Computerworld

IDG’s Top Enterprise Stories

November 22, 2019

Image: Your personal advisory board: The secret to a great career

Your personal advisory board: The secret to a great career

A personal advisory board can advise, counsel and champion you through all stages of your IT career. Here’s how to create your own. Read more ▶

Your Must-Read Stories

•

How to use the bmon command: 2-Minute Linux Tips

•

How human-centered design is driving digital health

•

Sourcetrail code navigator now free open source

•

What is phishing? How this cyber attack works and how to prevent it

•

Blackberry refreshes its UEM suite, focuses on zero-trust access

•

Extreme targets data center automation with software, switches

•

Mysterious app keeps you from shutting down — or does it?

White Paper: Belatrix Software Factory

Belatrix and Kernel Collaborate to Bring Real-Time Insights to Pharma

The biopharmaceutical (pharma) industry is undergoing major transformation. Read more ▶

Image: How to use the bmon command: 2-Minute Linux Tips

How to use the bmon command: 2-Minute Linux Tips

In this Linux tip, learn how to use the bmon command. It’s a graphical tool for looking at network bandwidth. Read more ▶

Image: Learn the basics of electrical engineering for only $25 today.

DEALPOST

Learn the basics of electrical engineering for only $25 today.

This collection features 5 courses on electrical engineering fundamentals such as circuits, substations, and machines. Read more ▶

Image: How human-centered design is driving digital health

How human-centered design is driving digital health

Healthcare tech has mostly focused on designing systems for claiming federal incentives in the past decade. Design thinking stands this logic on its head. Read more ▶

 
 
Image: Sourcetrail code navigator now free open source

Sourcetrail code navigator now free open source

Sourcetrail indexes source files to create a dependency graph, giving developers a graphical overview of their code Read more ▶

Image: What is phishing? How this cyber attack works and how to prevent it

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack. Read more ▶

Image: Blackberry refreshes its UEM suite, focuses on zero-trust access

Blackberry refreshes its UEM suite, focuses on zero-trust access

BlackBerry's latest version of its flagship Enterprise Mobility Suite is aimed at enabling management of all devices and apps across all vendor platforms. Read more ▶

Image: Extreme targets data center automation with software, switches

Extreme targets data center automation with software, switches

Extreme Networks software and switches are trying to bring simplicity to complex data center fabric management Read more ▶

Image: Mysterious app keeps you from shutting down — or does it?

Mysterious app keeps you from shutting down — or does it?

Some people are finding that Windows shutdown is blocked by a running program called G. Except there is no G, no G.exe, nothing even resembling G. In spite of what you’ve read, it isn’t a virus or other malware. It’s a bug — in Windows. Read more ▶

Case Study: PerimeterX

Case Study "Avenue Stores"

Account takeover attacks are on the rise and result in billions of losses annually. Check out this case study to learn how Avenue Stores detected and addressed ATO attacks on Avenue.com. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider Pro
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.