Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

LinkedIn Endorsements Cause Heartburn | Samsung Galaxy S IV: Sneak Peek

InformationWeek Daily
InformationWeek Daily  
  Tuesday, February 05, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Samsung Galaxy S IV: What To Expect
By Jeff Bertolucci
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.
Between The Lines Columnist

RELATED
Samsung Backs Innovation With $1.1 Billion
128-GB iPad Launches As iPad Mini's Supply Improves

Why Soliciting LinkedIn Endorsements Is A Bad Idea
LinkedIn's nagging automated requests to endorse others' skills are too generic to be useful to anyone. You're better served by staying in personal touch with your network.

IBM Fights Rivals With Aggressive Power Server Prices
IBM entry-level Power 7+ servers now start at $6,000. Netezza analytics platform successor challenges EMC, Oracle and Teradata.

10 Mobility Trends CIOs Should Watch
Tablets will lose steam, BYOD will become ubiquitous and mobile rollouts will get less expensive, says Yankee Group analyst.

Patent Trolls Pursue Midsize Companies
Non-practicing entities, also known as patent trolls, find midsize companies make ideal targets for infringement claims. Online retailer Ashford.com is fighting back.

Big Data Helps Build Better Wireless Coverage Maps
OpenSignal collects smartphone user data to create more accurate and objective maps of cell network coverage.

Microsoft Hints At IE10 Release With New Toolkit
Microsoft's new toolkit allows IT administrators to block Windows 7 computers from automatically upgrading to Internet Explorer 10.

QUOTE OF THE DAY
"All life is an experiment. The more experiments you make the better." -- Ralph Waldo Emerson

ALSO SEE

Big Data Helps Build Better Wireless Coverage Maps
Microsoft Hints At IE10 Release With New Toolkit
IT Pro Ranking: Unified Threat Management
Creating The Right Mobile Strategy: What You Need to Know Before You Get Started
10 Best Android Apps Of 2012
Mobile Security -- A Holistic Approach
Virtual Event: Hackers Unmasked

Download our iPad App

JOIN THE CONVERSATION
Posted By jmmxx:
"Let's face it, these people (or their companies) have 10s of thousands of dollars invested in MS training. They hear a constant barrage of anti-Apple propaganda. Therefore, any perceived problem or issue, is exaggerated. This is normal human behavior."
In reply to: "Why Apple Is IT's Arch Frenemy"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD DARK READING'S LATEST DIGITAL ISSUE
Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?

Also in the new, all-digital issue of Dark Reading: The shift in hacking requires a new defense mindset.

DOWNLOAD NOW FREE (Registration Required)

 


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
IT Pro Ranking: Unified Threat Management
Unified threat management appliances combine multiple security functions into a single device to provide a streamlined security infrastructure with a compelling operational cost model. IT pros who use or have used or evaluated UTM appliances assess five vendors -- Check Point Software, Cisco Systems, Dell SonicWall, HP and Juniper Networks -- on critical features such as malware detection, intrusion prevention and throughput.
Download Now (Registration Required)

Featured Report
Strategy: One-Click Disaster Recovery
Automation and orchestration are all the rage among IT architects these days. One of the best places to apply the technology is to disaster recovery. Most organizations still want a "go" button, but after that, timely recovery requires automation. Here's what you need to know to make it happen.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Creating The Right Mobile Strategy: What You Need to Know Before You Get Started
The right mobile solution can propel your business into the market quickly and effectively. But in order to know which solution will work best for your business, you need to be clear on the advantages and potential concessions of each, so you can measure them against your business goals.
Download Now (Registration Required)

5 Tips To Get IT Auditors Off Your Back
In this paper, certified information systems auditor Joe Grettenberger reveals his five best tips for reducing the stress and distraction of an audit.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Google Pays For Peace In Europe
Google tries to escape burdensome regulatory sanctions and taxes with a proposal to resolve antitrust concerns and a payment to benefit French publishers.

IBM Fights Rivals With Aggressive Power Server Prices
IBM entry-level Power 7+ servers now start at $6,000. Netezza analytics platform successor challenges EMC, Oracle and Teradata.

Internet2 Consortium Sets New Internet Speed Record
Team sent a multiple stream data transmission with a transfer rate of 7.21 gigabits per second over more than half the circumference of the earth.

Twitter Pursues Two-Factor Authentication After Password Breach
Live attack compromised up to 250,000 accounts, leading Twitter to reset affected users' passwords.

 


SLIDESHOWS
Samsung Galaxy S IV: What To Expect
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.   View Now

ALSO SEE
BlackBerry 10: Visual Tour Of Smartphones, OS
7 Portals Powering Patient Engagement

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
CES 2013: It's A Wrap!
While some claim CES has lost its luster and big name headliners over the years, the show refuses to be deemed irrelevant. With trends spanning healthcare, mobile and automotive, there was plenty to see.   Watch

ALSO WATCH
CES; the car show
Intel shows off eye tracking and gesture tech

MORE VIDEOS

spacer
 


WEBCASTS
Mobile Security -- A Holistic Approach
Managing and securing the mobile enterprise requires taking a holistic approach to defending the end-to-end scope of each mobile engagement. Security and management are highly intertwined and prerequisites to one another. Get more details during our webcast on Wednesday, February 6, 2013. More Information & Registration

Click here

 


RESOURCES AND EVENTS
Virtual Event: Hackers Unmasked
In this all-day InformationWeek and Dark Reading Virtual Event, experts and vendors will offer a detailed look at how enterprises can detect the latest malware, analyze the most current cyber attacks, and even identify and take action against the attackers. Attendees will also get a look at how cybercriminals operate, how they are motivated -- and what your business can do to stop them.
It happens Feb. 7 -- Don't Miss It!

Don't Miss Interop Las Vegas
Attend Interop Las Vegas May 6-10, and attend the most thorough training on Apple deployment at the NEW Mac & iOS IT Conference. Use Priority Code DIPR02 by Feb. 9 to save up to $500 off the price of Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies, and the latest technology.
Get More Details and Register Today

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.