TODAY'S TOP STORY
80% Of Browsers Have Known Vulnerabilities
Most problems are caused by insecure plug-ins, such as Java, Adobe Reader, QuickTime, and Flash, finds Qualys.
RELATED INSIGHTS
• Browser Guide: Choosing The Best Standard For Business
• Review: Google Chrome 9 Unleashes New Features
• Microsoft Internet Explorer 9 RC Arrives
ALSO SEE
Microsoft Releases Windows 7 SP1
Service Pack 1 for Windows 7 and Windows 2008 R2 bundles all bug fixes to date, but includes few new features.
Global CIO: SAS Takes On IBM, As IT Meets Marketing
Analytics is changing marketing, as recent M&A activity shows.
Apple Shareholders Reject Steve Jobs Succession Plan
Annual meeting sees company stockholders vote down a call for a formal arrangement that would identify potential replacements if Jobs' health deteriorates further.
HP Upgrades EliteBooks, ProBooks For Businesses
Intel's second-generation Core processors, as well as a Celeron processor option, will available on the business notebooks.
SAP Announces Blockbuster BusinessObjects Upgrade
Business intelligence and information management suites are synchronized and enhanced in a feature-packed release highlighting real-time analysis.
Apple MacBook Pro Expected With Light Peak
The company's updated MacBook Pro should be the first to bring Intel's Light Peak technology to market.
Meaningful Use Big Business For Healthcare Consulting Firms
IT consulting firms are helping healthcare providers assess health IT systems for potential HIPAA violations and achieve the fine points of meaningful use compliance.
TeleTech Offers Crowdsourcing, Simulations For Training
The business process outsourcer says the new educational tools can cut training time and produce better workers.
FBI Redesigns 'Most Wanted' Site
The agency has enhanced its search and other tools to improve the way people can help it locate fugitives and missing persons.
Apple Event Ignites iPad 2 Speculation
The iPad 2 is expected to make its debut at a special event Apple is hosting in San Francisco on March 2, along with some other surprises.
Few Businesses Use Social Media For Disaster Recovery
Only about 25% of businesses have added social media like Facebook or Twitter to their disaster recovery and business continuity plans, a survey by Janco Associates reveals.
|
|
|
DOWNLOAD INFORMATIONWEEK'S GOVERNMENT DIGITAL ISSUE
Federal agencies are making progress on the Obama administration's
Open Government Directive, but there's still a long way to go.
We give you our list of top priorities.
ALSO: Can the tech industry's ambitious plan to improve government
efficiency work? No way, says InformationWeek Government editor
John Foley.
Plus much more, exclusively in our Digital Issue
DOWNLOAD NOW (Registration Required)
|
|
ANALYTIC REPORTS & WHITEPAPERS
|
FEATURED REPORTS
Best Practices: IPv6 Transition
IPv4 is not extinct, exactly, but it may as well be. If you don't act to add IPv6 capability to your network, you're not only limiting the growth and innovation potential of your business, you may also be turning away thousands of customers. In this report, we'll discuss strategies and provide an in-depth look at three real-world deployment models. Download Now (Registration Required)
|
|
Research: 2011 Backup Survey
There's no excuse for your backup strategy being stuck in a rut. Today's system administrators can take advantage of myriad new and improved data protection technologies, including disk-to-disk backup, virtual tape libraries, data deduplication and cloud-based backups. These and other methods can help overcome two big problems: continued use of backup tapes as an archiving strategy (bad idea) and a lack of data protection for branch offices and remote employees. Download Now (Registration Required)
|
|
|
|
|
|
FEATURED WHITEPAPERS
5 Steps to Transforming the Data Center
Preparing a data center for the future requires automating the management tasks that consume most of an IT administrator's time. Check out this roadmap to make your data center truly efficient by aligning people, processes and technology. Download Now
Web Searches from Blackhat SEO to System Infection
Every business on the Web wants attention. That's why Search Engine Optimization (SEO), an orchestrated attempt to attract visitors to a site, is so popular. But be warned: Cybercriminals increasingly use SEO to deliver malware to unsuspecting Web surfers' systems. This profitable practice, called Blackhat SEO, is simple to perpetuate, yet effective and dangerous. Find out how to protect your systems. Download Now
|
|
|
|
INFORMATIONWEEK IS NOW ON YOUR iPAD!
It's easier than ever to get the business technology news and analysis you need with the InformationWeek Select iPad application, which provides a daily, easy-to-read compendium of stories hand selected by InformationWeek's editors.
Download the iPad app now so that you don't miss the latest reporting and insights from InformationWeek's award-winning editors!
|
|
FEATURED BLOG Verizon iPhone Sales Disappoint
By Ed Hansberry
Despite record online sales for the Verizon iPhone, overall sales have been disappointing to those at Apple. Before you read too much into that though, there are a few things to consider.
ALSO SEE
Xerox Offers Mid-Range SMB Color Toner Printers
By Lamont Wood
High-price is justified by high print quality, says Xerox. The jury remains out on that, but the refill toner price is, as usual, no bargain.
Virtual PBX Offers IP Solution
By Paul Korzeniowski
Movement from traditional to IP telephony services has been taking place for several years. A leader in traditional voice services, Virtual PBX has now broadened its offerings, so they work better with IP.
This Isn't The Update You Are Looking For
By Ed Hansberry
Even as Windows Phone 7 was launching late in 2010, everyone knew there was an update on the horizon that at a minimum would bring copy and paste to the platform. On Monday Microsoft started rolling out the first update for its mobile platform, but this won't have copy and paste, or anything else you will really use either.
Security Coming To Mobile And Embedded Devices
By George Hulme
Security firm McAfee expects 50 billion mobile and connected embedded devices by the year 2020. And guess who is promoting new tools promising to protect them. But is this a layer of protection we are going to need?
Hacks From China Strike Canadian Government
By George Hulme
CBC is reporting that attacks from IP addresses based in China have managed to successfully breach networks within the Finance and the Treasury Board of Canada, as well as Defence Research and Development Canada. The attack is the latest in a string of attacks aimed at high level government agencies.
|
|
Automatically fix broken links when you move or rename files!
Patented LinkFixerPlus is the first application that automatically fixes broken links in Excel, Word, PowerPoint, Access, Acrobat, AutoCAD, MicroStation, PageMaker, InDesign, HTML and other files when performing data migrations due to: server consolidation, server name changes, path name changes or folder reorganizations.
Click for your free trial now!
|
|
This e-mail was sent to %%email%%
InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030
To subscribe to our other newsletters, change your e-mail address or format (Text/HTML) or to unsubscribe, click here
|
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.
|
|
GET MORE OUT OF INFORMATIONWEEK
Keep up with the latest news, insights and trends as InformationWeek reports them:
|
|
|
|