other products you might have had your eye on. Read more ▶

Asana vs. Mavenlink vs. Wrike: Project management platforms compared

Asana, Mavenlink, and Wrike offer world-class work management, but how do you know which one is best suited for your company? Here are the highlights, pros, and cons of each platform. Read more ▶

 
 
Image: Containers: The pros and cons you may not know about

Containers: The pros and cons you may not know about

“We are using containers” is the battle cry of enterprises looking to get to the ultimate in performance, scalability, and portability—but you don’t always get what you expect Read more ▶

Image: Windows 10 Redstone: A guide to the Insider Preview builds

Windows 10 Redstone: A guide to the Insider Preview builds

Get the latest info on new builds of Windows 10 19H1 as they roll out from Microsoft. Now updated for Insider Preview Build 18342, released on Feb. 20, 2019. Read more ▶

Image: Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users

Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users

Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR. Read more ▶

Image: Power over Wi-Fi: The end of IoT-sensor batteries?

Power over Wi-Fi: The end of IoT-sensor batteries?

New materials and techniques for collecting power from radio waves could spur mass battery-free Internet of Things (IoT) sensors. Read more ▶

Image: Samsung Galaxy Fold: Innovation infatuation

Samsung Galaxy Fold: Innovation infatuation

Technological innovation is incredible — but when it comes to an actual purchasable product, there has to be a reason for the innovation to exist. Read more ▶

eBook: Numerify

Visibility to Drive Digital Transformation

What exactly is a System of Intelligence for IT? Powered by Machine Learning algorithms, built on modern big-data platforms, and leveraging data from all IT systems, a System of Intelligence delivers the insights needed to drive innovation and efficiencies across an organization. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.