Don't fall prey to ad networks peddling dicey links

Internet Explorer takes the lead -- as the most error-prone browser

InfoWorld Daily AM
August 20, 2013
Share this email

The Apple Newton MessagePad revisited: Warts, wins, and all

Our blogger's been playing with his original Apple MessagePad, and the experience left him musing about how far mobile has come and how the fundamentals last a long time.

READ MORE
 

Issue highlights

1. Don't fall prey to ad networks peddling dicey links

2. Internet Explorer takes the lead -- as the most error-prone browser

3. The last days of Unix

White Paper: Riverbed Technology

Eliminating the Challenge of Remote Backup

In today's global economy, many companies are increasingly distributed. That puts IT in a precarious position, especially when it comes to backup processes. Providing IT services to remote locations generally requires investment in local servers, storage, and networking. Read Now

Don't fall prey to ad networks peddling dicey links

Malicious hackers are now using ad networks to deliver malware to unsuspecting users, most recently to Android users. This sort of attack is not new. But it warrants your attention, especially if you're in charge of your company's Web resources. READ MORE

Internet Explorer takes the lead -- as the most error-prone browser

Sauce Labs found Internet Explorer's overall error rate to be 0.25 percent, with an error defined as a browser failing to start. While this is ess than even 1 percent, the number is significant for application testers who may perform thousands of tests. READ MORE

The last days of Unix

After a 30-year run in the enterprise, once-dominant server OS is getting 86ed by x86es. READ MORE

White Paper: Riverbed Technology

Securing Edge Data at the Center

Even as enterprises focus relentlessly on consolidation of data centers, they continue to aggressively expand the roles and numbers of branch offices, often located in remote locations that are difficult to support and protect. That poses the issue of how to protect data on the edge of the network, which may be subject to a variety of risks. Read more >>

Follow InfoWorld

Share this email

You are currently subscribed to infoworld_daily as tuwanan.mono@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@infoworld.com

Copyright (C) 2013 InfoWorld Media Group, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@infoworld.com. **