InfoWorld Mobilize | | Learn how to free up the space your smartphone or tablet secretly uses, and get all the OS and app updates coming to you | | Issue highlights 1. Microsoft woos Android, iOS devs with porting toolkit 2. Mobile worker guilt hits most young workers 3. INSIDER Mobile device management continues to broaden | Webcast: Lockheed Martin During this Live Webinar on May 20th @ 1PM, a panel will discuss findings of the Ponemon Survey: Risk and Innovation in Cybersecurity Investments. The panel will explore key findings from the survey and discuss effective methods of cybersecurity measurement and implementation. Learn More | At Build, Microsoft unveils plan that lets developers reuse Java, C++, and Objective-C code for Windows READ MORE | Smartphones and smartwatches make it easier to do work at home and vice versa, and that can lead to guilt READ MORE | Think 'enterprise mobility management,' which includes app and data security, among other things READ MORE | White Paper: Veracode SQL Injection attacks can occur when a web application utilizes user-supplied data without proper validation or encoding as part of a command or query. This leaves an opening for potential hacks or attacks as specially crafted user data can trick the application into executing unintended commands or changing data. Learn More | TODAY'S KEY TECH STORIES, DELIVERED TO YOUR INBOX FIRST THING Start your workday with InfoWorld Daily, and find out what the tech world will be talking about all day. Subscribe now! Join the IDG Contributor Network The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today. | | | | | |
0 comments:
Post a Comment