Android security update focuses on media files.

Video: No more open source foundations, please!.

InfoWorld Daily: Afternoon Edition
November 05, 2015
featured image

Got Windows 10? Microsoft's push comes to shove

We all learned in kindergarten that bullying and breaking promises is wrong -- so cut it out, Microsoft. READ MORE

Twitter Facebook LinkedIn
 

Issue highlights

1. Android security update focuses on media files

2. Video: No more open source foundations, please!

3. JavaScript upgrade will nix object observation feature

4. INSIDER Review: AWS Lambda redefines 'on demand'

White Paper: OpenText

Enterprise Business Intelligence Platforms

The report rankings were compiled against 60 criteria, as a result of Forrester Research product evaluation surveys of 59 user companies, and interviews with 11 vendors. According to the report, "OpenText offers reporting and analytics platforms that can scale to the needs of large enterprises." Learn More

Android security update focuses on media files

Do you like audio and video on your Android device? They lie at the heart of recent vulnerabilities in Google's latest security update. READ MORE

Video: No more open source foundations, please!

Not every new open source project needs a new foundation. In fact, the rise of all these new foundations could be hurting the open source cause. READ MORE

JavaScript upgrade will nix object observation feature

The technology landscape has changed since Object.observe was first created, limiting its present usefulness. READ MORE

INSIDER

Review: AWS Lambda redefines 'on demand'

Amazon's simple, scalable compute service runs your functions whenever needed, but is limited to Java, Python, and Node.js. READ MORE

White Paper: Sophos Inc

Deciphering the Code: A Simple Guide to Encryption

With data breaches and accidental data loss hitting the headlines more than ever; the role of encryption in your security plan continues to grow in importance. This whitepaper provides an overview of encryption, things to consider when planning an encryption strategy and what to look out for when choosing an encryption solution. Learn More

GET THE DEEP TECHNOLOGY INSIGHTS YOU NEED

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO, Network World, CSO, ITworld, and other IDG Enterprise publications.

Sign up at no cost today!

Follow InfoWorld

Twitter Facebook LinkedIn Google+

You are currently subscribed to infoworld_daily as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: online@infoworld.com

Copyright © 2015 InfoWorld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@infoworld.com. **