• 01/24/2011
    6:08 PM
  • Network Computing
  • News
  • Connect Directly
  • Rating: 
    0 votes
    Vote up!
    Vote down!

What's Driving Apple's 10 Billion App Success?

What's Driving Apple's 10 Billion App Success?

InformationWeek Daily: Issue Highlights    Manage Subscription  |  Contact Us

TOP STORY: What's Driving Apple's 10 Billion App Success?

MORE NEWS: Exclusive: IBM Moves Hertz' IT Support To India

ANALYTIC REPORT: State Of Enterprise Storage Report

WHITEPAPER: IPv4 Address Pool Will Run Dry: Network Management Whitepaper

SLIDESHOW: 12 Money Saving Tech Tips For SMBs

VIDEO: Tutorial: 10 Steps To Mobile Worker Support

BLOG: WikiLeaks Targeting P2P Networks?

WEBCAST: Tips and Tricks on Memory Management in Virtualized Environments

RESOURCES: Plugging The Leaks: Finding And Fixing The Security Holes In Your Enterprise

InformationWeek Daily

InformationWeek Daily


Tuesday, January 25, 2011


"For the most part, fear is nothing but an illusion. When you share it with someone else, it tends to disappear." -- Marilyn C. Barrick



What's Driving Apple's 10 Billion App Success?
The Google, Research In Motion, Palm/HP, and Microsoft app stores are all playing catch up with Apple, which just celebrated a major app download milestone, but without making one specific change, there's slim chance these competitors will narrow the gap.

Top 11 Mobile Predictions For 2011
Lessons In iPhone App Advertising
Apple Pulls VLC Player From App Store


Exclusive: IBM Moves Hertz' IT Support To India
About 50 jobs shipped from Oklahoma to the Asian subcontinent as the car rental company looks to pare costs.

Global CIO: FedEx CIO Explains The Real Power Of Cloud
Tempted to dismiss the 'private cloud' as the latest IT blather? Rob Carter has a new data center in Colorado that begs to differ.

Facebook Defends Security Practices
The social network responds to report alleging it puts the safety of its 650 million users at risk by not better securing third-party applications.

Global CIO: Steve Jobs' Legacy: 10 Ways He's Rocked Our World
The profound influence of Apple's brilliant founder and CEO has changed how corporations of all kinds approach strategy, design, and customer engagement.

Integration In The Cloud, The Sleeper Issue
It won't be enough to just move workloads into the cloud; it'll still be necessary to integrate with other apps residing there.

Exclusive: Exgage Engages Brands and Social Media Networks
Company to Launch Valentine's Day, Sources Link it to Walmart, American Idol.

No One Owns 'The Cloud'

Companies should think twice about pursuing trademarks around the term 'cloud computing,' as market saturation is making product differentiation increasingly difficult.

Mozilla, Google Propose Defenses Against Ad Tracking

Will self-regulation will be any more effective in the future than it has been in the past?

DoD, NATO Huddle On Cybersecurity

Deputy secretary of defense William Lynn is building a partnership on cyber defense with NATO and the European Union in meetings in Brussels.

HHS Expands Health Insurance Exchange Grants

Funding will help states develop infrastructure for the sites where individuals and small business will be able to shop for insurance plans by 2014.

OpenText Adds Customized Messaging To ECM Suite

StreamServe Persuasion allows corporations to customize marketing messages and support responses from within the enterprise content management software.

Ubuntu Ditches OpenOffice For LibreOffice

The April Linux release will include the Document Foundation's productivity suite instead of Oracle's software.

  Digital Issue  

Cutting-edge attacks like Stuxnet and Zeus will be the everyday exploits of the future. Here's what you need to know. That and more -- including five best practices to improve the budgeting process for security spending -- in the debut all-digital issue of Dark Reading.

DOWNLOAD NOW (Registration Required)




State Of Enterprise Storage Report
Budgets may be stagnant, but the recession has not put a damper the growth of enterprise data and related storage requirements. Too bad, then, that our infrastructures aren't keeping pace, according to our survey respondents. In this report we'll analyze poll results and discuss top technologies that can help storage managers do more with less.
Download Now (Registration Required)

Featured Report

Beating Cloud Lock-In: Our 3 Top Considerations
Whether you're talking about SaaS, IaaS, or storing data in the cloud, companies must consider how they'll unwind relationships -- customizations, metadata, contracts, and depth of integration are all factors.
Download Now (Registration Required)

Featured Report


spacer spacer spacer


IPv4 Address Pool Will Run Dry: Network Management Whitepaper
Compliance for compliance's sake is not a best practice in protecting cardholder data. Learn why compliance is the byproduct of a well-executed information security program that focuses on risk managementand minimizes the use of compensating controls. Download Now

The Cloud-based Telework Solution
By combining a cloud-based management platform with user-friendly devices, discover a new approach to remote access with the simplicity, centralized visibility & control, and economies of scale. Download Now




12 Money Saving Tech Tips For SMBs
Smaller companies are under constant pressure to maximize their performance with minimal resources. However, you can't do business without technology -- and tech means spending money, something there never seems to be quite enough of for growing businesses. Here are 12 ideas for reducing the budget burden of the business tools you need to succeed.   View Now


Inside Joomla 1.6: Improved Access Control, Categories

Top 15 Facebook Apps For Business


spacer spacer spacer


Tutorial: 10 Steps To Mobile Worker Support
Find out ways a company can support workers' mobile computing/connectivity requirements, securely and economically.   Watch


Intel Educational Exchage for Parallelism

CES 2011: Cellcontrol Device Sets And Enforces Safe Driving Policies




Featured BloggerWikiLeaks Targeting P2P Networks?
By George Hulme
That is the allegation in a news report that ran last week. While the outcome from the investigation could have a profound impact on whether the anti-secrecy organization is a media outlet -- there is a bigger lesson.


Apple Puts The Screws To iPhone Users
By Ed Hansberry
Today if you want to remove the back of your iPhone you need a simple Phillips head screw driver found in any hardware store, or most kitchen drawers for that matter. Soon though that won't be an option. Apple has devised a proprietary screw head that will be very difficult to remove with out a specialized tool.

10 Billion Downloads At Apple App Store
By Paul Korzeniowski
Many vendors try to revolutionize the IT industry. Apple is one who has done it: the company recently celebrated the 10 billionth download at its App Store.

Control Over End User Devices: Irrelevant?
By Jonathan Feldman
I spent some time today preparing to update our "end user device" analytics report. But it could be that what enterprises choose for their end user devices is becoming more and more irrelevant. A Model Startup?
By Michele Pepe-Warren
In one brief video, a Flipo clock makes the living-space rounds, showcasing its simple design and ability to sit in four different positions on nightstands, kitchen counters, and even bathtub rims. In another, designer Daniel Michalik talks about his studio in Brooklyn, N.Y., the materials he uses, and the design process.


Tips and Tricks on Memory Management in Virtualized Environments
Join this informative webcast and gain a greater appreciation for the strategies experts use today in managing their virtual environments. Attendees will gain a better understanding of how to recognize where memory constraints are impacting performance. We'll also explore how memory ballooning and swapping may impact the performance of your virtualized applications.

It happens Tuesday, February 8, 2011

More Information & Registration

Click here


Plugging The Leaks: Finding And Fixing The Security Holes In Your Enterprise
In this all-day virtual event sponsored by Dark Reading and InformationWeek, you'll find out how criminals target the flaws in your IT environment, and you'll get some insight on the best methods for finding and fixing your vulnerabilities -- before you're hit by malware or unauthorized access.

You'll also get a look at the reasons why insiders may leak data to the outside, and get some recommendations on how to stop those leaks before they happen.

It happens Feb 3. (Free registration required.)

We'll See You At Interop Las Vegas
Get up to speed on IT innovations in cloud computing, virtualization, security, and more at Interop Las Vegas, May 8-12.
Register Today

Web 2.0 Expo San Francisco 2011
Now in its fifth year, Web 2.0 Expo is for the builders of the next-generation Web: designers, developers, entrepreneurs, marketers, and business strategists. This year we're focusing on how you can unlock the digital economy as well as the ways you can leverage important ideas for your own success. We'll apply the economic filter to data collection, social connections, social media platforms, browser successes, old media in new channels, and global commerce among other hot topics.
It happens March 28-31 in San Francisco.

Interop Las Vegas
Get up to speed on IT innovations in cloud computing, virtualization, security, and more at Interop Las Vegas, May 8-12.
Register Today!

This e-mail was sent to %%email%%

InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Keep up with the latest news, insights and trends as InformationWeek reports them:


We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.

Log in or Register to post comments