Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Java Still Unsafe | Inside Apple's Design Patent Strategy

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Thursday, September 06, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist Apple Beats Competition With Design--And Design Patents
By Charles Babcock
Apple has invested more in design patents than many other tech companies since it launched the iPhone in 2007. Is that good news for consumers?

RELATED
Apple iPhone 5 Demand Looks Strong
Apple Worked A Broken Patent System

Java Still Not Safe, Security Experts Say
Oracle needs to fix holes faster, say some security experts. Leave Java disabled for now, because Oracle's emergency patch is insufficient.

10 Pinterest Pointers For Businesses
Pinterest is gaining interest and users. We recommend 10 tips for making effective and purposeful use of the platform.

Nokia Windows Phone 8 Devices Arrive With Thud
Nokia's shares hammered after analysts were underwhelmed by launch of Lumia 920 and Lumia 820 smartphones.

Samsung Sells 20M Galaxy S III Smartphones
Sales of Samsung's 2012 flagship smartphone surpassed 20 million in 100 days, making it Samsung's most successful device.

How Whole Foods Handles Social Media
Spredfast's benchmark study of social media management users shows distinctions between those just entering social channels and those, like Whole Foods, whose usage is proliferating rapidly.

Good Technology Buys Copiun, Gains Collaboration Tools
Good Technology enhances mobile device management portfolio by adding end-to-end IT control and tools for better teamwork among remote employees.

Bridging Hot And Cold Cloud Storage
Pogoplug takes the chill off Glacier, turning it into a continuously replicated archive.

QUOTE OF THE DAY
"I don't know the key to success, but the key to failure is trying to please everybody." ~ Bill Cosby

ALSO SEE

Good Technology Buys Copiun, Gains Collaboration Tools
Bridging Hot And Cold Cloud Storage
Research: Cloud-Managed WLAN Buyer's Guide
Mobile Device Management: eBooks Guide to the Essentials
Windows Phone 8 Preview: Visual Tour
Fast and Furious Analytics for Everyone
InformationWeek 2013 IT Budget Survey

Download our iPad App

JOIN THE CONVERSATION
Posted By ugardisqus:
"If I were Cisco or IBM, I would be very worried. Microsoft is going to be eating their market-share for breakfast, lunch and dinner."
In reply to: "Cisco Squeaks Past Microsoft In Gartner UC Ranking"
View Entire Response | Post Your Own Reply

Posted By EBo:
"Protecting your investments is one thing, using design patents to stifle competition is another."
In reply to: "Apple Beats Competition With Design--And Design Patents"
View Entire Response | Post Your Own Reply


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Research: Cloud-Managed WLAN Buyer's Guide
Our Buyer's Guide compares six cloud-based management options for 802.11n wireless networks. We break down offerings from Aerohive Networks, AirTight Networks, Meraki, Motorola, Ruckus Wireless and ZyXEL and reveal details on pricing, deployment, configuration, troubleshooting, security and more.
Download Now (Registration Required)

Featured Report
Strategy: Keeping DNS Services Safe and Operational
If DNS is down-for whatever reason-your business is hobbled. IT pros must understand what makes DNS work and what can cause it to fail, including hackers targeting the inherent weaknesses in the service. We detail what you need to worry about when it comes to DNS and provide recommendations for protecting your environment against DNS problems.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Mobile Device Management: eBooks Guide to the Essentials
As time passes more and more businesses are grappling with Mobile Device Management (MDM). Users are bringing their favorite devices to work and expecting IT to support those devices. On one hand, your company can save a lot of money and see an increase in employee productivity and satisfaction. On the other, what happens if a device with corporate data on it gets lost or stolen? This guide describes 12 best practices for MDM.
Download Now (Registration Required)

Device Freedom Without Compromise
The BYOD megatrend requires sweeping changes for the network. How will it affect businesses? What IT challenges await? Download this white paper to learn about an architecture that addresses these challenges and allows the device freedom without sacrificing IT control.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
Windows Phone 8 Preview: Visual Tour
Microsoft Windows Phone 8 shares a close connection with Windows 8. Take a closer look at what that means for users, enterprises, and developers.

Beyond YouTube: Turning Video Viewers Into Customers
Two SMBs dissatisfied with a lack of tangible return from their online video audiences went looking for an alternative to YouTube. Here's what they found.

Cloud Security Investment, Part 2: Whac-a-Mole Funding and Going on the Offensive
Most enterprises don't seem to have any semblance of a cohesive, security strategy.

NASA Curiosity Visual Tour: Mars, Revealed
NASA's car-like Curiosity rover beams back views from the Red Planet, revealing the most detailed depiction of Mars surface to date.

Cloud Security Frameworks: Introducing Intel's Security Investment Model
Based on what we're seeing worldwide, security spending is reactive (motivated by fear?) - and therefore not very effective from an enterprise viewpoint.

 


SLIDESHOWS
10 Best Apps For Samsung Galaxy Notes
Check out these 10 great apps that take advantage of the Samsung phablet's S Pen stylus.   View Now

ALSO SEE
Top 5 Password Managers
Team Oracle Points New Tech At America's Cup

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
VMworld, Virtualization, and Violence
Networking's best and brightest face off in a dodgeball match to the death. Or at least until dinnertime. EMC hosts "Vodgeball", a dodgeball tournament for charity ramping up for VMWorld.   Watch

ALSO WATCH
Jelly Bean Demo On The Samsung Galaxy Nexus
First Look At Windows 8, Microsoft's Office 2013

MORE VIDEOS

spacer
 


WEBCASTS
Fast and Furious Analytics for Everyone
Even with all the excitement around big data, the vast majority of midsize businesses tend to operate data warehouses of 5-10 terabytes or less. For these implementations, the small footprint data warehouse appliance fits the need. In this Webcast, International Technology Group will discuss their recently published cost/benefit case study for small footprint data warehouse appliances. It happens Tuesday, September 11, 2012. More Information & Registration

Click here

 


RESOURCES AND EVENTS
InformationWeek 2013 IT Budget Survey
InformationWeek is conducting a survey on IT budgets. A 32G iPod touch goes to one lucky, randomly selected participant!
Survey ends Sept. 7

Don't Miss Interop New York!
See the future of business technology at Interop New York, Oct. 1-5. It's the best place to learn about next-generation technologies, including cloud computing, BYOD, big data, and virtualization. Register today with priority code YLBQNY02 and save up to $300 on passes with early-bird pricing.
Don't Miss Out!

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.