Monday, February 13, 2012

iPad 3 Wishlist | Google Wallet Cracked

If you have trouble viewing this email, read the online version.

TechWeb Mobile And Wireless News Update -- Issue Highlights:
TOP STORY: iPad 3: 9 Things We Really Want
ALSO SEE: Google Wallet PIN Cracked
ANALYTIC REPORT: Strategy: Understanding Software Vulnerabilities
WHITE PAPER: How Encrypting Content Reduces Liabilities and Costs
MOST POPULAR: 6 Predictions For Business Intelligence In 2012
BLOG: How Samsung Screwed Up Its Super Bowl Ad
WEBCAST: Don't Get Hooked by the Latest Phishing Attacks
RESOURCES: Virtual Event: Social Analytics: The Bridge To Business Value

TechWeb
MOBILE & WIRELESS NEWS UPDATE 
  Monday, February 13, 2012
REPORTS & WHITEPAPERS   |     MOST POPULAR   |     BLOG   |     WEBCASTS   |     RESOURCES  
TOP STORY
iPad 3: 9 Things We Really Want
Apple, as usual, is keeping the tablet's specs under wraps. But here's what we want to see.

ALSO SEE
Google Wallet PIN Cracked
Fix for mobile payment vulnerability could require banks to take over some security responsibility.

NOAA Dumps BlackBerrys For iPhones
National Oceanic and Atmospheric Administration wants to cut costs by switching to Apple iPhones and getting rid of its RIM smartphones in June.

9 Powerful Business Uses For Tablet Computers
From the warehouse to the sales floor, see how companies creatively use iPads and other tablets to save time and money, sell more, and delight customers. Tablets may even find a home on garbage trucks.

RIM Updates BlackBerry Mobile Conferencing, App World
Research In Motion updated a wide range of software and services this week for users of its BlackBerry smartphones.

DARPA Tackles Poor Cell Signals In War Zones
Through new Fixed Wireless at a Distance program, military hopes to make connections over both commercial and traditional military mobile devices more reliable.


 

ANALYTIC REPORTS & WHITEPAPERS:
FEATURED REPORTS
Strategy: Understanding Software Vulnerabilities
In this report, we explain how to ensure the best defense by thinking like an attacker and identifying the weakest link in your own corporate data chain.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

spacer spacer spacer
FEATURED WHITEPAPERS
How Encrypting Content Reduces Liabilities and Costs
Data is everywhere, and most of it is not encrypted. Companies need to protect their data to avoid loss of corporate reputation, expensive remediation efforts, loss of goodwill among customers, loss of revenue and other unpleasant results. Learn how encrypting data in transit and at rest can help.
 

TODAY'S MOST POPULAR STORIES @ TECHWEB.COM:
6 Predictions For Business Intelligence In 2012
A look at in-memory analysis, visual discovery, big data, mobile BI, cloud and social BI achievements in 2011 and forecasts for the year ahead.

9 Powerful Business Uses For Tablet Computers
From the warehouse to the sales floor, see how companies creatively use iPads and other tablets to save time and money, sell more, and delight customers. Tablets may even find a home on garbage trucks.

Top 12 Cloud Trends Of 2012
Five years into the cloud computing phenomenon, we're much more aware of the limitations and consequences. Here are 12 trends to watch in the coming year, starting with numbers 7 to 12.

 

INFORMATIONWEEK'S OVER THE AIR BLOG:
Featured  Blogger How Samsung Screwed Up Its Super Bowl Ad
By Eric Zeman
Call it the stylus snafu: Samsung's over-the-top Super Bowl commercial failed to resonate with viewers and earned widespread mocking on Twitter. Here's why.

Apple's Walled Garden: Sledgehammer Needed
By Jonathan Feldman
Friday's revelation of an iOS app with a "hidden" tethering capability shows that walled garden restrictions don't necessarily keep us safer. They do create a monopoly and planned obsolescence. It's time to break down those walls.

Microsoft Windows 8 Unification Plan: Grand, But Risky
By Paul McDougall
Windows 8 and Windows Phone 8 appear to look very much alike. That's great news for users, but can Redmond pull off one OS across desktops, mobile and more?

 

WEBCASTS:

Don't Get Hooked by the Latest Phishing Attacks
Attend this live webinar to learn about the latest trends in phishing attacks and how you can keep your organization safe. It happens Wednesday, February 22, 2012
More Information & Registration
 

RESOURCES AND EVENTS:
Virtual Event: Social Analytics: The Bridge To Business Value
Social media are generating tons of data, but that data only becomes truly valuable when examined in context. Attend this virtual Enterprise 2.0 event and learn how social analytics will provide the bridge to unlocking business value.
It happens March 25-29 in Orlando, Fla.


This e-mail was sent to networking.world@gmail.com

MOBILE AND WIRELESS NEWS UPDATE
-- Published By TechWeb
600 Community Drive
Manhasset, NY 11030


To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here



Keep Getting This Newsletter
Don't let future editions of Techweb's Mobile & Wireless News Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

No comments: