If you have trouble viewing this email, read the online version. |
|
Monday, April 30, 2012 |
TOP STORY BlackBerry World: 5 Changes RIM Users Must See By Eric Zeman Research In Motion's developer and partner conference gets underway April 30. Here's what RIM needs to show everyone to silence the BlackBerry naysayers and doomspellers. MUST READ Oracle, Google Trial: Who Wins Round One? In the first phase of the case, concerning copyrights, Google's arguments have been more compelling than Oracle's, to date. Patent testimony is still to come. Samsung Steals Nokia's Mobile Crown Samsung's first quarter results put it ahead of Nokia, but research firms disagree whether it regained the smartphone lead from Apple. FTC Hires Attorney, Eyes Google Search: What's Next? Despite Google's mantra, "competition is only a click away", FTC hires lawyer to head antitrust investigation of Google's search advertising business. This pressures Google to make concessions. The Google Phone That Never Was Evidence at the Oracle v. Google trial reveals what the original Google Phone prototype looked like, before Apple's iPhone moved the goal posts. Related Android revenue information is also enlightening. Former Nokia Exec Slams Elop And Windows Phone Former Nokia senior executive says CEO has wrecked the company with his choice to adopt Windows Phone. Microsoft Preps Spotify-Like Music Service Streaming music service called "Woodstock" would replace Zune-branded services, according to published report. |
|
DOWNLOAD INFORMATIONWEEK SMB'S DIGITAL ISSUE SMBs have saved big buying software on a subscription model. Our new, all-digital issue of InformationWeek SMB shows how to determine if infrastructure services can pay off, too. ALSO THIS ISSUE: One startup's experience with infrastructure-as- a-service shows how the numbers stack up for IaaS vs. internal IT. DOWNLOAD NOW FREE (Registration Required) |
| FEATURED WHITEPAPERS Yankee Group: Mobile WAN Optimization Report Mobile work continues to evolve. Your organization must keep up with the demands of its mobile workforce. This report introduces the concept of mobile WAN optimization and provides three case studies including RCM, PRTM and Einstein that highlight how this emerging technology can help IT departments achieve what previously appeared to be conflicting goals. DOWNLOAD NOW (REGISTRATION REQUIRED) MORE WHITEPAPERS |
MOST POPULAR STORIES
Google Drive Privacy: 4 Misunderstood Facts
Privacy and security questions have bedeviled the launch of Google's new online file-storage service. Ignore the hype and consider these four key facts.
10 App Stars For New iPad Screen
Apple optimized its core tablet apps, including iMovie and iPhoto, for the new iPad. But look what else you can do with the gorgeous new Retina display.
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
Inside Flat Networks
New designs promise faster, more reliable networks, but use caution.
8 Privacy Threats Worse Than Google
Google's privacy policy tweaks this week caused a fresh flurry of outrage. But Google should not be your top privacy worry.
Google Drive Privacy: 4 Misunderstood Facts
Privacy and security questions have bedeviled the launch of Google's new online file-storage service. Ignore the hype and consider these four key facts.
10 App Stars For New iPad Screen
Apple optimized its core tablet apps, including iMovie and iPhoto, for the new iPad. But look what else you can do with the gorgeous new Retina display.
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
Inside Flat Networks
New designs promise faster, more reliable networks, but use caution.
8 Privacy Threats Worse Than Google
Google's privacy policy tweaks this week caused a fresh flurry of outrage. But Google should not be your top privacy worry.
No comments:
Post a Comment