Thursday 5 March 2015

Android tune-up: How to boost performance while you wait for Lollipop

What's next after Google Fiber? Google Wireless

Is data on your new Lollipop Android device encrypted? Maybe not

Technology: Google
March 05, 2015

Android tune-up: How to boost performance while you wait for Lollipop

We put several of the most popular third-party battery and performance management apps to the test to see whether they're worth a download as you wait for Lollipop to land and to find out how they stack up against Android 5.0's improvements.

READ MORE
 

Issue highlights

1. What's next after Google Fiber? Google Wireless

2. Is data on your new Lollipop Android device encrypted? Maybe not

3. Google debunks reports of change to search rankings

4. Google will stop patching Chrome on Android 4.0 next month

White Paper: Damballa

ESG Lab Spotlight: Damballa Failsafe with HP TippingPoint

The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. Damballa and HP have partnered to bring a joint solution to the market to help automate responses to infections. Learn More

What's next after Google Fiber? Google Wireless

Google is preparing to offer its own wireless service, but the exact plans remain a mystery. It currently sounds as if the company is planning a service that augments existing wireless connectivity. READ MORE

Is data on your new Lollipop Android device encrypted? Maybe not

Google has relaxed a requirement for manufacturers to turn on encryption by default in Lollipop, leaving it up to manufacturers to turn encryption on or off. This is a surprising change, considering the company's previous pledge to strengthen defenses around personal data. READ MORE

White Paper: Proofpoint, Inc.

Analysis of Cybercrime Infrastructure

Proofpoint security researchers have published an analysis that provides a detailed and rarely seen inside view of the infrastructure, tools and techniques that enabled a cybercrime operation to target online banking credentials for banks in the United States and Europe, infecting over 500,000 PCs. View Now>>

Google debunks reports of change to search rankings

After Google researchers posted a paper last month on the site arXiv.org, an online archive of scientific research, rumors began spreading that Google was working on changing the way it ranks its search results. READ MORE

Google will stop patching Chrome on Android 4.0 next month

By the time Google halts updates to Chrome on Ice Cream Sandwich (ICS), the three-year-old mobile operating system's share of all Android editions should have shrunk to just above 5 percent. READ MORE

White Paper: Proofpoint, Inc.

Advanced Threat Detection, Necessary but not Sufficient

The only thing worse than not detecting an advanced threat is detecting one, and still ending up in the headlines. The headlines continually include stories reporting that an organization detected a threat weeks or months earlier, but due to a poor incident response process, allowed the threat to grow, move laterally, and cause even more damage. Learn More

Follow InfoWorld

You are currently subscribed to infoworld_tech_google as oraclepedia@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

Copyright (C) 2015 InfoWorld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@infoworld.com. **