Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

10 Android App Hidden Gems | What's Next For IBM Security

InformationWeek Daily
InformationWeek Daily  
  Thursday, Feb 23, 2012
REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  
MUST READ
Between The Lines Columnist What's Next For IBM Security?
By Mathew J. Schwartz
BM's new security mantra for enterprises might be summed up like this: Think big, see small. It's marrying security monitoring, big data analytics, and threat intelligence.

RELATED
9 Startups That Caught IBM's Eye
Most Businesses Don't Spot Hack Attacks

10 Android App Hidden Gems
Heard enough about Angry Birds and Pandora? Check out these 10 lesser-known Android apps to enhance your productivity, well-being, and more.

Nokia May Unveil Budget Windows Phones
Finnish phone maker may reveal new, low-cost devices in CEO Stephen Elop's World Mobile Congress keynote.

OnLive Desktop Brings Windows Apps To iPad
Virtual desktop based on cloud gaming tech claims to bring speedier Microsoft Office, Flash to iPad than market leader Citrix Receiver can deliver.

HP Earnings Down, Optimism Inexplicably Up
CEO Meg Whitman says HP needs to own the cloud, security, and analytics, but gives no guidance on how the company will do that.

Air Force Unit Cancels iPad Procurement
Special Operations Command had planned to acquire nearly 3,000 iPads to transfer paper-based flight information and technical manuals to an electronic format.

Amazon Brings Price-Cutter Mentality To AWS
Having lowered prices for storage, Amazon hints that similar cuts could come to other areas of its cloud services.

Mozilla Marketplace Prepares To Sell Web Apps
Maker of Firefox looks beyond the browser, plans to challenge Apple, Google, and Microsoft by introducing an app store of its own.

QUOTE OF THE DAY
For you to sleep well at night, the aesthetic, the quality, has to be carried all the way through. -- Steve Jobs

ALSO SEE

Amazon Brings Price-Cutter Mentality To AWS
Mozilla Marketplace Prepares To Sell Web Apps
Research: Can RIM Be Saved?
Modern Malware for Dummies
10 Android App Hidden Gems
Social Analytics: Putting the Science into Social Business
Take Our Strategic Security Survey

JOIN THE CONVERSATION
Posted By gilly05:
"I don't understand why more government agencies, schools, and private companies don't do this. The cost of MS Office is astounding."
In reply to: "Veterans Affairs May Dump Microsoft Office"
View Entire Response | Post Your Own Reply

Posted By melgross:
"We see what happens when a manufacturer prices their 10" tablet so that they can make a decent profit--it doesn't sell. 7" tablets are their way around the pricing problem."
In reply to: "iPad Mini Under Development"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD INFORMATIONWEEK GOVERNMENT'S DIGITAL ISSUE
As federal agencies embrace devices and apps to meet employee demand, the White House seeks one comprehensive mobile strategy.

Also: Smartphone Security; FedRAMP Takes Shape; NIST Lays Out Priorities...and more!

DOWNLOAD NOW (Registration Required)

 


 
ANALYTICS & WHITEPAPERS
FEATURED REPORTS
Research: Can RIM Be Saved?
While the future looks pretty grim, there are some moves the company can make-but they need to be bold, and fast.
Download Now (Registration Required)

Featured Report
Research: State of Storage 2012
With solid state reaching new levels of affordability, it's rapidly displacing mechanical disk for many Tier 1 applications. In short, it's an interesting time to be in the storage business.
Download Now (Registration Required)
Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS
Modern Malware for Dummies
Learn how today's malware works and how it has evolved to outpace traditional approaches to security.
Download Now (Registration Required)

Man-in-the-Browser Attacks Explained
Cybercriminals are using more advanced methods to target online users. One of the fastest growing threats today is the man-in-the-browser (MITB) Trojan attack - an attack designed to intercept data as it passes over a secure communication between a user and an online application. This white paper introduces the MITB attack, explains the infection rate, features and functionality of the attack and provides advice on how financial institutions can mitigate the threat.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Android App Hidden Gems
Heard enough about Angry Birds and Pandora? Check out these 10 lesser-known Android apps to enhance your productivity, well-being, and more.

iPad 3 Reports Suggest 8MP Camera
Spy shots of the Apple iPad 3 are hitting the Web fast and furious. The latest batch show off the camera, rear casing, and display panel.

7 Potential Problems With Google's Glasses
Google reportedly will offer augmented reality glasses by the end of the year. But are you ready for the pitfalls?

Air Force Unit Cancels iPad Procurement
Special Operations Command had planned to acquire nearly 3,000 iPads to transfer paper-based flight information and technical manuals to an electronic format.

CES 2012 Gadget Wrap-Up: Cool To Crazy
The Consumer Electronics Show offers thousands of products, from the sublime to the bizarre. Check out some of the more notable entries of 2012.

 


SLIDESHOWS
Use Facebook Apps To Woo Customers: 6 Examples
Several savvy organizations use Facebook apps to increase brand awareness and engage new and existing customers. Consider these interesting examples.   View Now

ALSO SEE
9 Powerful Business Uses For Tablet Computers
Who Is Anonymous: 10 Key Facts

MORE SLIDESHOWS

spacer spacer spacer
spacer
 


WEBCASTS
Social Analytics: Putting the Science into Social Business
In this session we will discuss how social analytics can be applied to a variety of functions such as human capital management, sales force automation, and enterprise marketing management and the impact that social analytics is having on social channel interactions and traditional business processes. It happens Thursday, March 1, 2012. More Information & Registration

Click here

 


RESOURCES AND EVENTS
Take Our Strategic Security Survey
InformationWeek is conducting a survey on information security and risk management. Upon completion of our survey, you will be eligible to enter a drawing to receive an 64-GB Apple iPad 2.
Survey ends March 9

Virtual Event: The Future of Multi-Channel Distribution
In this all-day virtual event, top business technologists, experts, and solution providers will discuss strategies, essential technologies and evolving regulator/legal issues around the next generation of multi-channel distribution best practices.
It happens March 1st -- Register Today!


This e-mail was sent to EmailAddress
INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.