Issue highlights 1. iPhone 6 rumor rollup for the week ending Feb. 1 2. BlackBerry Z10 smartphone: Bloggers, tech sites praise hardware, mixed on software 3. Ticketmaster dumps CAPTCHAs to beat touting systems 4. The Samsung Galaxy S 4 shows up in New Zealand, and on an AT&T stat sheet 5. Microsoft has no reason to save Dell 6. Windows 8, so easy even my wife can use it 7. Business websites spread more malware than porn sites, Cisco says 8. US wants Amazon, Apple, BlackBerry, Google and Microsoft to get a grip on mobile security, privacy concerns 9. FTC: App developers, stores should take new privacy steps 10. Samsung slowly closing the Apple gap 11. How BYOD Saved VMware $2 Million 12. How to Use LinkedIn's Alumni Tool to Network, Job Hunt 13. Microsoft accused of infringing old Lycos search patents 14. Tools for the paranoid: 5 free security tools to protect your data |
WHITE PAPER: Exceed Group Exceed Group helped a global manufacturing company implement a complete wireless expense management solutions with Mobil-Eye. Read about what steps they took to reach full optimization of their AT&T and Verizon contracts. Learn how to get your own free Mobil-Eye wireless expenses analysis. Learn More. |
The iOSphere was assured this week that it now knows the details of one of the Next iPhones, though this one is said to be not the iPhone 6 or even the iPhone 5S but the "budget iPhone 5," or iPhone 5B. READ MORE |
Tech blogs and news sites have been reporting on their weeklong experience with the just-announced BlackBerry Z10 smartphone, from BlackBerry, the company formerly known as Research in Motion. Here's a summary of some of their analysis and conclusions. READ MORE |
WEBCAST: Cisco Workers today use up to four mobile devices daily--yet companies are struggling to integrate mobile devices into their business models. Learn how Cisco Unified Workspace can help meet these challenges for increased efficiency and growth. View Now |
Could the days of the annoying and increasingly ineffective CAPTCHA web verification box finally be numbered? READ MORE |
RESOURCE COMPLIMENTS OF: IDG Research Tell us about the buying process for enterprise technologies in Network World's Technology Influence Survey! This survey should take about 10 minutes of your time. To thank you, you will have the opportunity to enter a sweepstakes to win a $250 cash prize*! Please be assured your responses are confidential. To participate, click on the link below. *Due to regulations, prize sweepstakes is only open to legal U.S. and Canadian (except Puerto Rico and Quebec) residents, age 18 or older. |
It may not be much, but the constant drip of rumors surrounding the upcoming Samsung Galaxy S 4 is beginning to solidify into something like a consistent picture of what the mega-hyped smartphone will look like. The question of when it'll be released, however, is less easily answerable - the conventional wisdom right now seems to favor a due date at some point in April. READ MORE |
WHITE PAPER: CA Technologies Increasing demands placed on IT, along with tightening budgets has prompted IT leaders to seek out alternative technologies and improved methods of providing backup, archiving and disaster recovery to meet the demands of the 24/7 business. Learn how CA ARCserve provides a single solution that cuts through the maze of data protection complexity. Learn More |
By now, you're probably familiar with the reports that Michael Dell is looking to take his company off the public stock market and make it private again. The deal would be the largest leveraged buyout since the economy hit the skids in 2008, and one of the biggest ever. Because of this, the current problem won't be easy to solve. As it looks now, Michael is basically going to have to empty his piggy... READ MORE |
Microsoft's initial pricing deal on upgrades to Windows 8 Pro expired yesterday. Up until January 31st, owners of previous versions of Windows could upgrade to the latest iteration of their flagship OS for just $39.99. Now it goes back up to a minimum of $199.99. READ MORE |
Malware is more likely to come from advertisements on seemingly legitimate sites than on those previously thought to be more dangerous, such as adult content sites or those offering illegal pharmaceuticals, Cisco said in its recently released Annual Security Report [PDF]. READ MORE |
When it comes to relatively new technologies, few have been developing at the relentless pace of mobile. But with that development has come a serious threat to the security of personal information and privacy. READ MORE |
Mobile app developers should provide real-time disclosures to users on the personal information they collect and get permission to collect sensitive information, the U.S. Federal Trade Commission has recommended. READ MORE |
Continued sales gains in the last three months of 2012 have propelled Samsung to within 10% of Apple's smartphone market share, according to the latest research from the NPD Group. READ MORE |
As more companies adopt a bring-your-own-device (BYOD) approach to mobile, many are getting caught by hidden costs. But virtualization titan VMware has bucked that trend. VMware CIO Mark Egan explains how his company accomplished its feat. READ MORE |
LinkedIn's redesigned Alumni tool helps you find contacts from college and gives you insights into the companies they work for, the fields they work in and where they live. Here's how you can use the tool to help find an MBA program or land that dream job. READ MORE |
Intellectual property company I/P Engine has sued Microsoft for infringing two search patents it acquired from Lycos. READ MORE |
You just read about another online database hack, and now 4 million users' names and passwords are floating around the Internet--and you have a sinking feeling that one of them might be yours. And then there are the security breaches you don't hear about, the ones that leave nasty surprises in your inbox or on your credit card statement. READ MORE |
|
No comments:
Post a Comment