Monday, 3 February 2014

Windows XP rules, at Windows 7 and 8's expense

Windows 8.1 Update 1 leaks -- to widespread yawns | Target credential theft highlights third-party vendor risk

Today's InfoWorld Headlines: Wrap Up

Forward this to a Friend >>>


Windows XP rules, at Windows 7 and 8's expense
XP is still going strong. At the current rate of attrition, it's highly likely that XP will still be running on at least 20 percent (and possibly 30 or 40 percent, depending on how you count) of all PCs by the time Microsoft ends support. Read More


WHITE PAPER: AT&T

Getting BYOD Management Under Control
As they bring their own personal devices to work, employees are demanding access to corporate data in real time. IT must respond to BYOD, balancing productivity gains with security and user privacy. A recent IDG Research survey found many IT professionals saw advantages in cloud-based Mobile Workspace Management (MWM) technology. Learn More

WHITE PAPER: AT&T

Four Keys to Choosing a Holistic Mobile Management Solution
Getting peak value from mobile technologies takes a wide range of applications and services. Here are four capabilities every end-to-end mobile management solution must include. Learn More

Windows 8.1 Update 1 leaks -- to widespread yawns
A Jan. 14 version of the much-anticipated upgrade to Windows 8.1 has appeared on several pirate download sites. The improvements are, to put it charitably, underwhelming. Read More

Target credential theft highlights third-party vendor risk
Target's disclosure that credentials stolen from a vendor were used to break into its network and steal 40 million credit- and debit-card numbers highlights the fact that a company's security is only as strong as the weakest link in its supply chain. Read More


WEBCAST: Viewfinity

Webcast: Windows Admin Privileges and Application Control
Join us for a use case presentation probing into the cause and effect of IT security loopholes created by Windows local admin privileges and the lack of application control. In this webcast Derek Melber, MVP, will explain how combining least privilege and application control can provide an optimal solution for securing endpoints. View Now

Who writes Linux? Corporations, more than ever
The Linux kernel is now written, more than ever before, by for-profit corporations, many of which are in direct competition with each other. The total share of contributions by such outfits is rising year over year. Read More

Forrester: HTML5 apps still not as good as native apps
Most of the time, apps developed solely using HTML5 took longer to deliver than planned. With non-native responsive frameworks, the greatest amount of time was lost testing and fixing issues. Read More



Do You Tweet?
Follow everything from InfoWorld.com on Twitter @infoworld.

You are currently subscribed to infoworld_todays_headlines_wrap_up as oraclepedia@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

To contact InfoWorld, please send an e-mail to online@infoworld.com.

Copyright (C) 2014 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@infoworld.com **