MUST READ Google Maps Updated: 10 Cool Features Tour the latest version of Google Maps, now available on the iPad and the iPhone, boasting better navigation and search tools, including Google Earth's bird's-eye view. SAP Co-CEO Snabe Plans To Step Down Bill McDermott will become sole CEO by 2014 as Jim Hagemann Snabe moves on and power shifts within SAP's executive team. Apple Tinkers With Larger iPhones, iPads Apple has asked suppliers for larger prototypes of its smartphone and tablet, reports The Wall Street Journal. Don't Give Up On The PC The factors hurting the PC market now may not be Intel's fault, but they are Intel's problem. Fix them and we'll talk. Apple Developer Forum Hack Explained Turkish security researcher said his bug report wasn't malicious, disputes Apple's claim that attack compromised information on iOS and Mac OS X developers. Don't Count VMware Out In Rough Seas Wall Street analysts and pundits are busy talking down VMware, but the virtualization pioneer is going through a cycle from which it's likely to bounce back. Moto X: Motorola's Not-So-Bold Rebirth As Motorola prepares to reveal the Moto X, its first smartphone developed under Google's ownership, here's what we expect. | | QUOTE OF THE DAY "Experience is not what happens to you; it's what you do with what happens to you" -- Aldous Huxley | | FEATURED REPORTS and FEATURED WHITEPAPERS | | - Why You Need An App Store
As smartphones and tablets displace PCs as the client device of choice for more workers, software distribution and management strategies must adapt. It's a pull, not push world. Time to get an enterprise app store open for business. - Strategy: Building and Enforcing an Endpoint Security Strategy
In today's enterprise, the endpoint could be any number of devices operating in any number of locations. With endpoint technology changing so rapidly, what's the best approach to building an effective, enforceable endpoint security strategy that works across the enterprise? ... | | | | | | MOST POPULAR NEWS - Mitigating M2M Security Risks in Critical Embedded Systems
Machine-to-Machine (M2M) communication offers enormous potential to expand the capabilities of devices, including remote wireless management and updates. - Quick Tips for Managing Mobile Users
It can be an IT manager's biggest headache ? managing the growing number of remote users that are on the go and exclusively work from their laptops over wireless networks. And when a system fails to restart, a site visit often ... | | | | This e-mail was sent to sojo.blo@gmail.com | InformationWeek Daily -- Published By InformationWeek 600 Community Drive Manhasset, NY 11030 To update your profile, change your e-mail address, or unsubscribe, click here. Thoughts about this newsletter? Give us feedback. | | Keep This Newsletter Out Of Your SPAM Folder Don't let future editions of go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. We take your privacy very seriously. Please review our Privacy Statement. | | | |
|