Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Why Apple Needs More iPhones | 10 Facts: Secure Java For Business

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Tuesday, January 15, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
Between The Lines Columnist 10 Facts: Secure Java For Business Use
By Mathew J. Schwartz
Businesses that rely on Java must now take additional steps to keep employees safe. Here's where to start.

Microsoft Patches Critical IE Vulnerability
Red October Espionage Network Rivals Flame

Apple Needs More Than One iPhone To Compete
Apple needs to do better than one iPhone a year if it wants to maintain its position in the smartphone market.

Obama's Developer Brain Trust: Inside The Big Battle
Tech leaders for the Obama for America team discuss their re-election project -- and a business-like culture clash between free-wheeling nerds and their goal-oriented bosses.

SAP Sweetens Hana Deal With Free Sybase Database
Not everything demands in-memory performance, so SAP is bundling a conventional database for customers licensing SAP BusinessSuite to run on Hana.

Swartz Suicide Puts JSTOR Academic Database In Spotlight
Death of internet activist Aaron Swartz renews push for online content and copyright debate.

IBM, Universities Team Up To Build Data Scientists
Big Blue program aims to prepare students for a workplace increasingly driven by data.

5 Secrets To Zuckerberg's Success
Mark Zuckerberg's Facebook adventure gets examined in a new book that doesn't shock, but serves as a social business primer.

"A ship in harbor is safe, but that's not what ships are for." -- John Shedd


IBM, Universities Team Up To Build Data Scientists
5 Secrets To Zuckerberg's Success
Strategy: The Next Phase of Meaningful Use
Git for the Enterprise - Promises and Pitfalls
CES 2013: 7 Standout Technologies
Is Your Network Ready for BYOD?
2013 InformationWeek 500: Nominations Now Accepted

Download our iPad App

Posted By AustinIT:
"All software has flaws. This article is about Java, not about IE. You taking an opportunity to take a pot shot at MS is just plain annoying."
In reply to: "Java Under Attack Again, Disable Now"
View Entire Response | Post Your Own Reply

  Digital Issue  
Mobile applications are the new way to extend government information and services to on-the-go citizens and employees.

Also: A new initiative aims to shift the 17-member Intelligence Community from agency-specific IT silos to an enterprise environment of shared systems and services.

DOWNLOAD NOW FREE (Registration Required)


Strategy: The Next Phase of Meaningful Use
Stage 2 raises requirements for health information exchanges, EHR interoperability and patient involvement. For the first time, providers will have to engage patients in their own care or risk losing out on incentive payments.
Download Now (Registration Required)

Featured Report
Research: 2012 Application Security Survey
Tried-and-true methods like defense in depth can provide breathing room while you get a secure SDLC in place-a job still facing 56% of our 475 respondents. And they'd better get moving, because 51% of those with secure SDLC programs on their radar have developed and/or assumed responsibility for securing 11 or more Web apps.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
Git for the Enterprise - Promises and Pitfalls
Git is the world's leading distributed version control system (DVCS). Enterprise adoption for Git however has been slow. Concerned with security breaches, compliance violations and lack of governance, many chose to wait and see.
Download Now (Registration Required)

Your Next Generation Data Center Starts with Virtualization
Server virtualization is perhaps the most significant evolution in information technology of this time. But why aren't more organizations taking advantage of both its immediate and long-term benefits? This paper will explain why and how you should take the first steps toward your next generation data center.
Download Now (Registration Required)

CES 2013: 7 Standout Technologies
What happens at CES 2013 doesn't stay in Vegas. From giant tablets to $20,000 televisions, take a peek at a few early standouts for gadget lovers.

CES 2013: 5 Dumbest Ideas
CES launches some of the coolest gadgets on the planet. But with more than 3,000 exhibitors this year, not everyone could be a winner.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

CES 2013: 9 Cool Gadgets
Consumer Electronics Show is a tech smorgasbord. Here are nine products that attest to the show's overwhelming variety.

Oracle Fixes Zero Day Java Flaws: Patch Now
Java 7 update, released Sunday, fixes bugs widely targeted by crimeware toolkits. Other critical bug updates coming later this week from Oracle and Microsoft.


Big Data Analytics Masters Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.   View Now

10 Social Networks For Special Interests
8 Key Changes In Microsoft SharePoint 2013


spacer spacer spacer
CES; Synaptics senses mobile touch potential
Synaptics is moving on from simple touchpad sensors to a more touch integrated future, from better designed ThinTouch capacitive keyboards to mobile touchscreens that work even with gloved hands.   Watch

CES: Maxim shows heart, turns up volume on audio
NXP on route to automotive future



Is Your Network Ready for BYOD?
Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy. More Information & Registration

Click here


2013 InformationWeek 500: Nominations Now Accepted
Nominate your company for the 2013 InformationWeek 500 -- our 25th annual ranking of the country's most innovative users of business technology. Organizations with $250 million or more in revenue may pre-register now to receive more information.
Deadline is April 12

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.