The true Apple revolution: Selling products, not customer data.

June's Patch Tuesday includes IE update, 18 nonsecurity patches.

InfoWorld Daily: Afternoon Edition
June 10, 2015
featured image

A bad manager's tricks: Mind games and manipulation

A control freak reigns over employees by withholding valuable information and making ridiculous demands. READ MORE

Twitter Facebook LinkedIn
 

Issue highlights

1. The true Apple revolution: Selling products, not customer data

2. June's Patch Tuesday includes IE update, 18 nonsecurity patches

3. Video: The top 3 reveals of WWDC 2015

Webcast: IBM Corporation

Privacy By Design

IBM has worked with many enterprise and global organizations to understand their unique needs to secure and protect their big data environments. These organizations are employing a risk-based strategy to their projects. Hear more about the key steps and approach to take to understanding the risks and then covering the potential exposure. Learn More

The true Apple revolution: Selling products, not customer data

Read between the lines for the biggest takeaway from WWDC: Apple's stance on data mining. READ MORE

June's Patch Tuesday includes IE update, 18 nonsecurity patches

Microsoft's latest batch of updates raise new questions about returning patch KB 2952664 and missing patch MS15-058. READ MORE

Video: The top 3 reveals of WWDC 2015

This year's WWDC didn't have much new hardware, but it provides clues to Apple's next direction. READ MORE

White Paper: Open Text

ArcelorMittal: Deploying a Seamless Global B2B Network

ArcelorMittal ranks as today's only truly global steelmaker. Its Europe Flat Products division embarked on an initiative to migrate from a plethora of point-to-point connections with individual trading partners to a single, seamless B2B network solution. View Now.

GET THE DEEP TECHNOLOGY INSIGHTS YOU NEED

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO, Network World, CSO, ITworld, and other IDG Enterprise publications.

Sign up at no cost today!

Join the IDG Contributor Network

The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.

Follow InfoWorld

Twitter Facebook LinkedIn Google+

You are currently subscribed to infoworld_daily as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@infoworld.com

Copyright © 2015 InfoWorld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@infoworld.com. **