Computerworld

IDG’s Top Enterprise Stories

June 04, 2020

Image: IT skills to master for a better post-pandemic job

IT skills to master for a better post-pandemic job

Network pros can be learning new skills during the pandemic to support shifting IT priorities. Read more ▶

Your Must-Read Stories

•

10 reasons why digital transformations fail

•

The ultimate guide to privacy on Android

•

C and Rust programming languages continue to rise

•

An Essential Primer for the Journey to Cloud in the Post-COVID World

•

Cisco warns of Nexus switch security weakness

•

Video: Why attackers can still exploit a MS Office vulnerability patched in 2012

•

9 lies IT managers tell themselves

Image: 10 reasons why digital transformations fail

10 reasons why digital transformations fail

Culture shock, competing priorities, resistance to change and talent deficits — if you’ve encountered any of the following issues, you may want to re-evaluate your digital transformation. Read more ▶

Image: The Zebra lets you compare car insurance rates without hassle or commitment

DEALPOST

The Zebra lets you compare car insurance rates without hassle or commitment

Read more ▶

Image: The ultimate guide to privacy on Android

The ultimate guide to privacy on Android

Take back control and decide exactly how information is used on your Android phone. Read more ▶

 
 
Image: C and Rust programming languages continue to rise

C and Rust programming languages continue to rise

C language tops Tiobe’s index of language popularity for a second month, while Rust cracks the top 20 for the first time Read more ▶

Image: An Essential Primer for the Journey to Cloud in the Post-COVID World

An Essential Primer for the Journey to Cloud in the Post-COVID World

Challenges posed by the COVID-19 pandemic have lit a fire under decision makers to speed up their cloud journey. Read more ▶

Image: Cisco warns of Nexus switch security weakness

Cisco warns of Nexus switch security weakness

Cisco Nexus NX-OS software could be exploited to create a DOS attack. Read more ▶

Video: Why attackers can still exploit a MS Office vulnerability patched in 2012

Attackers still commonly use a vulnerability in older versions of Microsoft Office because many organizations left it unpatched. Did yours? Read more ▶

Image: 9 lies IT managers tell themselves

9 lies IT managers tell themselves

You’ve got it all covered: security, budget, stakeholders’ needs. Or do you? These common self-deceptions can come back to haunt your IT initiatives — and your career. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as [email protected].
Learn more about
Insider Pro
Please do not reply to this message.
To contact someone directly, send an email to [email protected].
© 2020 | Computerworld | 492 Old Connecticut Path | Framingham, MA 01701 | www.computerworld.com