Thursday, August 29, 2013

Ballmer Retiring? No Worries Here | Use 'Small Data' Better

If you have trouble viewing this email, read the online version.

Global CIO
Join the community
Facebook Twitter LinkedIn
  August 29, 2013
MUST READ
Jonathan Feldman Why Ballmer's Departure Isn't On My Worry List
Yes, our organization is heavily invested in Microsoft products, but here's why the CEO's exit won't keep me up at night.



Build Richer Customer Relationships Using 'Small Data'
Treat your customers like people, not marketing segments. The key: pay attention to tweets, Facebook posts and other data that can help personalize the relationship.

6 Ways To Develop Internal IT Talent
You may have no one to blame but yourself for that supposed IT skills shortage. Even SMBs can find low-cost training options.

Big Data Profile: Michael Rappa, Institute For Advanced Analytics
Creator of the nation's first master of science in analytics degree, Michael Rappa foresaw today's overwhelming need for data scientists.

Taxing The Cloud Brings Practical Challenges
You buy a server, you pay tax once. You buy AWS capacity, you may pay over and over. Should taxes be the latest decision point in the in-house vs. cloud conversation?

Social Business Demands Working Out Loud
Encourage employees to narrate their work as part of doing their work.

Big Data Planning: Start Slow, Let It Grow
Don't begin with an end in mind. Allow yourself to be surprised by what big data reveals.


 
FEATURED REPORTS and FEATURED WHITEPAPERS
  • Choosing and Implementing An Enterprise Database Encryption Strategy

    Unless there is absolutely nothing of value in your organization's databases, you should be implementing data encryption. This Dark Reading report examines the different options available, as well as alternatives for those situations when encryption is not an option.

  • Strategy: How Cybercriminals Operate

    Knowing your enemy is the first step in guarding against him. In this Dark Reading report, we examine the world of cybercriminals — including their motives, resources and processes — and recommend what enterprises should do to keep their data and computing ...

MORE REPORTS
spacer spacer spacer
  • Mobile Security Guide

    As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the users' confidential personal and financial information. In this Mobile Security Guide, we will walk you through the mobile malware ...

  • Security Configuration Management: Getting Back To IT Security Basics

    In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they're an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects ...

MORE WHITEPAPERS
 
MOST POPULAR NEWS
Google Slashes Price On Nexus 4 Smartphone
Google shaves smartphone price by $100, also expands availability of Nexus 7 tablet to U.K.

10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

Facebook Reveals Government Requests For User Data
Facebook says the U.S. topped the list, making about half the total requests.

Big Data Analytics Master's Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

NY Times Caught In Syrian Hacker Attack
Hacks amount to "warning shots," threatening more widespread cyberattacks should the U.S. and allies launch military campaign against Syria, warns security expert.

MORE NEWS  
 
WEBCASTS
  • Vulnerability Management Challenges and Best Practices Revealed

    During this webinar, IBM Security Systems will discuss the issues and obstacles many encounter as they attempt to identify and prioritize security risks and exploitable vulnerabilities. They will also share details on the newest member of the QRadar Security Intelligence ...

 


This e-mail was sent to sojo.blo@gmail.com

Global CIO
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments:

Post a Comment