Monday, September 30, 2013

Google, Motorola try argue for Apple FRAND 'abuse'

Preston Gralla: Incroyable! Windows Phone rockets to double-digit share in European markets | Antone Gonsalves: Become a hacker. No coding necessary.

Computerworld Blogs

Forward this to a Friend >>>


Jonny Evans: Abusive? Google, Motorola try argue for Apple FRAND 'abuse'
There's a new chapter in the smartphone wars opening up as Apple nears direct battle with Google, as the European Commission hears Motorola Mobility attempt to argue that it has not used industry standard patents to harm competitors (Apple). Read More


RESOURCE COMPLIMENTS OF: DEMO Conference

What's trending in wearable computing and digital money?
Come to DEMO to discover 100s of the best new products from around the world, including wearable computing, digital money, mobile, health, internet, enterprise, big data and more. All products are handpicked by top VC experts for their innovative design and market potential. See tomorrow's big ideas launch at DEMO. Register now to save!

WEBCAST: Dell VMware

A Smarter Approach to Data Protection
The three videos in this series will explore the dramatic impact that unprecedented data growth and other developments have had on the data center, the need for an end-to-end approach to data protection, and how Dell and VMware enable enterprises to transform IT into a center of business innovation. View Now

Preston Gralla: Incroyable! Windows Phone rockets to double-digit share in European markets
Windows Phone continues to make big gains in Europe, rocketing to double-digit market share in France and Great Britain, and nearly hitting 10% across key markets. Will it be able to soon replicate its success in the U.S. and across the world? Read More

Antone Gonsalves: Become a hacker. No coding necessary.
Anti-virus vendors say software tools for infecting Android apps with malware have become so easy to use that anyone can become a hacker. While that's partly true, there's still no reason for most people to buy an AV product. Read More

Stuart Kippelman: Passwords stink. Is there a replacement?
Although MIT developed the first computer password in 1961, it's a technology that can be traced back far earlier. After a quick Internet search, I discovered that the use of passwords dates back to the Spartan military in 700 BC. So much for progress. One would think that after 2,700+ years we would have come up with a better way of doing things. Are there other possible options? Read More


WEBCAST: Dell VMware

Data Protection Strategies to Make Government More Efficient
This KnowledgeVault focuses on some of the key data protection challenges that today's enterprises must tackle. Specifically, the three videos in this series will explore the dramatic impact that unprecedented data growth and other developments have had on the data center View Now

Preston Gralla: Big businesses say Microsoft will fail in mobile
Microsoft's most loyal backers -- big enterprises -- don't hold out much hope for the success of Windows Phone and Windows tablets. A recent survey found that 60% of IT staff, CTOs, and others believe that Microsoft's mobile efforts will ultimately fail. Read More

JohnWThompson: The manufacturing renaissance and the middle class
Is the United States in the midst of, or on the brink of, a manufacturing renaissance? Will the rebirth of the manufacturing sector help rebuild our country's middle class? It may be too early to accurately answer these questions, but one thing is clear. A thriving manufacturing sector and growing middle class are critical to our innovation and economic success. Read More

Patrick Thibodeau: Northeast Utilities brings on H-1B workers
Northeast Utilities may have been preparing for sometime to transfer jobs offshore Read More

Sharky: Thanks so much, now GO AWAY!
This pilot fish is engaged by a very large corporation to conduct Sarbanes-Oxley audits of some of the company's financial and quality-control applications. But when he turns on error-checking for the batch jobs, there's a surprise. Read More


DIGITAL SPOTLIGHT: SECURITY

In our in-depth report on security, we take a closer look at mobile security and the tricky balancing act that comes when you want to give employees greater access to data but also need to keep corporate information safe. Also, we look at how companies are using new technologies to lock down their supply chains, and how one state agency dealt with thousands of security mandates by building a risk framework from the ground up.

This free, 28-page magazine-style report is available now [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
Despite months of leaks regarding Apple's announcement this week, it still managed some surprises. What do you think the most important news from Apple's iPhone unveiling was?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_blogs as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2013 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 8:01 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive