If you have trouble viewing this email, read the online version. |
|
Monday, May 7, 2012 |
TOP STORY RIM Empire Didn't Strike Back At BlackBerry World By Eric Zeman Research In Motion didn't quash fears of its demise at BlackBerry World 2012. The company faces real threats that need to be addressed now--not later this year, when BlackBerry 10 launches. MUST READ 6 Findings That Prove Mobile Malware's Mettle Trojans, botnets, adware, and more are no longer merely theoretical. Consider these examples from the research lab to the real world of mobile. Huawei Gunning For Cisco, HP, Dell, And Friends Chinese networking giant introduces new products, partnership at Interop, aiming for a larger piece of the U.S. enterprise infrastructure market. Samsung Galaxy S III: Key Features Samsung's 2012 flagship phone, the Galaxy S III, comes chock full of software innovations, wrapped inside a pebble-shaped, polycarbonate shell. Nokia Lumia 900 Price Drops To $49 Nokia's flagship Windows Phone 7.5 smartphone sees heavy discounting as dealers look to jump start sales. Nokia Patent Lawsuits: Convenient Google Attack? Finnish phone maker claims HTC Android devices violate Nokia mobile hardware and software patents, but gives HTC's Windows Phone lineup a pass. |
|
DOWNLOAD INFORMATIONWEEK'S MAY 8th DIGITAL ISSUE From clouds to mobile to software development, threats may be everywhere, but they're not equally dangerous. Our new, all-digital issue of InformationWeek will help you prioritize. ALSO THIS ISSUE: IT must decide how to deal with consumer cloud storage being used in businesses. DOWNLOAD NOW FREE (Registration Required) |
| FEATURED WHITEPAPERS Mobile BI: Actionable Intelligence for the Agile Enterprise The Aberdeen Group recently conducted some benchmark research examining the intentions, strategies and required actions of more than 140 organizations using mobile business intelligence (BI) throughout diverse industries. Learn about these results, the emerging best practices for mobile BI usage and the framework by which you can assess management capabilities for enterprise mobile BI adoption. DOWNLOAD NOW (REGISTRATION REQUIRED) MORE WHITEPAPERS |
MOST POPULAR STORIES
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
ODCA Shapes the Future of Cloud with Forecast 2012
One of the aspects I enjoy most about the Open Data Center Alliance is how it enables "buy" and "sell" side players to come together for open conversations on how to collectively shape the cloud moving forward.
Oracle V. Google Jury Deadlocked?
If the jury cannot reach a verdict, the judge might weigh in on the question of whether APIs can be copyrighted.
Cloud Security Frameworks: The Current State
A typical IT organization has a stratification of skills, responsibilities, and associated budgets. These are generally structured along platform, operations, and increasingly, lines of business.
How To Lose Your Best IT Employees
Ignore what motivates people in their jobs and they'll eventually leave. Our IT Salary Survey provides data you can use to cultivate your top performers.
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
ODCA Shapes the Future of Cloud with Forecast 2012
One of the aspects I enjoy most about the Open Data Center Alliance is how it enables "buy" and "sell" side players to come together for open conversations on how to collectively shape the cloud moving forward.
Oracle V. Google Jury Deadlocked?
If the jury cannot reach a verdict, the judge might weigh in on the question of whether APIs can be copyrighted.
Cloud Security Frameworks: The Current State
A typical IT organization has a stratification of skills, responsibilities, and associated budgets. These are generally structured along platform, operations, and increasingly, lines of business.
How To Lose Your Best IT Employees
Ignore what motivates people in their jobs and they'll eventually leave. Our IT Salary Survey provides data you can use to cultivate your top performers.
No comments:
Post a Comment