Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

5 Mobile Security Issues To Watch | Oracle Seeks Sun Revival

InformationWeek Daily
InformationWeek Daily  
  Tuesday, September 27, 2011
REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  
MUST READ
Between The Lines ColumnistOracle Seeks Sun Revival With Sparc T4 Servers
By Doug Henschen
Next-gen chip is the key to a do or die job for Oracle's hardware business: Regain the confidence of 50,000 Sun customers.

RELATED
Oracle Introduces Baby Exadata
The Oracle Mark Hurd Wants You To Know

5 Mobile Security Issues To Watch
Enterprises need to give up some control of devices and focus on what matters--securing the data. Stay on top of these 5 mobile security points.

Mobile Metaphor Rules, For Better And Worse
The visually and tactilely immersive iPad experience threatens to make the latest enterprise apps look like yesterday's green screens.

Piston Puts Enterprise Cloud On A Memory Stick
Startup's USB "cloud key" with OpenStack and PentOS plugs into the switch at the top of a server rack, automates configuration.

Playkast Promotes All Video Comments, All The Time
Embed this video player on your Website or Facebook page, and viewers can respond with their own video comments.

Should ISPs Monitor Users' PCs To Stop Botnets?
Homeland Security's proposed code of conduct for notifying users when their PCs are infected by malware raises privacy concerns.

Crowdsourcing Cracks AIDS Mystery, What's Next?
Online game players recently helped solve a tough problem with analysis of AIDS proteins. InnoCentive uses same approach to solve challenges for businesses.

U.S. Ranked No. 1 In Tech Competitiveness
The U.S is extending its global lead, according to a new study, but other countries are moving up the innovation chain.

QUOTE OF THE DAY
A budget tells us what we can't afford, but it doesn't keep us from buying it. -- William Feather

ALSO SEE

Crowdsourcing Cracks AIDS Mystery, What's Next?
U.S. Ranked No. 1 In Tech Competitiveness
Bending The 80/20 Barrier: Automation Is Just the Start
Five Steps to Enterprise Workload Automation
iPhone 5: What We Don't Know
Collaborative Development & Planning for Automated Deployment of Applications to the Cloud
Time Is Running Out To Attend Interop New York

JOIN THE CONVERSATION
Posted By vetter74:
"To resort to this kind of solution to an exclusive Windows vulnerability, at the risk of hampering, or even possibly disallowing, the installation of any of these more secure systems is outrageous."
In reply to: Samsung May Ditch Windows Phone 7 Next Year
View Entire Response | Post Your Own Reply

Posted By Bprince:
"I think it could be argued that if you are going to give people the ability to express their distaste at something as a comment, you might as well give them the opportunity to click 'loathe' or 'boycott.'"
In reply to: Windows 8 Gets Security Overhaul
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD OUR SEPTEMBER 26th DIGITAL ISSUE
Take charge of your mobile apps: We offer a clear strategy for developing, deploying, managing, and securing mobile applications.

ALSO: Adoption of identity management has stalled--bad news given trends such as SaaS, advanced threats, and consumerization.

And much more, exclusively in our Digital Issue!

DOWNLOAD NOW (Registration Required)
 


 
ANALYTICS & WHITEPAPERS
FEATURED REPORTS
Bending The 80/20 Barrier: Automation Is Just the Start
IT is caught in a squeeze between requests for new applications, services, and device support and demands from upper management to keep budgets lean, staffing light, and operations tight. These are irreconcilable objectives as long as we spend the vast majority of our resources on legacy services.
Download Now (Registration Required)
Featured Report

Charge IT: Why We Need Usage-Based Accounting
In this report, we chart the new service-oriented IT landscape and provide a guide to the key components: service catalogs, cost and pricing models, and financial systems integration.
Download Now (Registration Required)
Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS
Five Steps to Enterprise Workload Automation
Do you have a patchwork of different schedulers? All these different solutions require different skill sets and could be increasing your administrative costs. Review this five step guide to learn how to replace an assortment of schedules with an enterprise approach.
Download Now (Registration Required)

Best Practices for Performance Testing
When done right, Agile allows for rapid delivery of high-quality software and a resultant alignment of IT goals and business needs. But just as with other software development methodology, performance testing needs to be part of the Agile approach. Download this white paper to review best practices for performance testing and exam tools to enable performance validation in Agile environments.
Download Now (Registration Required)

MORE WHITEPAPERS
 


MOST POPULAR NEWS
iPhone 5: What We Don't Know
Contradictory reports on what features the Apple iPhone 5 (or iPhone 4S) will and won't include continue to fly.

5 Things We Know About Amazon's Kindle Tablet
Amazon is holding a press conference in New York on September 28, and will likely introduce the Amazon Kindle tablet. Here's what we know.

20 Innovative IT Ideas To Steal
InformationWeek 500 innovators have creative solutions to not-so-unusual business problems. How can these help your company?

Amazon Tablet Ready For Its Close-Up?
Take a sneak peek at what we know about Amazon's soon-to-be-revealed tablet. Plus, get expert advice for your mobile application strategy.

Will Windows 8 Secure Boot Block Linux?
A security feature designed to block malware could result in PCs no longer booting alternate operating systems, open source advocates warn.

 

SLIDESHOWS

10 Mobile Security Vendors To Watch
Who are the key players in the fast-changing mobile security world? These 10 mobile operating system and mobile device management vendors should be on your radar screen.   View Now

ALSO SEE
HP TouchPad: Teardown
Windows 8 Visual Tour: Microsoft's New Desktop

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
WhisperCore Mitigates Risks Of Android In Businesses
TechWebTV catches up with Whisper Systems' CTO and co-founder Moxie Marllinspike to discuss and demo WhisperCore -- a mobile security solution that brings BlackBerry-like centralized enterprise-grade security to Android devices.   Watch

ALSO WATCH
MANDIANT CSO Talks Threats To His Company and His Clients
Intel Labs Invests in the Future of Cloud and Embedded Computing

MORE VIDEOS

spacer
 


WEBCASTS
Collaborative Development & Planning for Automated Deployment of Applications to the Cloud
In this presentation, we will provide insights for planning and automating the deployment of applications to cloud infrastructures and highlight some of the key techniques and best practices developed by IBM to address these challenges. It Happens Thursday, September 29, 2011 -- Time: 11:00 AM PT / 2:00 PM ET More Information & Registration

Click here

 


RESOURCES AND EVENTS
Time Is Running Out To Attend Interop New York
October is almost here, and with it the latest IT solutions at Interop New York. Save 25% on Flex and Conference Passes or get a Free Expo Pass with code CPFHNY25. It happens in New York City, Oct. 3-7, 2011.
Register Today

This e-mail was sent to %%email%%
INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.