Tuesday, July 9, 2013

Top Stories of the Day // July 9, 2013

TechCrunch

TechCrunch Disrupt SF returns in September and the countdown is on: only 7 days left to get Extra Early Bird tickets. Register Now!
Today's Top Stories // Jul 9, 2013

American Intern

I live in the Milano building in Crescent Village in North San Jose.... read more

Facebook Slowly Making Home More Livable With Customizable Launcher Dock And Now Folders

When Facebook Home launched, its Launcher was a joke. No dock, no folders, no widgets -- basically none of the personalization Androiders know and love. Even if... read more

Foodspotting Co-Founder Soraya Darabi Debuts New E-Commerce And Retail Startup Zady

There's been some buzz around Foodspotting co-founder Soraya Darabi's next project. Today, we have more details on what Darabi has been working on. Along with... read more

Apple Patents An In-Car Entertainment And Information System With Tactile Feedback

Apple has been granted a patent today for an in-car, touchscreen telematics system that would provide drivers with tactile feedback to help them keep their eyes... read more

More Nokia Lumia 1020 Hardware And Camera Details Surface Ahead Of Official Launch

In case you're somehow immune to all of Nokia's incessant teasing, the company's going to unveil a shiny new smartphone on Thursday in hopes that a tremendous... read more

Samsung Moves In On Apple's Turf As Construction Starts On Its New Silicon Valley Headquarters

Samsung will break ground on its new U.S. headquarters in San Jose this week. Designed by architecture firm NBBJ, the new campus is part of Samsung's... read more

Google Releases Fix For Major Android Flaw To OEMs, Users Now Waiting On Them To Patch

Google has released a fix to its Android OEMs for the master security hole unearthed by Bluebox Security, according to ZDNet. The publication gained... read more

Soundwave, The Music Discovery App Backed By Mark Cuban, Is Placing A Big Bet On Big Data

What happens when your app manages to attract The Woz as a fan, Mark Cuban as an investor, Stephen Fry to help launch, and you're featured by Apple and Google... read more

Viber Updates Desktop, Windows Phone 8 Apps With Phone-Switching Integration, Stickers, And More

Viber has just pushed an update to two of its newest versions of the app, Desktop and Windows Phone 8. If you'll recall, Viber launched a desktop version of the... read more

ImpressPages Raises €200k To Pull More Users Into Its Open Source, Drag-&-Drop CMS

ImpressPages, a Lithuanian startup behind an open source, drag and drop, widget-based web content management system aimed at broadening access to web... read more

Read more at techcrunch.com


CRUNCHGOV DAILY ROUNDUP

Play With An MIT Tool That Visualizes How The NSA Can Map Your Relationships

The brainiacs at MIT created a cool visualization program to map how the National Security Agency can understand your relationships based on who you contact via… read more

Read more at techcrunch.com/crunchgov/

To forward this newsletter to a friend, click here.

TechCrunch

Comprehensive Data Recovery | 5 Security Tools Every SMB Must Have | Security Implications of Big Data

If you have trouble viewing this email, read the online version.

masthead
July 8, 2013
Follow us:    
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>

Small Business, Big Target
Why SMBs are a big target of hackers, regulators, and security-conscious partners--and what to do about it?



Read More

Should You Use Software-Defined Flash Storage?
"Software definition" leverages the processor's power to do things that used to require dedicated hardware. So, what does that mean for flash?



Read More



 
 More Resources
Requirements Checklist for Choosing a Backup and Recovery Service Provider
Find out the top five questions you should be asking when selecting the most qualified backup and recovery service provider.

How to Secure Your Wireless Network
It isn't hard to set up security for the wireless router in your basement: change the SSID, pick a strong password and perhaps install VPN software for remote access. But securing wireless networks in a business environment is much more demanding. Learn best practices that can help administrators go beyond the basics of wireless security to provide advanced security, manageability and accessibility.

Evolving Endpoint Malware Detection, Dealing with Advanced and Targeted Attacks
Advanced malware targeting employee endpoints is a major threat to corporate intellectual property, regulated data and financial assets. Get insight into how advanced malware challenges traditional defenses to take advantage of the increased exposure of employee endpoints.

Gartner 2013 Magic Quadrant for Endpoint Protection Platforms
Symantec Endpoint Protection 12 and Critical System Protection are positioned highest in Gartner's Magic Quadrant for completeness of vision and the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.



DATA RECOVERY

Comparison: Comprehensive Data Recovery Sponsored by Asigra
Comprehensive data recovery-it's a tall order. We asked a lot from vendors in this Buyer's Guide, from the ability to back up data from mobile devices, desktops, and physical and virtual servers to local and cloud repositories to the ability for end users and IT to restore individual files, directories, and entire devices or disk partitions on a self-service basis. Learn which companies pull it off.

2013 State of Storage Sponsored by Asigra
A burst of innovation in storage hardware and software means better performance and integration. Some highlights: Ethernet is taking off, with a combined year-over-year boost of 20 points in iSCSI and FCoE; 60% now encrypt at least some stored data; and good help is hard to find, as 26% cite insufficient staffing as a top concern, up from 19% in 2012.

SECURITY

Security Implications of Big Data Strategies Sponsored by IBM
To understand how to secure big data, you have to understand what it is-and what it isn't. When it comes to building big data clusters, organizations are finding that many of the best practices for securing such clusters are the same used to secure any corporate data. However, there are some big differences as well. Learn how to alter your security strategy to accommodate big data-and when not to.

5 Security Tools Every Small Business Must Have Sponsored by Symantec
SMBs may not have the IT resources that their bigger peers do, but they do have the same security responsibilities. Fortunately, SMBs can build a strong security posture using a few key products, many of which are free. This Dark Reading report examines the challenges that SMBs face when it comes to security and recommends the five security tools every SMB must have.

Insecurity with Java Sponsored by Imperva
In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?

Building And Enforcing An Endpoint Security Strategy Sponsored by Symantec
Today's, the endpoint could be any number of devices operating in any number of locations. With its technology changing so rapidly, what's the best approach to building an effective, enforceable endpoint security strategy? Learn what steps organizations should take toward developing a security strategy that is both effective and practical-across the enterprise.

InformationWeek Reports is brought to you by Asigra, IBM, Imperva, Symantec, Trusteer and UBM Tech.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy