Wednesday, 15 June 2016

Twitter's future glory: One of the most valuable data sources in history

Top tech stories now available. See what’s trending today.
Subscription | Read Online Twitter Facebook Google+

Twitter's future glory: One of the most valuable data sources in human history

While Twitter is trying to decide what it wants to be when it grows up, there's one path it keeps ignoring that would best serve the public, businesses, and Twitter itself.

New at TechRepublic

Apple File System revealed at WWDC 2016, focused on encryption and SSD support

Apple WWDC 2016: The wonderful world of new developer APIs

WWDC 2016: Apple's product announcements are losing punch

Microsoft will benefit from LinkedIn's massive personal database, but privacy risks remain

VMware and SugarCRM expand partnerships with IBM, make services available on IBM Cloud

Ubuntu Touch OTA-11 brings about serious improvement to the platform

Visa is about to put a ring on it

​Is Microsoft going too far with its IoT services strategy?

Project communications: What works, and what doesn't

How to run Windows or Mac apps from your Chromebook

Featured Webcast

Live Webcast: Five ways Dell SonicWALL's Secure Mobile Access keeps mobile employees and data safe

There was a time when companies knew where their data was at all times; it was in the data center, surrounded by physical walls. But today, your data is everywhere your employees and customers are: on phones, on tablets, on laptops, in the cloud. Anywhere, anytime access allows workers more work/life balance while also making them more productive, but it also puts data security at considerable risk. Please join us for this interactive webcast, featuring Mark Hewett, Senior Product Manager of SMA at Dell Security, Steven Sanderson, Senior Product Marketing Manager of SMA at Dell Security, and CBS Interactive's Distinguished Lecturer David Gewirtz, one of America's leading cybersecurity experts to learn how to provide mobile/remote employees fast, simple access to enterprise applications, data and resources without compromising their security.

Today's recommended downloads

The Anatomy of a Cyber-Attack

(Dell Software)

The Drivers and Benefits of Edge Computing

(APC by Schneider Electric)

Stop DDoS Attacks with Advanced, Effective Protection


Bandwidth Analyzer Pack: Your ONE network monitoring and traffic analysis tool


Live Webcast: Customer Identity and Access Management Trends

(JanRain, Inc.)

Take our latest survey

Is the industry cloud the last frontier?

The industry cloud is an untapped area of cloud computing in both the tech and business worlds. Take Tech Pro Research's survey and share your thoughts on this topic, and get a free copy of the report.

Apple WWDC 2016: What you need to know

Don't miss our Apple WWDC 2016 coverage

News from the 2016 Apple Worldwide Developers Conference (WWDC), held June 13-17 in San Francisco, will be of interest to IT admins, developers, designers, and many others. Stay informed about the enterprise-related news from Apple WWDC 2016 by following our event coverage.

A special feature from TechRepublic and ZDNet

Building the Software Defined Data Center

Building a powerful back end for your business is less and less about buying big, expensive boxes. There are massive efficiencies, agility, and manageability benefits of virtualizing your data center and running it from software.

TechRepublic newsletters

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Click the newsletter title below to subscribe.


Election Tech 2016


TechRepublic Cover Stories

Connect with TechRepublic

Visit the Subscription Center to get other free newsletters, manage your account settings or to be removed from TechRepublic communications.

The e-mail address for your subscription is

Unsubscribe | Send Feedback | FAQ | Advertise | Privacy Policy

© 2016 CBS Interactive, Inc. All rights reserved.

TechRepublic is a registered service mark of CBS Interactive, Inc.


235 Second Street

San Francisco, CA 94105


No comments:

Post a Comment