Tuesday, June 4, 2013

Black Hat: It only takes a minute to hack an iPhone

  Preston Gralla: Can price cuts and going small save Windows RT? | JR Raphael: Pop quiz: What's missing from today's Computex Android announcements?
 
  Computerworld Blogs

Forward this to a Friend >>>


Jonny Evans: Black Hat: It only takes a minute to hack an iPhone
Black Hat: Security researchers claim to have figured out how to hack an iPhone within one minute using a modified USB charger. Read More


WEBCAST: VMware

Virtualizing SAP
This KnowledgeVault has answers to questions in a series of concise videos, webinars and assets that explain how SAP and VMware work together to deliver optimal application performance in a virtualized environment. View Now!

RESOURCE COMPLIMENTS OF: LogMeIn

Powerful and secure remote support with LogMeIn Rescue
For companies that want to compete in their industry, improving the customer experience is a top priority. To do that, having an on-demand remote support solution is essential. That's why companies around the world choose LogMeIn Rescue to provide powerful, secure support of any device, anytime, anywhere. Rescue offers a simple, reliable interface packed with all the features technicians want. Check out LogMeIn Rescue to learn more and start your free trial today.

Preston Gralla: Can price cuts and going small save Windows RT?
Microsoft is in the midst of an all-out blitz to save Windows RT, using price cuts and promoting smaller-sized devices. Will that be enough to revive the floundering Windows 8 offshoot, or will Windows RT go the way of Microsoft Bob? Read More

JR Raphael: Pop quiz: What's missing from today's Computex Android announcements?
Android device news is flowing fast this morning, but almost every single announcement is missing one key element. Can you spot what it is? Read More


WEBCAST: Workday

The Mobile Enterprise
Today's mobile enterprise requires important data anywhere, anytime. And with mobile enterprise applications, IT needs to offer simple, easy-to-use apps that employees will embrace – without compromising security. View Now

Darlene Storm: Future authentication superpower: Pop a daily password pill or wear a digital tattoo?
At the recent All Things Digital D11 conference, Regina Dugan, the former DARPA head talked about Motorola Advanced Technology and Project innovations for authentication. The future of authentication could include wearable authentication such as digital tattoos, or managing passwords by popping a pill every day that would work as an "authentication vitamin." Then your entire body is your authentication token and "it "becomes your first superpower" as one pill a day would authenticate you on your phone, computer, door, or car. Read More

Sharky: Which part of Enter...oh, all THOSE parts
It's the late 1980s, and this IT pilot fish is developing and supporting early PC-based security alarm systems for big sites like prisons and power stations. But for one engineers on the customer side, it just isn't working. Read More

 

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
BYOD has moved beyond smartphones and tablets to PCs. In fact, about 25% of employees in businesses with more than 10 employees have bought the primary PC they use for work, meaning companies are buying fewer PCs. Do you think BYOD is to blame for slack PC sales?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.

 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_blogs as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:30 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive