Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

iPhone vs. Android: Loyalty Wars | LulzSec Spokesman Makes Bail

InformationWeek Daily
InformationWeek Daily  
  Monday, August 1, 2011
REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  
MUST READ
Between The Lines ColumnistAlleged LulzSec Spokesman: New Details As Bail Set
By Mathew J. Schwartz
Prosecutors accuse Jake Davis, aka "Topiary," of possessing 750,000 passwords and participating in multiple attacks.

RELATED
Alleged LulzSec Spokesman Arrested In Scotland
Anonymous Boycotts PayPal, Arrest Fallout Continues

iPhone Owners Twice As Loyal As Android Fans
Apple users stay committed to their phone brand, says Piper Jaffray analyst. Android and BlackBerry owners? Not so much.

Windows Phone 7 Sales $613 Million At Most
During the 2011 fiscal year, Microsoft Windows Phone 7 platform revenue never added up to much.

Shortened Breach Disclosure Periods Could Hurt Consumers
Breach notification window in proposed law will make disclosure less beneficial to victims, say security experts.

Legacy Support Leaves Chip-And-PIN Vulnerable
Black Hat talk will show that security and backwards compatibility are at odds in popular authentication technology.

Health IT Doesn't Please Insurance Customers
Despite major technology investments, insurance users don't see a customer service benefit, says Accenture study.

Open Source Helps eBay Process $2000 Per Second
The huge Internet auction house uses a small Sri Lankan firm's open source enterprise service bus--a little known but crucial piece of software.

Google Search On Tablets Gets A Do Over
Google has refreshed the design of its web-based search tool for tablets such as the iPad, Xoom, and Tab 10.1.

Flash Alternative: Adobe Previews Edge HTML5 Software
Designers and developers can use the HTML5 authoring tools to create animated graphics using HTML, CSS3, and JavaScript.

QUOTE OF THE DAY
A man who carries a cat by the tail learns something he can learn in no other way. -- Mark Twain

ALSO SEE

Google Search On Tablets Gets A Do Over
Flash Alternative: Adobe Previews Edge HTML5 Software
State Of The IT Service Desk
Five Tips for Effective Backup and Recovery in Virtual Environments
What To Look For In SMB NAS
Essential Elements for Simplifying APM
InformationWeek 500 Conference: The Need For Speed

JOIN THE CONVERSATION
Posted By Deb Donston:
"So many companies are struggling with writing policy around social networking. I think the report will help by providing at least a starting framework, or some sense of what should be covered in such a policy."
In reply to: Social Media Engagement: Feds Need Better Policies
View Entire Response | Post Your Own Reply

Posted By worldbfree4me:
"As far as Windows Phone Seven goes or even Mee Go, they are not in demand right now so I think HTC and Sammy is better off staying the course."
In reply to: Android Legal Troubles Benefit Windows Phone
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD DARK READING'S DIGITAL SUPPLEMENT
Beware SQL Injections: Knowing how attackers find and exploit these vulnerabilities can help you defend against them.

ALSO: How attackers exploit these vulnerabilities, and 6 ways to stop them.

DOWNLOAD NOW (Registration Required)

 


 
ANALYTICS & WHITEPAPERS
FEATURED REPORTS
State Of The IT Service Desk
Incident volume continues to rise, as new services are added and changes are continually made to existing services--infrastructure, apps, mobile devices and virtualization. IT support must better leverage service management frameworks, standards and practices to align its offerings with customer needs and business goals to demonstrate the value the IT service desk provides.
Download Now (Registration Required)
Featured Report

Database Breaches: Lessons Learned From Real-World Attacks
In this Tech Center report, we profile five database breaches -- and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk.
Download Now (Registration Required)
Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS
Five Tips for Effective Backup and Recovery in Virtual Environments
Virtualization is affordable, fast, and efficient. But without a solid backup and recovery strategy in place, you leave your organization's critical data vulnerable. Discover proven techniques to maximize and secure your virtual investments.
Download Now (Registration Required)

5 Steps to Implement Strong Authentication
Research has proven that strong authentication doesn't cost any more than password management, and saves money by reducing Help Desk expenditures while providing greater security and eliminating the need for exhaustive password policies. Download this report to review an in-depth look at what two factor authentication has evolved into today and learn five steps you must take when re-evaluating your access security policies.
Download Now (Registration Required)

MORE WHITEPAPERS
 


MOST POPULAR NEWS
What To Look For In SMB NAS
When small and midsize businesses go shopping for servers, one of the first they're going to buy is a network-attached storage system. And there are a lot to chose from.

Google Acquires 1,000 IBM Patents
Search giant is tight-lipped about the purpose of the transaction, but the filings cover everything from chips to databases.

OS X Lion Makes Windows 8 Too Late
Apple and Microsoft race to '"tablify" their desktop operating systems. Guess who's winning?

VMware Pricing Outrage: A Closer Look
Many IT admins want to continue over-provisioning memory to virtual machines. But that's not an efficient way to manage the data center.

Antisec Attacks An Urgent Wake-Up: InformationWeek Now
It's difficult to gauge the ethos of these next generation hackers. If I could summarize, it's this: Punish.

 

SLIDESHOWS

My Mistake: 10 CIOs Share Do-Over Worthy Moments Leading CIOs share the decisions that they'd still like to take back. Check out their lessons learned from mistakes on costs, culture, career path, and more.   View Now

ALSO SEE
50 Most Influential Government CIOs
14 Cool Mobile Apps From Uncle Sam

MORE SLIDESHOWS

spacer spacer spacer
spacer
 


WEBCASTS
Essential Elements for Simplifying APM
Join us for a webcast that will kick off a five-part series focused on the essential elements of an effective management strategy for your IT environment from application to infrastructure. More Information & Registration

Click here

 


RESOURCES AND EVENTS
InformationWeek 500 Conference: The Need For Speed
Join C-level executives from leading global companies as they gather to discuss how their organizations are turbo-charging business execution and growth -- how their accelerated enterprises manage cash more effectively, invest more wisely, delight customers more consistently, manage risk more profitably. It happens Sept. 11-13 in St. Regis Monarch Beach
Register Today

Take Our Printing Options Survey
InformationWeek Analytics is conducting a survey to assess the evolution in enterprise printing. Respond to the survey and be eligible to win an iPod Touch.
Survey ends July 22


This e-mail was sent to %%email%%
INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.