Wednesday, September 4, 2013

When tech empires fall: 10 companies and products that dominated... and then didn't

Amazon hiring 'top secret' IT staff as it fights for CIA work

Open data initiative kicks off in South Bend, Indiana

ITworld Today
September 04, 2013
Share this email

When tech empires fall: 10 companies and products that dominated... and then didn't

These tech giants had a valuable market locked down. Then they screwed up.

READ MORE
 

Issue highlights

1. Amazon hiring 'top secret' IT staff as it fights for CIA work

2. Open data initiative kicks off in South Bend, Indiana

3. Devs: Microsoft wants your apps for Windows Phone and Xbox One (and Windows tablets and PCs)

4. Researcher claims $12,500 reward for finding Facebook photo bug

5. NSA-resistant Android application 'burns' sensitive messages

6. Unexpected, yes, but Google's KitKat marketing may get the word out

7. File hosting service must scan for copyright infringing files, German federal court rules

8. EMC optimizes VNX hybrid array for flash

Resource compliments of: Data+ Conference

Final Week to Register: Data+ Conference, Sept 8-10, Arizona

Sessions Will Cover: optimizing and building big data strategies, implementing true, advanced analytics, leveraging mobile data and social media, building a secure and accessible data strategy, improving data visualization and reporting, integrating Hadoop and other open source technologies, and more. Register now.

Amazon hiring 'top secret' IT staff as it fights for CIA work

Government private cloud bid represents new approach for Amazon -- one that has put it at odds with IBM. READ MORE

Open data initiative kicks off in South Bend, Indiana

The city enacts an open data plan showing a strong commitment to making ALL public data accessible. READ MORE

Devs: Microsoft wants your apps for Windows Phone and Xbox One (and Windows tablets and PCs)

The theory, at least, is that mobile developers who choose Windows Phone will be able to easily bring their apps to other devices in the Microsoft family, including Xbox One. READ MORE

Researcher claims $12,500 reward for finding Facebook photo bug

A security researcher said Facebook will award him $12,500 for finding a flaw that lets anyone remove photos from another person's profile. READ MORE

White Paper: Code 42 Software, Inc.

Top 3 Reasons Why File Sync/Share is Not Endpoint Backup

Employees unknowingly create corporate data security risks by adopting these easy-to-use, personal applications. Understanding at a high level the primary purpose of each application helps differentiate between them. Read this executive brief to learn the differences. Learn more.

NSA-resistant Android application 'burns' sensitive messages

Silent Circle, a company specializing in encrypted communications, released a messaging application for Android devices on Wednesday that encrypts and securely erases messages and files. READ MORE

Unexpected, yes, but Google's KitKat marketing may get the word out

Google's decision to name its new Android mobile OS KitKat left some people scratching their heads -- isn't that someone else's trademark? -- but the move could raise awareness about the new software. READ MORE

File hosting service must scan for copyright infringing files, German federal court rules

Online file locker services that, like Rapidshare, have a business model that provides an incentive to share copyright protected materials must monitor incoming links to discover infringing files, the German Federal Court of Justice has ruled. READ MORE

EMC optimizes VNX hybrid array for flash

EMC's VNX hybrid storage line is now built for flash first, with revamped software that can take full advantage of multicore processors, producing what the company calls a major boost in performance. READ MORE

White Paper: Polycom

The Great Video Conferencing Debate: Cost Vs. Quality

With new video conferencing solutions available for small and medium businesses, it is possible to have a higher standard of video conferencing without the quality issues presented by consumer products. Are these higher quality business grade solutions worth the higher cost, or do savings from consumer grade versions justify their lower quality? View Now

SPECIAL REPORT:

Tools and strategies to keep the BYOD chaos under control
One key to a successful BYOD program is mobile device management (MDM), where carefully chosen tools and policies let companies maintain control. However, there s a lot of movement in the market and a number of MDM approaches to consider which makes your job more challenging. To get you started, we assembled advice from IT leaders who have successfully deployed an MDM solution.

DON'T MISS...

Famous firsts: The earliest days of your favorite social networks

Jealous much? 8 techy things that can spark office envy

Hey Gen Y'er, want a promotion? Communicate like an old guy

10 overhyped tech products that crashed and burned

Up all night: How the tech elite pushes a crazy workaholic culture

Follow ITworld

Share this email

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

Copyright (C) 2013 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.