Computerworld

IDG’s Top Enterprise Stories

December 19, 2019

Image: How do you back up containerized apps?

How do you back up containerized apps?

Containers have transformed enterprise applications. Now backup systems need to catch up Read more ▶

Your Must-Read Stories

•

4 steps to process automation success

•

Goals for CIOs in 2020 and beyond

•

Atlassian unveils Forge, its serverless app development platform

•

How to tell if you’re using a bash builtin in Linux

•

4 industries to watch for AI disruption

•

Cisco: 5 hot networking trends for 2020

•

Data center operators not keen on green: survey

White Paper: Adobe Systems Inc.

Adobe Sign Technical Overview

This paper provides a high-level overview of Adobe Sign architecture, security, compliance, identity management, document handling, network protection, performance monitoring, service management, governance and other key technical topics. Read more ▶

Image: 4 steps to process automation success

4 steps to process automation success

For Navistar CIO Julie Ragland, shifting the IT discussion from cost to value was key to overcoming obstacles to process automation. Read more ▶

Image: Learn how to be an ethical hacker with this $39 in-depth training bundle

DEALPOST

Learn how to be an ethical hacker with this $39 in-depth training bundle

The A to Z Cyber Security & IT Certification Training Bundle contains 12 courses on how to pinpoint vulnerabilities in network systems and suggest ways to improve. Read more ▶

Image: Goals for CIOs in 2020 and beyond

Goals for CIOs in 2020 and beyond

With the decade change upon us, one question should be on every CIO’s mind: How will this role change in the next 10 years? Read more ▶

 
 
Image: Atlassian unveils Forge, its serverless app development platform

Atlassian unveils Forge, its serverless app development platform

Forge is built with Amazon Web Service’s Lambda function as a cloud-based service platform, allowing developers to build and deploy their own apps for Atlassian products. Read more ▶

Image: How to tell if you’re using a bash builtin in Linux

How to tell if you’re using a bash builtin in Linux

A built-in is a Linux command that's part of whatever shell you're using. Can you tell what commands are built-ins and which are not? Read more ▶

Image: 4 industries to watch for AI disruption

4 industries to watch for AI disruption

In 2020 we will see the continued impact of AI and machine learning in new industries that will not only help to support businesses, but also consumers. Read more ▶

Image: Cisco: 5 hot networking trends for 2020

Cisco: 5 hot networking trends for 2020

Cisco exec says SD-WAN, Wi-Fi 6, multi-domain control, virtual networking and the evolving role of network engineers will be big in 2020 Read more ▶

Image: Data center operators not keen on green: survey

Data center operators not keen on green: survey

Most IT leaders making data center equipment purchases don't prioritize energy efficiency or environmental impact. Read more ▶

White Paper: Akamai Technologies Inc

5 Reasons Enterprises Need a New Application Access Model

The average cost of a breach is $3.86 million. With so much at stake, why do so many enterprises grant access based on an outdated model of assumed trust? And why do businesses rely on antiquated access technologies such as traditional VPNs and remote proxies to provide this application access? Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as [email protected].
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to [email protected].
© 2019 | Computerworld | 492 Old Connecticut Path | Framingham, MA 01701 | www.computerworld.com