Java Security: True And False | 5 Ways Business Still Fails IT

Java Security: True And False | 5 Ways Business Still Fails IT

January 18, 2013

13 Min Read
Network Computing logo

InformationWeek Daily

InformationWeek Daily

Join the community

Facebook

  Friday, January 18, 2013

News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  

MUST READ
Between The Lines Columnist 5 Ways Business Still Fails The IT Organization
By Chris Murphy
If IT doesn't deliver everything a business wants, it's not all IT's fault, readers say.

RELATED
6 Ways IT Still Fails The Business
My Theory Of IT Reach

Java Security Warnings: Cut Through The Confusion
Recent warnings to deactivate Java are raising additional questions: What about JavaScript, EJB, JavaFX, Android and any other use of the programming language?

What PC Makers Must Do Now
PC makers, licking their wounds after a poor start to the Windows 8 era and still under siege from tablets and smartphones, must re-tool for the new normal.

Innovation In Spotlight, But Wrong Cast?
Boston Consulting Group shines a klieg light on innovation, but lots of leading companies and industries go unnoticed.

Cloud Security Threat: Vulnerable APIs
From banks to Instagram, weaknesses in online APIs may put company data at risk, warn security experts.

Herrod To Leave VMware, Join Venture Capital Firm
Steve Herrod has resigned as CTO of VMware to become managing partner of General Catalyst and share his startup experience.

Big Data Profile: Booz Allen Hamilton's Josh Sullivan
Dr. Josh Sullivan, VP at consulting firm Booz Allen Hamilton, talks hiring challenges, big data consortiums, and more.

Amazon Dodges Apple Tax With Mobile MP3 Store
HTML5-based store is more a vote of confidence in the business value of Web technology than in its performance characteristics.

MORE NEWS

QUOTE OF THE DAY
"If we don't allow ourselves to make mistakes, we will never invest in things that are radical." -- Jeff Clavier

ALSO SEE


Download our iPad App

JOIN THE CONVERSATION
Posted By parkercloud:
"There is no such thing as Cloud Sprawl only bad management. Try a server request process that includes an expiration date"
In reply to: "4 Ways To Prevent 'Cloud Sprawl'"
View Entire Response | Post Your Own Reply

 

Digital Issue

 

DOWNLOAD INFORMATIONWEEK GOVERNMENT'S LATEST DIGITAL ISSUE
Mobile applications are the new way to extend government information and services to on-the-go citizens and employees.

Also: A new initiative aims to shift the 17-member Intelligence Community from agency-specific IT silos to an enterprise environment of shared systems and services.

DOWNLOAD NOW FREE (Registration Required)

 


Click here to visit: Channelweb   REPORTS & WHITEPAPERS

FEATURED REPORTS
Informed CIO: Cloud Standards
IT has good reason to demand standardization in SaaS, IaaS and PaaS offerings. But what's interesting is that vendors themselves are just as interested and, in many cases, are driving standards efforts. In a market this fast-moving, the old top-down model is being turned on its head.
Download Now (Registration Required)

Featured Report

Alert: Java Insecurity
In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?
Download Now (Registration Required)

Featured Report



spacer

spacer

spacer

FEATURED WHITEPAPERS
A Strategy for Better Decisions with Better Data
Which came first, the data or the decision? This white paper makes the case for having a decision in mind, then tailoring big data's volume, variety and velocity to achieve business results such as overcoming customer dissatisfaction or creating well-informed strategies in real time.
Download Now (Registration Required)

Leveraging Open Source
Read this white paper to learn why Actuate's Business Intelligence Reporting Tools (BIRT) Open Source solution has become one of the most robust and web-centric Open Source Business Intelligence tools today.
Download Now (Registration Required)

 

MOST POPULAR NEWS

Big Data Analytics Masters Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Another Java Zero-Day Vulnerability Hits Black Market
Just 24 hours after Oracle patched two critical flaws in Java, online vulnerability vendor starts selling never-seen Java bug.

20 Great Ideas To Steal In 2012
Are you playing it too safe, IT leaders? Take these InformationWeek 500 projects along to rev up your next brainstorming session.

Will HP Sell Autonomy, EDS?
HP has suitors for its troubled Autonomy and Enterprise Services units, WSJ reports. Autonomy sale would be easier for HP than selling EDS assets.

 


SLIDESHOWS

Android Smartphone Developments At CES 2013
There weren't many smartphone announcements at CES 2013, but most of them were for Android phones and here they are, including one phablet. Pantech, Sony and Huawei all announced phones — some exclusively for the Chinese market — and Intel released a CPU and reference platform optimized for Android and also designed for low cost in emerging markets.   View Now

ALSO SEE
10 Social Networks For Special Interests
8 Key Changes In Microsoft SharePoint 2013

MORE SLIDESHOWS

spacer

spacer

spacer

VIDEOS

Atmel talks touch enabled curves and Internet of Things
Two popular trends rocking the world of consumer electronics are touch enabled surfaces and the Internet of Things. American semiconductor firm Atmel has made both a priority, and to prove it, the firm hit the ground running at CES 2013.   Watch

ALSO WATCH
CES: Maxim shows heart, turns up volume on audio
CES; Synaptics senses mobile touch potential

MORE VIDEOS

spacer

 

WEBCASTS

Is Your Network Ready for BYOD?
Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy. More Information & Registration

MORE WEBCASTS

Click here

 

RESOURCES AND EVENTS

2013 InformationWeek 500: Nominations Now Accepted
Nominate your company for the 2013 InformationWeek 500 -- our 25th annual ranking of the country's most innovative users of business technology. Organizations with $250 million or more in revenue may pre-register now to receive more information.
Deadline is April 12




This e-mail was sent to EmailAddress

InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

SUBSCRIBE TO OUR NEWSLETTER
Stay informed! Sign up to get expert advice and insight delivered direct to your inbox
More Insights