Thursday, August 29, 2013

Ballmer Retiring? No Worries Here | Use 'Small Data' Better

If you have trouble viewing this email, read the online version.

Global CIO
Join the community
Facebook Twitter LinkedIn
  August 29, 2013
MUST READ
Jonathan Feldman Why Ballmer's Departure Isn't On My Worry List
Yes, our organization is heavily invested in Microsoft products, but here's why the CEO's exit won't keep me up at night.



Build Richer Customer Relationships Using 'Small Data'
Treat your customers like people, not marketing segments. The key: pay attention to tweets, Facebook posts and other data that can help personalize the relationship.

6 Ways To Develop Internal IT Talent
You may have no one to blame but yourself for that supposed IT skills shortage. Even SMBs can find low-cost training options.

Big Data Profile: Michael Rappa, Institute For Advanced Analytics
Creator of the nation's first master of science in analytics degree, Michael Rappa foresaw today's overwhelming need for data scientists.

Taxing The Cloud Brings Practical Challenges
You buy a server, you pay tax once. You buy AWS capacity, you may pay over and over. Should taxes be the latest decision point in the in-house vs. cloud conversation?

Social Business Demands Working Out Loud
Encourage employees to narrate their work as part of doing their work.

Big Data Planning: Start Slow, Let It Grow
Don't begin with an end in mind. Allow yourself to be surprised by what big data reveals.


 
FEATURED REPORTS and FEATURED WHITEPAPERS
  • Choosing and Implementing An Enterprise Database Encryption Strategy

    Unless there is absolutely nothing of value in your organization's databases, you should be implementing data encryption. This Dark Reading report examines the different options available, as well as alternatives for those situations when encryption is not an option.

  • Strategy: How Cybercriminals Operate

    Knowing your enemy is the first step in guarding against him. In this Dark Reading report, we examine the world of cybercriminals — including their motives, resources and processes — and recommend what enterprises should do to keep their data and computing ...

MORE REPORTS
spacer spacer spacer
  • Mobile Security Guide

    As mobile devices become more common, cybercriminals see them as having huge profit potential, and aim to gain access to the users' confidential personal and financial information. In this Mobile Security Guide, we will walk you through the mobile malware ...

  • Security Configuration Management: Getting Back To IT Security Basics

    In IT security, obvious weaknesses like weak configurations often get overlooked. Yet for hackers, they're an open door into networks and systems. Learn how security configuration management (SCM), a critical security control, hardens configurations to prevent breaches, and immediately detects ...

MORE WHITEPAPERS
 
MOST POPULAR NEWS
Google Slashes Price On Nexus 4 Smartphone
Google shaves smartphone price by $100, also expands availability of Nexus 7 tablet to U.K.

10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

Facebook Reveals Government Requests For User Data
Facebook says the U.S. topped the list, making about half the total requests.

Big Data Analytics Master's Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

NY Times Caught In Syrian Hacker Attack
Hacks amount to "warning shots," threatening more widespread cyberattacks should the U.S. and allies launch military campaign against Syria, warns security expert.

MORE NEWS  
 
WEBCASTS
  • Vulnerability Management Challenges and Best Practices Revealed

    During this webinar, IBM Security Systems will discuss the issues and obstacles many encounter as they attempt to identify and prioritize security risks and exploitable vulnerabilities. They will also share details on the newest member of the QRadar Security Intelligence ...

 


This e-mail was sent to sojo.blo@gmail.com

Global CIO
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Win an IPad Mini with Timespoints

www.timespoints.com

Congratulations to the Top Ten Users

Fastest Finger Weekly Leaderboard


Mahesh

Anshuman

JCMI

Zeyaalam

N A V I G Vies

Subhabrata

Gurujeet

Gummadi

Krishan

Ashok


Dear Member,

The Fastest Finger contest is especially designed for active users like you. To participate in the contest do exactly what you are doing till now but at the Speed of Light!

  • Write reviews, read & share articles, post & moderate comments, subscribe newsletters on Timesofindia.com, Economictimes.com and Navbharattimes.com

  • The top ten users with the maximum contributions in a week will be featured on the Fastest Finger leaderboard.

  • The largest contributor from the elite Fastest Finger Club will win an IPAD Mini at the end of the month.


So what are you waiting for? Start Clicking that Mouse now!

Times of India Navbharat Times Economic Times

Cheers,
Times Points Team


Times Internet Limited , "I World" Tower, DLF City Phase 5, DLF Golf Course Road ,Gurgaon (Haryana)
Please do not reply directly to this e-mail. This e-mail was sent from a notification-only address that cannot accept incoming e-mail. To unsubscribe from this mailer, click here
© 2013 Times Internet Limited. All rights reserved. Terms of Use | Privacy Policy