| MUST READ Framehawk Says BYOD Is Not Rocket Science By Patrick Houston Startup Framehawk, which counts a former NASA physicist as a co-founder, uses desktop virtualization and its own communications protocol to safely extend corporate apps and data to tablets and smartphones.
• Why Security Isn't A BYOD Showstopper
• Harmon.ie Brings SharePoint Collaboration To iPad
HP Adds OpenFlow Support Throughout Networking Line
At Interop 2012, HP shows OpenFlow-enabled networking platforms, teams with F5 Networks to automate virtualization of networks and application deployment.
Apple Fixes Serious iOS Security Bugs
Apple iOS version 5.1.1 patches three big iPhone and iPad vulnerabilities. But OS X Lion update results in FileVault passwords being stored in plaintext.
HBase: Hadoop's Next Big Data Chapter
HBase still has a few 'rough edges,' but that hasn't kept this NoSQL database from becoming one of the hottest pockets within the white-hot Hadoop market.
Google+ Hangouts On Air: Broadcasting For All
Users of Google+ can now host live video events for as many viewers as they can attract.
Facebook Traffic From The Office Dropping, Zscaler Says
Among enterprise users, cloud security provider Zscaler notes a Facebook fall, a Twitter rise, and wider application of social networking policies.
Men Are From Mars, Women Love Smartphones
Who's still using 'dumb' phones? White males buy smartphones in lower percentages than women and minorities, according to the latest data from Nielsen.
| DOWNLOAD INFORMATIONWEEK'S MAY 8th DIGITAL ISSUE From clouds to mobile to software development, threats may be everywhere, but they're not equally dangerous. Our new, all-digital issue of InformationWeek will help you prioritize.
ALSO THIS ISSUE: IT must decide how to deal with consumer cloud storage being used in businesses.
DOWNLOAD NOW FREE (Registration Required)
REPORTS & WHITEPAPERS
MOST POPULAR NEWS
Google Copied Java, Jury Says; Fair Use Question Open
Judge Alsup rejects Oracle counsel David Boies' claim for "infringer's profits" from nine copied lines of Java code as "bordering on the ridiculous."
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
Google Faces Antitrust Inquiry In India
Regulators in Europe, the U.S., and now India circle Google; number of formal complaints still to be determined.
RESOURCES AND EVENTS
InformationWeek IPv6 Survey InformationWeek is conducting a survey to get a baseline look at where enterprises stand on their IPv6 deployments, with a focus on problem areas, including security, training, budget, and readiness. Upon completion of our survey, you will be eligible to enter a drawing to receive an 16-GB Apple iPad. Survey Ends May 11