MUST READ 6 Ways Apple Is Polishing Mac Security By Mathew J. Schwartz Apple no longer markets Macs as malware-free, but rather "built for security," and refines protection in Mountain Lion.
RELATED • Apple Obsolescence Debate: More Analysis Please, Fanboys • Apple WWDC: 17 Cool Innovations
BlackBerry 10 Delay Could Spell RIM's Doom Research In Motion has postponed the release of its next-generation smartphone platform to 2013 and plans to lay off 5,000 employees. Is there any hope left?
Google Compute Engine Ignores VMware, Microsoft Users Google's new cloud infrastructure service is geared to Linux workloads running in KVM. What does that mean for VMware, Microsoft, and Citrix users?
LinkedIn Breach: Leading CISOs Share 9 Protection Tips In the wake of LinkedIn's high-profile data breach, could your company suffer a similar fate? Leading chief information security officers share their techniques for building a better security program.
Obamacare Victory Spells More Work For Healthcare CIOs CIOs and CMIOs can expect many more sleepless nights now that the Supreme Court has upheld the Affordable Care Act.
Nokia Update Turns Lumia Phones Into Wi-Fi Hotspots Patch for Lumia 710 and 800 also adds new camera features, but potential buyers may decide to wait for Windows Phone 8.
Google I/O Day 2: Chrome Hits iOS, IaaS Play Google Compute Engine is an infrastructure-as-a-service offering that competes with Amazon Web Services, while Chrome browser is now used by 310 million people, execs said at Google I/O.
|
|
|
|
|
|
DOWNLOAD INFORMATIONWEEK'S PRIVATE CLOUDS SUPPLEMENT In the new, all-digital issue of InformationWeek on 'Private Clouds: Vision Vs. Reality': How to choose between OpenStack and CloudStack for your private cloud.
ALSO: Expertise, automation, and silo busting are all required, say early adopters of private clouds.
DOWNLOAD NOW FREE (Registration Required)
|
|
REPORTS & WHITEPAPERS
FEATURED REPORTS Research: Alternative Application Delivery IT must efficiently and securely deliver all the applications employees need, no matter where they are or what devices they're equipped with. Nearly 500 IT pros weighed in on how they get this done. The biggest surprise was the popularity of application virtualization, which is in widespread use by 35% of respondents. Download Now (Registration Required)
|
|
Fundamentals: Backing Up Android and iOS Devices As more employees use their own tablets and smartphones for work, IT teams need to figure out how to back up data created while on the go. The answer: a smart mix of policies, cloud services and mobile device management. We outline a data protection plan that doesn't depend on end users, because "BYOD" shouldn't mean "back up your own data." Download Now (Registration Required) |
|
|
|
|
|
FEATURED WHITEPAPERS Proactive Response to Today's Advanced Persistent Threats There is no fail-safe in today's digital world. To mitigate damage and organizational impact, the agile organization will respond quickly. Download this white paper to learn how to mitigate risks before damage occurs, and ensure you maintain a continuous high state of security and enact measures to control infections with quarantine until remediation is complete. Download Now (Registration Required)
Content Sharing 2.0: The Road Ahead A growing number of companies are taking advantage of the natural synergies that exist between cloud-based IT services and content access and sharing. Download this report to learn about cloud-based content storage, access and collaboration services that require virtually no user training and support file access and delivery on almost all popular PC and mobile devices.
|
MOST POPULAR NEWS
RESOURCES AND EVENTS
Virtual Event: Big Data Analytics At our interactive InformationWeek Virtual Event, experts and solution providers will offer detailed insight into how to put big data to use in ad hoc analyses, what-if scenario planning, customer sentiment analysis, and the building of highly accurate data models to drive better predictions about fraud, risk, and customer behavior. It happens June 28
InformationWeek 2012 Next Generation WAN Survey InformationWeek is conducting a survey to determine what's important to you when you're choosing data center management software and SaaS vendors as well as how the vendors are actually doing against those criteria. Upon completion of our survey, you will be eligible to enter a drawing to receive a 32-GB Apple iPod Touch. Survey ends June 29
This e-mail was sent to EmailAddress
|
InformationWeek Daily -- Published By InformationWeek 600 Community Drive Manhasset, NY 11030
To update your profile, change your e-mail address, or unsubscribe, click here.
Thoughts about this newsletter? Give us feedback.
|
|
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.
|
|
|
|