TODAY'S TOP STORY
RIM's BlackBerry Bridge To Nowhere
The PlayBook tablet, a few weeks late and a few key features short, isn't market-ready.
ALSO SEE
Review: BlackBerry PlayBook Not Ready For The Enterprise
RIM's PlayBook is a beautifully designed piece of technology, but lacks basic features available from every other tablet in the market.
Slideshow: RIM BlackBerry PlayBook Teardown
UBM TechInsights takes a look under the hood at yet another tablet. Inside RIM's new BlackBerry tablet is the TI OMAP 4 processor, a six-axis gyro and some other fun hardware goodies.
American Well Launches Telehealth For SMB Practices
For medical offices that lack IT muscle, Online Care for Providers offers two-way video, live chat, billing, and more.
Social Media Research May Expose Discrimination Claims
Hiring managers walk a fine line between vetting candidates online and putting themselves at risk for lawsuits from passed-over candidates, say employment law experts.
Why Your Attitude Stinks, And What To Do About It
Some IT pros are putting their profession on a path toward perpetual downsizing and outsourcing.
IPv4 Depletion Not Boosting IPv6 Adoption
Slow rate of adoption is caused by technical and design hurdles, lack of economic incentives, and a lack of IPv6 content, found Arbor Networks study.
iPhone 5 Expected In September
An Apple event in September is the expected launchpad for a new version of the iPhone with a faster processor, which would be a change from its usual upgrade pattern.
Microsoft Collaborating On Chronic Condition Management Systems
Customized systems, like the one EMC Consulting and Microsoft developed for Denver Health, help providers to better manage care for patients with chronic health problems.
|
|
|
DOWNLOAD INFORMATIONWEEK SMB's DIGITAL SUPPLEMENT
Take a sneak peek at data from our 2011 Strategic Security Survey,
with a focus on the five biggest problems faced by midmarket companies.
Also: Our experts share innovative ways to meet security challenges.
DOWNLOAD NOW (Registration Required)
|
|
ANALYTIC REPORTS & WHITEPAPERS
|
FEATURED REPORTS
Let The I/O Roll: 8 Steps To Maximize Performance
Networks are the lifeblood of any data center, but effective updates aren't just about pushing more bits around. IT must also form a symbiotic ecosystem with virtual servers and shared storage -- the three legs of the virtualized, cloud-like Data Center 2.0 infrastructure. In this report, we'll also explore the latest tactics for maximizing I/O and taming cable and port sprawl. Download Now (Registration Required)
|
|
|
|
|
|
FEATURED WHITEPAPERS
Application Scanning - Find & Fix
Get this 12-page research report on how companies like yours address web application security threats, including:
* Current practices in web application security
* Market trends and adoption of enabling technologies
* Analysis of users adopting the find and fix approach to application security Download Now
How To Virtualize Business-Critical Applications with Confidence
This white paper provides an overview of the challenges that organizations face in virtualizing business critical applications given their current tools and processes. Download Now
|
|
|
|
INFORMATIONWEEK IS NOW ON YOUR iPAD!
It's easier than ever to get the business technology news and analysis you need with the InformationWeek Select iPad application, which provides a daily, easy-to-read compendium of stories hand selected by InformationWeek's editors.
Download the iPad app now so that you don't miss the latest reporting and insights from InformationWeek's award-winning editors!
|
|
FEATURED BLOG Keeping RAID Alive
By George Crump
When it comes to protecting data on disk, few technologies are more universal RAID; it faces challenges in the future data center, but is hardly alone in that.
ALSO SEE
Iranian Official Claims Siemens Partially Responsible For Stuxnet
By George Hulme
The Iranian military has accused German electronics and industrial engineering firm Siemens of taking part in the development of the Stuxnet worm.
The Business Case for Standards-based Security
Please join us for a webinar about the TNC network security architecture, open standards created by the Trusted Computing Group, and the products that have implemented those standards. Hear customers talk about how they're using products based on these standards to deliver stronger security at lower cost, integrating existing products and automating routine tasks.
It happens Tuesday, April 26, 2011 -- Time: 9:00 AM PT / 12:00 PM ET
More Information & Registration
|
|
|
|
This e-mail was sent to %%email%%
InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030
To subscribe to our other newsletters, change your e-mail address or format (Text/HTML) or to unsubscribe, click here
|
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.
|
|
GET MORE OUT OF INFORMATIONWEEK
Keep up with the latest news, insights and trends as InformationWeek reports them:
|
|
|
|