TechWeb

Why Apple Needs More iPhones | 10 Facts: Secure Java For Business

Jan 15, 2013 (07:01 AM EST)

Read the Original Article at http://www.informationweek.com/news/showArticle.jhtml?articleID=240146330


InformationWeek Daily
InformationWeek Daily 
Join the community
FacebookTwitterLinkedIn
  Tuesday, January 15, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist 10 Facts: Secure Java For Business Use
By Mathew J. Schwartz
Businesses that rely on Java must now take additional steps to keep employees safe. Here's where to start.

RELATED
Microsoft Patches Critical IE Vulnerability
Red October Espionage Network Rivals Flame

Apple Needs More Than One iPhone To Compete
Apple needs to do better than one iPhone a year if it wants to maintain its position in the smartphone market.

Obama's Developer Brain Trust: Inside The Big Battle
Tech leaders for the Obama for America team discuss their re-election project -- and a business-like culture clash between free-wheeling nerds and their goal-oriented bosses.

SAP Sweetens Hana Deal With Free Sybase Database
Not everything demands in-memory performance, so SAP is bundling a conventional database for customers licensing SAP BusinessSuite to run on Hana.

Swartz Suicide Puts JSTOR Academic Database In Spotlight
Death of internet activist Aaron Swartz renews push for online content and copyright debate.

IBM, Universities Team Up To Build Data Scientists
Big Blue program aims to prepare students for a workplace increasingly driven by data.

5 Secrets To Zuckerberg's Success
Mark Zuckerberg's Facebook adventure gets examined in a new book that doesn't shock, but serves as a social business primer.

QUOTE OF THE DAY
"A ship in harbor is safe, but that's not what ships are for." -- John Shedd

ALSO SEE
IBM, Universities Team Up To Build Data Scientists
5 Secrets To Zuckerberg's Success
Strategy: The Next Phase of Meaningful Use
Git for the Enterprise - Promises and Pitfalls
CES 2013: 7 Standout Technologies
Is Your Network Ready for BYOD?
2013 InformationWeek 500: Nominations Now Accepted

Download our iPad App

JOIN THE CONVERSATION
Posted By AustinIT:
"All software has flaws. This article is about Java, not about IE. You taking an opportunity to take a pot shot at MS is just plain annoying."
In reply to: "Java Under Attack Again, Disable Now"
View Entire Response | Post Your Own Reply

 Digital Issue 
DOWNLOAD INFORMATIONWEEK GOVERNMENT'S LATEST DIGITAL ISSUE
Mobile applications are the new way to extend government information and services to on-the-go citizens and employees.

Also: A new initiative aims to shift the 17-member Intelligence Community from agency-specific IT silos to an enterprise environment of shared systems and services.


DOWNLOAD NOW FREE (Registration Required)

 

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Strategy: The Next Phase of Meaningful Use
Stage 2 raises requirements for health information exchanges, EHR interoperability and patient involvement. For the first time, providers will have to engage patients in their own care or risk losing out on incentive payments.
Download Now (Registration Required)

Featured Report
Research: 2012 Application Security Survey
Tried-and-true methods like defense in depth can provide breathing room while you get a secure SDLC in place-a job still facing 56% of our 475 respondents. And they'd better get moving, because 51% of those with secure SDLC programs on their radar have developed and/or assumed responsibility for securing 11 or more Web apps.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacerspacerspacer
FEATURED WHITEPAPERS
Git for the Enterprise - Promises and Pitfalls
Git is the world's leading distributed version control system (DVCS). Enterprise adoption for Git however has been slow. Concerned with security breaches, compliance violations and lack of governance, many chose to wait and see.
Download Now (Registration Required)


Your Next Generation Data Center Starts with Virtualization
Server virtualization is perhaps the most significant evolution in information technology of this time. But why aren't more organizations taking advantage of both its immediate and long-term benefits? This paper will explain why and how you should take the first steps toward your next generation data center.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
CES 2013: 7 Standout Technologies
What happens at CES 2013 doesn't stay in Vegas. From giant tablets to $20,000 televisions, take a peek at a few early standouts for gadget lovers.

CES 2013: 5 Dumbest Ideas
CES launches some of the coolest gadgets on the planet. But with more than 3,000 exhibitors this year, not everyone could be a winner.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

CES 2013: 9 Cool Gadgets
Consumer Electronics Show is a tech smorgasbord. Here are nine products that attest to the show's overwhelming variety.

Oracle Fixes Zero Day Java Flaws: Patch Now
Java 7 update, released Sunday, fixes bugs widely targeted by crimeware toolkits. Other critical bug updates coming later this week from Oracle and Microsoft.

 

SLIDESHOWS
Big Data Analytics Masters Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.   View Now

ALSO SEE
10 Social Networks For Special Interests
8 Key Changes In Microsoft SharePoint 2013

MORE SLIDESHOWS
spacerspacerspacer
VIDEOS

CES; Synaptics senses mobile touch potential
Synaptics is moving on from simple touchpad sensors to a more touch integrated future, from better designed ThinTouch capacitive keyboards to mobile touchscreens that work even with gloved hands.   Watch

ALSO WATCH
CES: Maxim shows heart, turns up volume on audio
NXP on route to automotive future

MORE VIDEOS
spacer
 
WEBCASTS
Is Your Network Ready for BYOD?
Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy. More Information & Registration

Click here
 
RESOURCES AND EVENTS
2013 InformationWeek 500: Nominations Now Accepted
Nominate your company for the 2013 InformationWeek 500 -- our 25th annual ranking of the country's most innovative users of business technology. Organizations with $250 million or more in revenue may pre-register now to receive more information.
Deadline is April 12



This e-mail was sent to EmailAddress

InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.