Tech Newsletters
Sunday, 6 October 2013
Monday, 30 September 2013
Microsoft buys used iPhones in latest attempt to get consumers to switch to Windows
Preston Gralla: Incroyable! Windows Phone rockets to double-digit share in European markets | Microsoft to pay execs who stay, pay those culled during reorg turmoil | |||||||||
Computerworld Microsoft | |||||||||
![]() | Microsoft buys used iPhones in latest attempt to get consumers to switch to Windows WHITE PAPER: SonicWALL Amerijet Case Study Technology may have made the world smaller, but it's still a big place. When commercial and personal shippers need to move cargo quickly and reliably they often turn to Amerijet International. Learn how Amerijet can get planes in the air faster and meet more customs cutoff times for freight clearance with their new Dell infrastructure. Read now! In this Issue
WHITE PAPER: Dell and Intel® SQL Server VRTX Deployment Guide When considering a highly available solution for database needs, the Dell PowerEdge VRTX provides small businesses and remote offices a combination of servers, networking, and storage that can save IT administrators significant configuration and management time. Read now! Preston Gralla: Incroyable! Windows Phone rockets to double-digit share in European markets Microsoft to pay execs who stay, pay those culled during reorg turmoil Preston Gralla: Is it time for Bill Gates to retire as Microsoft chairman? Microsoft's Surface to be under revenue microscope WEBCAST: VCE Converged Infrastructure: The CIO's Next ICT Advantage Is your Datacenter Draining your Time and Energy? Is IT and business aligned at your organization? Three experts share their insights regarding Converged Infrastructure for Datacenters. Their key findings are based on IDC research. Learn More. Windows touchscreen laptops, Chromebooks save back-to-school Microsoft wants to scan your JavaScript libraries Microsoft gets 37,000 requests for user data in first half of year Microsoft vows greater financial transparency | ![]() | |||||||
In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up. This free, 28-page magazine-style report is available now [Registration required] To read the report, click here. KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE + CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL NEW COMPUTERWORLD JOB BOARD | |||||||||
Get more IT peer perspective online: You are currently subscribed to computerworld_microsoft as buzzhairs.tech@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Computerworld, please send an e-mail to online@computerworld.com. Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. ** |

Microsoft wants to scan your JavaScript libraries
Enterprises like making Android apps; losing interest in Windows | Two startups, cleaning up email and JavaScript | |||||||||
Computerworld Application/Web Development | |||||||||
![]() | Microsoft wants to scan your JavaScript libraries WHITE PAPER: Nexsan Technologies The Five Forces Advancing Archive Center Stage Big Data isn't over yet. How will you handle the ever-increasing amount of digital information? It's time to reconsider why archive may be the game-changing – and budget-saving – way to manage and secure your growing data. Storage analyst Jerome Wendt explains why it's time to rethink archive. Read now! In this Issue WHITE PAPER: Crittercism Getting Agnostic about Mobile Devices Businesses pay an increasingly high price when it comes to mobile app failure. This paper offers proactive steps to: - Accurately measure an app's performance – downloads don't cut it - Design, develop and test for mobile app performance - Deploy preventive maintenance to reduce failure - Calculate the cost of mobile app failure Read more! Enterprises like making Android apps; losing interest in Windows WEBCAST: Dell VMware Data Protection Strategies to Make Government More Efficient This KnowledgeVault focuses on some of the key data protection challenges that today's enterprises must tackle. Specifically, the three videos in this series will explore the dramatic impact that unprecedented data growth and other developments have had on the data center View Now Two startups, cleaning up email and JavaScript | ![]() | |||||||
In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up. This free, 28-page magazine-style report is available now [Registration required] To read the report, click here. KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE + CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL NEW COMPUTERWORLD JOB BOARD | |||||||||
Get more IT peer perspective online: You are currently subscribed to computerworld_web_app_dev as buzzhairs.tech@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Computerworld, please send an e-mail to online@computerworld.com. Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. ** |

Apple beats Coca-Cola to emerge as most valuable global brand
After a week, iOS 7 runs more than half of Apple's mobile devices | iOS 7 security update patches lockscreen flaw | |||||||||
Computerworld Operating Systems | |||||||||
![]() | Apple beats Coca-Cola to emerge as most valuable global brand WEBCAST: Dell VMware Data Protection Strategies to Make Government More Efficient This KnowledgeVault focuses on some of the key data protection challenges that today's enterprises must tackle. Specifically, the three videos in this series will explore the dramatic impact that unprecedented data growth and other developments have had on the data center View Now In this Issue
WHITE PAPER: Mimecast North America Inc SaaS with a Face Learn how a carefully targeted SaaS approach can add value to your email environment and potentially result in better services within a much reduced cost structure. Learn More. After a week, iOS 7 runs more than half of Apple's mobile devices iOS 7 security update patches lockscreen flaw JR Raphael: How to switch back to Chrome's old 'New Tab' page Apple should be forced to conform to a standard charger, say EU politicians Touch and type: 3 keyboard covers for the iPad Mini WHITE PAPER: HP Six Keys to Delivering User-Driven Mobile Applications Meeting the needs for the enterprise user poses particular challenges. Apps must work seamlessly across devices and screen sizes, enabling real-time collaboration, without sacrificing data security. This balance requires a mobile app development platform built for the unique demands of the enterprise. Learn More BlackBerry responds to Gartner's call for clients to ditch BB products iPhone 6 rumor rollup for the week ending Sept. 27 Tizen mobile OS could reach printers, cameras, smart TVs Gmail hit by message delivery delays, close to 50% of users affected Why RMS Built Its Cloud Environment in Iceland | ![]() | |||||||
In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up. This free, 28-page magazine-style report is available now [Registration required] To read the report, click here. KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE + CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL NEW COMPUTERWORLD JOB BOARD | |||||||||
Get more IT peer perspective online: You are currently subscribed to computerworld_operating_systems as buzzhairs.tech@blogger.com. Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy To contact Computerworld, please send an e-mail to online@computerworld.com. Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701 ** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. ** |

The Result of High Density without Power Efficiency
|
|

The Microsoft Visionary Cloud: How We Got Here
View on Mobile Phone | View as Web page |
|
Contact Us
About the commentary -- letters@windowsitpro.com
About technical questions -- forums.windowsitpro.com
About product news -- products@windowsitpro.com
You are subscribed as: buzzhairs.tech@blogger.com. To unsubscribe, click here.