Celebrate 2016’s mobile gems

Compiled By Unknown - Tuesday, December 20, 2016 No Comments

Google open-sources test suite to find crypto bugs

Email not displaying correctly? View it in your browser.

InfoWorld Daily: Morning Edition

Dec 20, 2016
Featured Image

Celebrate 2016's mobile gems

Cool, useful innovations were few and far between last year, so these five mobile breakthroughs deserve extra credit Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Google open-sources test suite to find crypto bugs
15% off Zeceen Metal USB Lightning Cable, Virtually Indestructible and Weather Resistant - Deal Alert
Q&A: Hortonworks CTO unfolds the big data road map
Maybe security isn't going to get better after all
How to survive the death of Flash

White Paper: Cisco Systems

5 Tips for Choosing a Next-Generation Endpoint Security Solution

Read this paper to learn the five tips you need to know for choosing a Next-Generation Endpoint Security System to help prevent cyberattacks, block malware, and more! Read More

Thumbnail Image

Google open-sources test suite to find crypto bugs

Developers can use Project Wycheproof to test cryptographic algorithms against a library of known attacks to uncover potential weaknesses Read More

Thumbnail Image
DealPost

15% off Zeceen Metal USB Lightning Cable, Virtually Indestructible and Weather Resistant - Deal Alert

This cable comes with a sturdy Zinc alloy Connector and a high-strength yet fully flexible stainless steel jacket spring wire – a design that promises not to disintegrate even under extreme conditions like bad weather or rough handling. Read More

Thumbnail Image

Q&A: Hortonworks CTO unfolds the big data road map

Hortonworks' Scott Gnau talks about Apache Spark vs. Hadoop and data in motion Read More

Thumbnail Image

Maybe security isn't going to get better after all

Is that light at the end of the tunnel? Or is a train coming? Read More

Thumbnail Image
INSIDER

How to survive the death of Flash

What should an enterprise ban Flash, phase it out, or accept that it will remain as legacy software for the foreseeable future? Here's a guide Read More

White Paper: Cisco Systems

Assessing the Business Value of Endpoint Specialized Threat Analysis and Protection Solutions

Criminal groups behind today's cyberattacks have become better organized, introducing reconnaissance activity, custom malware, evasion techniques, and other sophisticated tactics that place a burden on traditional security defenses. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Daily: Morning Edition as milanshrestha747.java@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.

Tags:

No Comment to " Celebrate 2016’s mobile gems "