Monday, February 10, 2014

California Kill Switch Bill Targets Phone Thieves | Huawei, Samsung Smartwatches In Wings

If you have trouble viewing this email, read the online version.

Mobile
Follow IW:
 February 10, 2014

TOP STORIES

California Kill Switch Bill Targets Phone Thieves
California bill directs mobile hardware makers to include a way to disable stolen communications devices. Will privacy concerns be addressed?
Huawei, Samsung Smartwatches In Wings
Huawei plans to reveal its first smartwatch at MWC, while Samsung prepares its own lower-cost device. Is the wearable market poised for takeoff?
Windows 8.1 Update 1: Nadella's Challenge
Microsoft has a new CEO, but does it have a new Windows strategy? Here's what to expect from Windows 8.1 Update 1.
IT Pros Winter Olympics: 13 Breathtaking Competitions
Nordic Combined Troubleshooting: Not for the faint of heart. Resolve your non-technical spouse's email connectivity issue over the phone, in the air, while ski jumping.
Sony Dumps PC Business: Who's Next?
The PC slump became too much for Sony. Other PC makers face the same reality.

MOST POPULAR

10 Famous Facebook Flops
Facebook has suffered some ignominious strikeouts during its 10 years. Consider these 10 features and products that didn't fly.

Windows 8.1 Update 1: Nadella's Challenge
Microsoft has a new CEO, but does it have a new Windows strategy? Here's what to expect from Windows 8.1 Update 1.

Yahoo Mail Passwords: Act Now
Yahoo suffers hack attack, eyes third-party database and reused credentials as likely culprits, may enforce two-factor authentication to help users recover accounts.

Sochi Olympics 2014: 10 Technologies In Spotlight
From innovations for athletes to unprecedented surveillance tools for authorities, look at the technologies that will shape the Sochi Olympics.

8 Reasons To Hate Windows 8.1
Sure, it's an improvement over Windows 8. But for many PC users, Windows 8.1 is a clumsy hybrid that's a pain to navigate.

WHITEPAPERS AND WEBCASTS

MORE WHITEPAPERS

  • Taking the Cloak off Targeted and Sophisticated Threats

    Organizations must marshal change in their operations to move ‘in lock-step’ with sophisticated attackers that pose a direct and credible threat to their operations, reputations and financial performance. Join this interactive webinar so you can get a clear understanding of: ...

  • How to Defend Your Network from Advanced Persistent Threats (APTs)

    Attend this webinar with Ruby Sharma, Technical Alliances at FireEye, and Michael Bilancieri, Director of Product Management at Bit9, to get the latest intelligence on advanced attack scenarios and how FireEye and Bit9 are working together to deliver an integrated ...

MORE WEBCAST

SLIDESHOWS

Sochi Olympics 2014: 10 Technologies In Spotlight

MORE SLIDESHOWS

FEATURED REPORTS

MORE REPORTS
InformationWeek is looking for engaged readers to moderate message board on this site. Interact with your IT peers; earn recognition and perks. Interested? Email:Iwkmoderator@ubm.com

CURRENT ISSUE

DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030
To update your profile, change your e-mail address, or unsubscribe, click here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: InformationWeekMobileWirelessReport@ubmtechcontent.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.

No comments: