Computerworld

IDG’s Top Enterprise Stories

September 11, 2019

Image: Playbook for stockpiling AI talent: Buy, borrow, build

Playbook for stockpiling AI talent: Buy, borrow, build

Hiring, upskilling, and strategic partnerships are the cornerstones for assembling talent in data science and AI. CIOs would do well to employ all three approaches. Read more ▶

Your Must-Read Stories

•

'Cloud only' policies are as bad as 'no cloud' ones

•

Q&A: How one college embraced UEM to manage endpoints at five campuses

•

Cloud security: Inside the shared responsibility model

•

How to use Terminator on Linux to run multiple terminals in one window

•

2fa explained: How to enable it and how it works

•

Health insurer shifts ERP to the cloud to transform financial operations

•

Work begins on Java 14

eBook: Zscaler

Office 365 Deployment Survey - How do you measure with your peers?

The top reason enterprises are migrating to Office 365 is to attempt to reduce the complexity of their IT environment. Ultimately, Office 365 is intended to accelerate and support collaboration to foster innovation and competitiveness—this is what companies are craving, but they need the right infrastructure to deliver on that promise. Read more ▶

Image: 'Cloud only' policies are as bad as 'no cloud' ones

'Cloud only' policies are as bad as 'no cloud' ones

IT tends to shift from one extreme to the other. Emerging technologies can be beneficial, but across-the-board restrictions can result in bad platform decisions Read more ▶

Image: Lemonade is changing the way we insure our homes

DEALPOST

Lemonade is changing the way we insure our homes

Read more ▶

Image: Q&A: How one college embraced UEM to manage endpoints at five campuses

Q&A: How one college embraced UEM to manage endpoints at five campuses

Truckee Meadows Community College has more than 3,000 desktops, tablets and IoT devices that it manages through a single interface. But the journey to unified endpoint management wasn't simple – and it came with a few surprises. Read more ▶

 
 
Image: Cloud security: Inside the shared responsibility model

Cloud security: Inside the shared responsibility model

The Capital One security fiasco has underlined that securing the cloud is both a complicated technology and contractual problem. Read more ▶

Image: How to use Terminator on Linux to run multiple terminals in one window

How to use Terminator on Linux to run multiple terminals in one window

Providing an option for multiple GNOME terminals within a single window frame, terminator lets you flexibly align your workspace to suit your needs. Read more ▶

Image: 2fa explained: How to enable it and how it works

2fa explained: How to enable it and how it works

Two-factor authentication (2fa) is a method of establishing access to an online account or computer system that requires the user to provide two different types of information. It can boost security for anyone using any kind of online service. Read more ▶

Image: Health insurer shifts ERP to the cloud to transform financial operations

Health insurer shifts ERP to the cloud to transform financial operations

Blue Cross Blue Shield of Michigan is reducing legacy complexity by migrating to cloud-based ERP, while experimenting with RPA to help prepare staff for the changes ahead.  Read more ▶

Image: Work begins on Java 14

Work begins on Java 14

An upgrade to file mapping byte buffers to support non-volatile memory is targeted for the next version of standard Java due in 2020 Read more ▶

Miscellaneous: FireEye

The SIEM That Cried Wolf

Check out this infographic and learn how to enhance your SIEM and move from alert to fix faster. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as [email protected].
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to [email protected].