Wednesday, December 24, 2014

In 2015, EU aims to sweep away old rules on data protection and copyright

In 2015, EU aims to sweep away old rules on data protection and copyright | 10 cool marketing automation startups to watch

ITworld Big Data and Analytics Strategies

Google Plus LinkedIn Facebook Twitter


LAST CHANCE: Enter to win a copy of "Ubuntu Unleashed 2015 Edition"
We've got 5 copies to give to some lucky readers. Enter the drawing now! Read More


WHITE PAPER: CDW

Complacent About Compliance
The specter of compliance haunts everyone. It spans everything from governmental regulations, industry mandates, or service level agreements between partners. Companies must not only comply, they must also prove that they complied. View Now

WHITE PAPER: F5 Networks

Need to Replace MS Threat Management Gateway?
Read this article to learn how F5's Secure Web Gateway solution provides a full set of features that can help you successfully migrate from TMG, secure your outbound web traffic, and protect your data and network. Learn more >>

In 2015, EU aims to sweep away old rules on data protection and copyright
The European Commission is gearing up to solve some longstanding problems with outdated copyright and data protection laws and move ahead on new rules for roaming charges and net neutrality.During the past week, the Commission made public its work agenda for 2015, and high on the list is the ongoing effort to break down national barriers to create what it calls a digital single market.While there are many policy issues involved in building such a market, the Commission will focus on areas where it can make "a real and tangible difference to people's lives" by acting on a European, rather than a national, basis, said Andrus Ansip, Commission vice president responsible for the digital single market, in a blog post.To read this article in full or to leave a comment, please click here Read More

10 cool marketing automation startups to watch
Marketing automation can help can help businesses better target prospects, find and test new products and services. These 10 startups can help businesses plug gaps in their marketing strategy and offer solutions to problems companies might not even know they have. Read More

IDG Contributor Network: Why organizations fail to create value from analytics, part 1
Many companies are striving to expand their data analysis initiatives, but struggle to understand how to create economic value from analytics Read More

IBM detects skin cancer more quickly with visual machine learning
Cognitive computing could improve the ability to spot melanoma early on Read More


WHITE PAPER: HP

Know the Big Three
The rapid transformation of mobile computing has seen security concerns outpaced by the ease of use, flexibility, and productivity of mobile devices. Here we take a look at three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk. Learn More

Advances in electrical and computer engineering are transforming everything [INFOGRAPHIC]
This infographic by Ohio University's Russ College of Engineering and Technology explores just a few of the electrical and computer engineering advances that promise to improve quality of life around the globe. Read More

Three ways enterprise software is changing
Once upon a time, life in the enterprise IT shop was fairly simple, at least conceptually speaking.IT issued computers and laptops to employees, and maintained enterprise software, databases and servers that supported the company, which were mostly run in-house.These days, IT's basic firmament is giving way to a more breathtaking geography that the IT pro must traverse, based on pay-as-you-go cloud computing, building applications and performing deep data analysis. Perhaps more fundamentally, IT operations are moving from merely supporting the business to driving the business itself, which requires agility and making the most of resources.To read this article in full or to leave a comment, please click here Read More

Worst security breaches of the year 2014: Sony tops the list
As 2014 winds down, the breach of Sony Pictures Entertainment is clearly the biggest data breach of the year and among the most devastating to any corporation ever.Attackers broke in and took whatever they wanted, exfiltrating gigabytes and gigabytes of documents, emails and even entire movies, apparently at will for months and months on end.+ Also on Network World: The weirdest, wackiest and coolest sci/tech stories of 2014 | Peeping into 73,000 unsecured security cameras thanks to default passwords +To read this article in full or to leave a comment, please click here Read More

How predictive analytics can help set perfect hotel room prices
By mashing together years of data from a multitude of sources, startup Duetto is helping hotels optimize their room pricing. And in this tight-margin world, a small increase in revenue per available room makes a big difference in profitability. Read More


BECOME AN ITWORLD INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 7 tips for landing a job at a coding competition

- Data analytics scores marketing wins for the Texas Rangers

- Getting started with power-line networking

DECEMBER GIVEAWAYS

We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Advanced Android Application Development, 4th Edition
This guide provides in-depth explanations of code using key API features and includes downloadable sample apps for nearly every chapter. Together, they provide a solid foundation for any modern app project. Enter now!

Ubuntu Unleashed 2015 Edition: Covering 14.10 and 15.04, 10th Edition
Learn all you need to know about installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more — including intermediate-to-advanced techniques you won't find in any other book. Enter now!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_bi as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.