Computerworld

IDG Insider Alert

March 12, 2020

Image: Containers on the desktop? You bet — on Windows 10X

Containers on the desktop? You bet — on Windows 10X

Microsoft has invented a new kind of container for its dual-screen Windows 10X operating system, mainly to enable legacy Windows apps to run. The implications for Windows’ future might be big. Read more ▶

Your Must-Read Stories

•

5 reasons you need a business relationship manager

•

Making the case for hardware 2FA in the enterprise

•

How to prevent attackers from using Windows against you

•

CIOs take different paths to cultivating culture

•

Q&A: How Baptist Health saved $13M using AI to reduce readmissions

•

The 9 most difficult IT hires today

•

At Port of Seattle, machine learning streamlines air cargo operations

•

Mercy turns to analytics to improve implant outcomes

Miscellaneous: Silver Peak Systems Inc

Magic Quadrant for WAN Edge Infrastructure

Silver Peak Named a Leader for Second Year in Gartner's 2019 Magic Quadrant for WAN Edge Infrastructure. Read more ▶

Image: 5 reasons you need a business relationship manager

5 reasons you need a business relationship manager

To better liaison with the business and bolster IT’s strategic cred, CIOs are increasingly turning to BRMs. Here’s how to locate the right talent and make the most of this hybrid leadership role. Read more ▶

Image: Prepare to earn CISA, CISM, and CISSP certs for just $50

DEALPOST

Prepare to earn CISA, CISM, and CISSP certs for just $50

Study from the comfort of home and become a network security pro on your own time Read more ▶

Image: Making the case for hardware 2FA in the enterprise

Making the case for hardware 2FA in the enterprise

Hardware 2FA tokens are the best and cheapest defense against phishing and credential stuffing attacks, but there are some gotchas. Read more ▶

 
 
Image: How to prevent attackers from using Windows against you

How to prevent attackers from using Windows against you

Attackers use standard Microsoft components such as DLLs or PowerShell to avoid detection. These tips will make such "living off the land" attacks harder to execute. Read more ▶

Image: CIOs take different paths to cultivating culture

CIOs take different paths to cultivating culture

CIOs have a tough call to make when joining an organization: Change the culture or build on the work of their predecessors? Here IT leaders and consultants share their experiences. Read more ▶

Image: Q&A: How Baptist Health saved $13M using AI to reduce readmissions

Q&A: How Baptist Health saved $13M using AI to reduce readmissions

The largest hospital group in Montgomery, Ala. deployed artificial intelligence with its EHR system; the information gleaned has helped cut unnecessary admissions by 18% over the past two years. Read more ▶

Image: The 9 most difficult IT hires today

The 9 most difficult IT hires today

The IT talent gap is driving up demand for skilled IT pros, but for certain roles and skillsets, finding — and signing — the right candidate can feel a bit like trying to capture a unicorn. Read more ▶

Image: At Port of Seattle, machine learning streamlines air cargo operations

At Port of Seattle, machine learning streamlines air cargo operations

The government agency's air cargo team at Seattle-Tacoma International Airport is using artificial intelligence and computer vision for object detection and cataloging to improve operational efficiency. Read more ▶

Image: Mercy turns to analytics to improve implant outcomes

Mercy turns to analytics to improve implant outcomes

Mercy Technology Services is using NLP technologies and an in-memory database to extract and analyze data from doctors’ notes in near real-time. Read more ▶

Video/Webcast: Expanse

Know Your Cloud Footprint with Expanse

As more organizations adopt the cloud in a variety of different forms, risk of uncontrolled spending and security exposures increases astronomically. Issues like shadow IT and orphaned cloud services are new and unique, making it challenging for IT and security professionals to address without proven technology and processes. Existing IT management tools have not evolved sufficiently to provide even the most fundamental component, a system of record of an organization's cloud assets. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG Insider as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.
© 2020 | Computerworld | 492 Old Connecticut Path | Framingham, MA 01701 | www.computerworld.com