Thursday, February 13, 2014

IE10 under attack as hackers exploit zero-day bug

Ford exec says it doesn't collect or share car location data | Apple shifts to hardware-first TV strategy with revamped set-top box

Computerworld Wrap-Up

Forward this to a Friend >>>


IE10 under attack as hackers exploit zero-day bug
FireEye today said it had discovered that attackers are actively exploiting a new, unpatched vulnerability in Internet Explorer 10 (IE10). Read More


WHITE PAPER: IBM

Onboarding 2013 - A New Look at New Hires
This study of 230 organizations, conducted in January and February 2013, will explore the best practices organizations use to transform basic new hire orientations into strategic initiatives and how they leverage world-class technology to boost productivity, engagement, and retention. Learn More

In this Issue


WEBCAST: Druva

Druva inSync: Endpoint Data Protection & Governance
75% of today's workforce is mobile, so you now need to think about protecting corporate data on laptops and mobile devices. Druva inSync's integrated solution enables you to effectively protect and govern this endpoint data. Watch Now!

Ford exec says it doesn't collect or share car location data
A Ford executive told U.S. Sen. Al Franken (D-Minn.) that the automaker does not collect or share location data from cars without the operator's explicit permission. Read More

Apple shifts to hardware-first TV strategy with revamped set-top box
Apple is gearing up to launch a revamped Apple TV, but will not push into the television market this year, as many assumed. Read More

Consumer groups oppose Comcast-Time Warner Cable deal
Antitrust enforcement agencies should reject a proposed $45.2 billion acquisition of Time Warner Cable by Comcast because it would give the combined company huge market power in the broadband and cable TV industries, a handful of consumer and digital rights groups said. Read More

Verizon jumps into price war with 'More Everything' plan
Verizon Wireless jumped into a growing price war with other national carriers by announcing a "More Everything" plan that doubles the data allowance for some customers, including small businesses. Read More

Intel wants to be the 'operating system' for big data
Intel is continuing to build out its array of software tools for the Hadoop open-source big data processing framework, with an emphasis on the security and reliability features demanded by large enterprises. Read More

Federal smartphone kill-switch legislation proposed
Pressure on the cellphone industry to introduce technology that could disable stolen smartphones has intensified with the introduction of proposed federal legislation that would mandate such a system. Read More

Dozens of rogue self-signed SSL certificates used to impersonate high-profile sites
Dozens of self-signed SSL certificates created to impersonate banking, e-commerce and social networking websites have been found on the Web. The certificates don't pose a big threat to browser users, but could be used to launch man-in-the-middle attacks against users of many mobile apps, according to researchers from Internet services firm Netcraft who found the certificates. Read More


WHITE PAPER: LogMeIn

Five Tips for Improving Customer Experience
This paper conveys how the pressure to increase customer satisfaction metrics with less funding will increase as companies look for new ways to differentiate their services and reduce customer churn. Learn More. Learn More

Car system anticipates what a driver needs
Mitsubishi prototype uses predictive agent to offer choices on a HUD for controlling navigation, phone and other car systems. Read More

Privacy, consumer groups ask court to reject Facebook ads settlement
A coalition of consumer and privacy groups will ask a U.S. court to reject a settlement that allows Facebook to use minors' pictures in advertisements on the site without their parents' consent. Read More

Smartwatch shipments hit 1.9M in 2013
Global smartwatch shipments reached 1.9 million units last year, and Google's Android mobile OS captured a 61 percent market share, according to Strategy Analytics. Read More

HP adds private catalogs for enterprise apps
Hewlett-Packard is launching a service that could help organizations better manage their Android and iOS mobile apps on employee-owned devices, supporting the BYOD (bring your own device) trend. Read More

Jonny Evans: Apple's iPhones aren't worth killing for
Your iPhones aren't worth killing for, Apple confirms in its 2014 Supplier Responsibility Report, where it says it is doing everything it can to avoid using conflict minerals. Read More

JR Raphael: It's time to rethink the Android upgrade standard
Why should 18 months be an acceptable one-sided standard for when Android phones can be abandoned? We can do better -- and it's time to make it happen. Read More

Preston Gralla: Will a 'Windroid' Windows-Android mashup be Microsoft's new love child?
Reports say Microsoft is considering letting Android apps run on both Windows and Windows Phone. Is this yet one more sign that the company is embracing Android as part of its core business? Read More


FREE SHARK TANK T-SHIRT
Clueless Consultants? Bungling Bosses? Useless Users? Tell me your tale. If it gets published, you get a sharp Shark shirt. Shark Tank FAQ

DIGITAL SPOTLIGHT: THE CONSUMERIZATION OF TECHNOLOGY

In our in-depth report, we chronicle how Android is exploding in the enterprise, document how mobile device management is morphing to meet new demands, reflect on the ways Google has developed into a surprisingly powerful ecosystem for end users, and share observations on BYOD's role in spawning a new army of empowered workers.

This free, 28-page magazine-style report is available now. [Registration required]

To read the report, click here.

KEEP UP WITH THE LATEST NEWS ON CONSUMERIZATION
Our weekly Consumerization of IT newsletter covers a wide range of mobile hardware, mobile apps, enterprise apps and IT trends related to consumerization. We cover BYOD, smartphones, tablets, MDM, cloud, social and how consumerization affects IT. Stay up to date with news, reviews and in-depth coverage.

JOIN THE COMPUTERWORLD CONVERSATION ON GOOGLE +
Be sure to add Computerworld to your Google+ circles to keep track of breaking news, features, blogs, tech reviews and career advice.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL
A recent survey found that 40% of tech support workers had to remove malware from devices after employees visited adult content sites. Is this a problem at your company?

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_dailynews as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2014 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **


 

ads

Ditulis Oleh : Angelisa Vivian Hari: 1:27 PM Kategori:

0 comments:

Post a Comment

 

Blog Archive