Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Apple Sued Over iPhone Data Privacy

InformationWeek Daily: Issue Highlights
Manage Subscription  |  Contact Us

TOP STORY: Apple Sued Over iPhone Data Privacy

MORE NEWS: Internet 'Kill Switch' Bill To Be Reintroduced

ANALYTIC REPORT: State Of Enterprise Storage Report

WHITEPAPER: IPv4 Address Pool Will Run Dry: Network Management Whitepaper

SLIDESHOW: 12 Advances In Medical Robotics

VIDEO: 02.01.11 The Future Lies In "Technology Commons"

BLOG: Data Leak Vulnerability In Android Gingerbread

WEBCAST: How to Grow your Business in a Market of Continual Change

RESOURCES: Nominate Healthcare IT Execs

InformationWeek Daily
InformationWeek Daily  

Wednesday, February 2, 2011


"You have to learn the rules of the game. And then you have to play better than anyone else." -- Albert Einstein



Apple Sued Over iPhone Data Privacy

The disclosure of Unique Device Identifiers associated with Apple's mobile devices represents a privacy law violation, the complaint claims.


Verizon iPhone Or AT&T, Which Is Better?

Windows Phone 7 Data Loss Linked To Yahoo


Internet 'Kill Switch' Bill To Be Reintroduced

Senators plan to revisit the controversial cybersecurity measure, which includes authority for the president to shut down U.S. critical infrastructure in the event of a national emergency.

Global CIO: HP Calls Out Apple In CEO's Quest To Be Coolest Of All

New CEO Leo Apotheker finally talks about HP's future but says nothing about the enterprise. Instead, he says HP will out-cool Apple. Word up.

Intel Discloses Flaw In Sandy Bridge Chipset

Fixing the 6 Series chipset design error will cause a $300 million revenue drop in the first quarter, said the company.

Gartner Quadrant Reports BI Split

Business intelligence buyers want easy data exploration. That has small, independent vendors waxing and a few BI incumbents mired in a "new normal" malaise.

DHS To Invest $40 Million On Cybersecurity Research

Homeland Security's funding priorities include malware, insider threats, and ways to support the Comprehensive National Cyber Initiative.

Dirty Pool: Apple Trying To Steal Google's Android 3.0 Thunder

Apple leaks take edge off Google's Honeycomb showing tomorrow but, in the end, Honeycomb counts.

SMB Search Spending Down, Efficiency Up

Yahoo-Bing posted higher a click-through rate and lower cost per click than Google in the fourth quarter, while smaller businesses scaled back search budgets slightly, but increased keyword counts, according to WebVisible.

RIM PlayBook's Big Weakness: BlackBerry Required

The way that corporate email works on the PlayBook tablet, as shown in a demo video published by Research In Motion, looks like a disaster in the making.

10 Telling Tidbits From Microsoft's 10-Q

Investors need to look beyond the headlines and read the fine print to understand the real challenges and opportunities facing the world's biggest software company.

  Digital Issue  


Having trouble sorting one vendor EHR from the next? Seven
companies responded to our RFI -- find out how they compare
and what questions you'll want to ask. Plus, discover the
lessons learned from the largest civilian EHR deployment
ever...only in our February issue of InformationWeek Healthcare.

DOWNLOAD NOW (Registration Required)




State Of Enterprise Storage Report

Budgets may be stagnant, but the recession has not put a damper the growth of enterprise data and related storage requirements. Too bad, then, that our infrastructures aren't keeping pace, according to our survey respondents. In this report we'll analyze poll results and discuss top technologies that can help storage managers do more with less.

Download Now (Registration Required)

Featured Report

Beating Cloud Lock-In: Our 3 Top Considerations

Whether you're talking about SaaS, IaaS, or storing data in the cloud, companies must consider how they'll unwind relationships -- customizations, metadata, contracts, and depth of integration are all factors.

Download Now (Registration Required)

Featured Report


spacer spacer spacer

IPv4 Address Pool Will Run Dry: Network Management Whitepaper

Compliance for compliance's sake is not a best practice in protecting cardholder data.
Learn why compliance is the byproduct of a well-executed information security program that focuses on risk managementand minimizes the use of compensating controls.
Download Now

The Cloud-based Telework Solution

By combining a cloud-based management platform with user-friendly devices, discover a new approach to remote access with the simplicity, centralized visibility & control, and economies of scale.
Download Now



12 Advances In Medical Robotics

Robots play a critical -- and growing -- role in modern medicine, from training the next generation of doctors, dentists, and nurses, to comforting and protecting elderly patients in the early stages of dementia.   View Now


Top Features Absent From Windows 7

Inside Watson, IBM's Jeopardy Computer


spacer spacer spacer

02.01.11 The Future Lies In "Technology Commons"

Howard Rubin, founder of advisory firm Rubin Worldwide, tells editorial director Greg MacSweeney that the future of banks is in "'Technology Commons," which provides them with an opportunity to utilize their IT investments more cost-effectively.   Watch


ReviewCam: SocialCast TownHall -- Executive Social Outreach

Using Intel TBB parallel_for to Parallelize Serial Code




Featured BloggerData Leak Vulnerability In Android Gingerbread

By George Hulme

Google's Android Gingerbread (version 2.3) operating system is affected by a data-leak vulnerability that is very similar to a vulnerability in an earlier version that was supposed to have been fixed.


Samsung Galaxy Tab Has 15% Return Rate

By Eric Zeman

According to tech analyst firm ITG, 15% of consumers who've purchased the Samsung Galaxy Tab from a U.S. carrier have returned it.

Paessler Speeds Up Network Monitoring Tool

By Paul Korzeniowski

Faster, faster, and even faster, that is the expectation among IT users. In response, Paessler boosted the performance of PRTG, its network monitoring solution, by 300 percent.

Android Sits Atop The Smartphone Mountain

By Ed Hansberry

In the 4th quarter of 2009, Google was in fourth place with its Android platform. 2010 was a banner year for the fledgling platform and by the time the year was up, it had catapulted to the top spot.

Automation Takes Center Stage In The Channel

By Michele Pepe-Warren

SMBs, you've probably been wracking your brain for the past few years to come up with ways to do more with less. And you've probably harnessed all your creativity and tenacity to pull it off, right? But if you're finally running out of ideas, you might want to consider deploying process automation software.


How to Grow your Business in a Market of Continual Change

Join Stephanie Stahl, Executive Editor, InformationWeek & TechWeb and Paul Brunet, Vice President, IBM WebSphere and BPM Product Marketing for a discussion on how savvy business managers are using technology to chart a path to growth, partnering with their technology departments to deliver value, and creating an unprecedented advantage over the competition.

It happens Wednesday, February 23, 2010 -- Time: 9:00 am PT / 12:00 pm ET

More Information & Registration

Click here


Nominate Healthcare IT Execs

We're looking for forward-thinking IT leaders for InformationWeek's Healthcare CIO 25 - people who exemplify the new leadership role that IT plays at healthcare provider organizations.

Send a brief description of your nominee to [email protected]

We'll See You At Interop Las Vegas

Get up to speed on IT innovations in cloud computing, virtualization, security, and more at Interop Las Vegas, May 8-12.

Register Today

Plugging The Leaks: Finding And Fixing The Security Holes In Your Enterprise

In this all-day virtual event sponsored by Dark Reading and InformationWeek, you'll find out how criminals target the flaws in your IT environment, and you'll get some insight on the best methods for finding and fixing your vulnerabilities -- before you're hit by malware or unauthorized access.

You'll also get a look at the reasons why insiders may leak data to the outside, and get some recommendations on how to stop those leaks before they happen.

It happens Feb 3. (Free registration required.)

This e-mail was sent to %%email%%

InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
[email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.


Keep up with the latest news, insights and trends as InformationWeek reports them: