MUST READ Intel Ivy Bridge: What Enterprise IT Gains By Art Wittmann ARM will own the smartphone market, Intel will own the desktop and high-end laptop market, and the space in between the two will likely become more confused.
iPhone Sales Crush The Competition At AT&T Apple's iPhone outsold other smartphones nearly 4-to-1 during AT&T's first quarter. The company activated a total of 5.5 million smartphones, boosting smartphone subscribership to nearly 60%.
Don't forget to catch today's episode of Valley View, our live Web TV show, at 4 pm PT/7 pm ET. We've got a great line-up: • Zynga CTO Allan Leinwand • Hands-on technology demonstrations from DataSift and Proton Media • A unique look at the latest from ARM at the Valley View Whiteboard • Prize giveaways and much more!
DOWNLOAD INFORMATIONWEEK GOVERNMENT'S DIGITAL ISSUE Hacktivist and cybercriminal threats concern IT teams most, our first Federal Government Cybersecurity Survey reveals. Here's how they're fighting back.
Also: Why federal efforts to cut IT costs don't go far enough, and how the State Department is enhancing security.
FEATURED WHITEPAPERS How to Secure Mobility in an Increasingly Remote Workforce In 2010, more than 26 million Americans, or nearly 20 percent of the U.S. workforce, worked from home or remotely for an entire day at least once a month, according to Telework 2011. These statistics make it clear: A good chunk of our workforce has more than one office. Download this white paper to understand the advantages of connecting remotely while maintaining the correct levels of security and governance. Download Now (Registration Required)
10 Essential Android Apps For SMBs No glitz, no glamour, just results: These 10 budget-friendly Android apps help SMB users simplify everyday tasks and power through to-do lists.
10 Massive Security Breaches They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
Oracle Vs. Google: Tour The Evidence Oracle and Google continue to fight a nasty courtroom battle over patent and copyright claims involving Java and mobile phones. Consider some of the crucial evidence introduced so far.
Client-Side Storage with Pamela Fox Pamela Fox, founder of EatDifferent, discusses Client-Side Storage and how new APIs let you make use of powerful clients to improve both performance and user experience. Watch
Does America's Next "Road to Prosperity" lie in Rural Sourcing? The global economy has driven business out of America. In small towns, this tends to be a matter of life or death for their internal economy. At the same time, companies are finding that the quality of outsourcing their IT and development to other countries is lacking. A solution has emerged that solves both issues, rural sourcing. We discuss this trend and how it benefits the individual, America and businesses. It happens Tuesday, May 22, 2012. More Information & Registration
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@example.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.