News

05:39 PM
Connect Directly
RSS
E-Mail
50%
50%

Google-Backed 'Super Wi-Fi' Plan Gets FCC Approval

InformationWeek Daily: Issue Highlights    Manage Subscription  |  Contact Us

TOP STORY: Google-Backed 'Super Wi-Fi' Plan Gets FCC Approval

MORE NEWS: Top Healthcare IT Predictions For 2011

ANALYTIC REPORT: State Of Enterprise Storage Report

WHITEPAPER: IPv4 Address Pool Will Run Dry: Network Management Whitepaper

SLIDESHOW: Inside Watson, IBM's Jeopardy Computer

VIDEO: Tutorial: 10 Steps To Mobile Worker Support

BLOG: The Dark Side Of Remote Printing?

WEBCAST: Tips and Tricks on Memory Management in Virtualized Environments

RESOURCES: Nominate Healthcare IT Execs


InformationWeek Daily

InformationWeek Daily

 

Friday, January 28, 2011

 

QUOTE OF THE DAY...
"There is no trade or employment but the young man following it may become a hero." -- Walt Whitman

INFORMATIONWEEK.COM   |   NEWS   |   ANALYTIC REPORTS & WHITEPAPERS   |   BLOGS   |   WEBCASTS   |   RESOURCES

TODAY'S TOP STORY

Google-Backed 'Super Wi-Fi' Plan Gets FCC Approval
The regulatory agency has granted Google and eight other companies a conditional role in the deployment of white spaces broadband.

RELATED INSIGHTS
Cisco Bakes Intrusion Prevention Into WiFi Access Points
Top 11 Mobile Predictions For 2011
FCC Standardizes On LTE For Public Safety Network

ALSO SEE

Top Healthcare IT Predictions For 2011

Health systems will tackle technology challenges including mobile, manpower, meaningful use, and other mandates.

Global CIO: SAP Transformed: From Stuffy ERP To Real-Time iPad Analytics

Citing impressive across-the-board results, SAP co-CEO Bill McDermott says new strategies and platforms will drive more growth in 2011.

iPad Fuels 241% Growth In Apple's Market Share

Analyst firm says Steve Jobs' company is now tied with Dell as the third largest PC maker—if the iPad is included.



Wolfe's Den: Intel Inches Into Its Next Big Market

Diversifying beyond the PC, Intel's multi-billion dollar embedded computing push envisions Atom processors in millions of appliances, Smart TVs, and other connected devices.

IBM To Build Massive China Cloud Data Centers
The 6.2-million-square-foot campus near Beijing will include offices, call centers, restaurants, and living spaces, as well as at least seven enormous data centers.

Intel McAfee Acquisition Cleared By EU

European regulators have approved the $7.68 billion acquisition following commitments from Intel to not hamper competition in the security market.



NASA Employs RightNow Cloud For Support Center

The space agency has put its Shared Services Center online to cut costs associated with handling inquiries via a call center.



USDA To Fund 45 Rural Telemedicine Projects

Agriculture Department grants program will also support network connectivity and distance learning technologies.



Verizon Bundles Google Apps For SMBs

Deal continues trend of partnering with high-profile software companies to package business applications around its core voice and broadband products.



Air Force Awards Space Fence Contracts

Raytheon and Lockheed Martin have won $107 million deals to provide preliminary designs for a radar system to detect objects passing over Earth.



100 P2P Users Produce 75% Of Files Downloaded

Targeting the users responsible for the most content might trigger a sharp decline in file-sharing via peer-to-peer networks, suggest researchers.



  Digital Issue  
DOWNLOAD DARK READING'S FIRST-EVER DIGITAL ISSUE

Cutting-edge attacks like Stuxnet and Zeus will be the everyday exploits of the future. Here's what you need to know. That and more -- including five best practices to improve the budgeting process for security spending -- in the debut all-digital issue of Dark Reading.


DOWNLOAD NOW (Registration Required)

 

----------------------------------------------
This Issue Sponsored by Symantec
----------------------------------------------
Authenticating Your Open Enterprise:
Common Myths and Critical Recommendations
View this webcast and find out the information needed to revisit
security policies and controls around "open" environments.
View Now!


ANALYTIC REPORTS & WHITEPAPERS

FEATURED REPORTS

State Of Enterprise Storage Report
Budgets may be stagnant, but the recession has not put a damper the growth of enterprise data and related storage requirements. Too bad, then, that our infrastructures aren't keeping pace, according to our survey respondents. In this report we'll analyze poll results and discuss top technologies that can help storage managers do more with less.
Download Now (Registration Required)

Featured Report

Beating Cloud Lock-In: Our 3 Top Considerations
Whether you're talking about SaaS, IaaS, or storing data in the cloud, companies must consider how they'll unwind relationships -- customizations, metadata, contracts, and depth of integration are all factors.
Download Now (Registration Required)

Featured Report

MORE ANALYTICS

spacer spacer spacer

FEATURED WHITEPAPERS

IPv4 Address Pool Will Run Dry: Network Management Whitepaper
Compliance for compliance's sake is not a best practice in protecting cardholder data. Learn why compliance is the byproduct of a well-executed information security program that focuses on risk managementand minimizes the use of compensating controls. Download Now

The Cloud-based Telework Solution
By combining a cloud-based management platform with user-friendly devices, discover a new approach to remote access with the simplicity, centralized visibility & control, and economies of scale. Download Now

MORE WHITEPAPERS AT


MULTIMEDIA

SLIDESHOWS


Inside Watson, IBM's Jeopardy Computer
IBM has spent four years and untold hundreds of millions of dollars developing Watson, a computer that can play Jeopardy. In fact, Watson answers questions so quickly and accurately that IBM challenged Jeopardy and two of the show's all-time champions to a match. Cynics may call it a publicity stunt, but the project has brought real advances in computer science. Here's a look inside the architecture, hardware, and advanced analytics that make Watson tick.  View Now


ALSO SEE

12 Money Saving Tech Tips For SMBs

Inside Joomla 1.6: Improved Access Control, Categories

MORE SLIDESHOWS

spacer spacer spacer

VIDEOS


Tutorial: 10 Steps To Mobile Worker Support
Find out ways a company can support workers' mobile computing/connectivity requirements, securely and economically.   Watch

ALSO WATCH

Intel Educational Exchage for Parallelism

CES 2011: Cellcontrol Device Sets And Enforces Safe Driving Policies

MORE VIDEOS

spacer


TODAY AT THE BLOG


FEATURED BLOG
Featured Blogger

The Dark Side Of Remote Printing?
By Lamont Wood
Having a printer that can reach out to the Web means having a printer that a hacker can reach out to. Should SMBs lose sleep over this?

ALSO SEE
Wanted: Healthy, Channel-Centric Vendors
By Michele Pepe-Warren
In the years I've spent writing about technology, I've given a fair amount of attention to discussing what vendors look for in their VAR partners. But what about the flip side of the coin?

Windows Phone 7's Big Update Not For January
By Ed Hansberry
A lot of sites, this one included, have been reporting since November that Microsoft was planning to release a big update for its new platform, including the much anticipated copy and paste feature. It is pretty obvious as this point that January will come and go with nary an update in sight.

Codec Wars: What About Mobile Devices And Content Sites
By Kurt Marko
Last week I commented about Google's decision to eliminate support for the H.264 video codec standard from Chrome and while I initially focused on the implications for PC users, given the growing use of mobile browsers, I wondered if the ramifications could be even more significant for them. Well, on further reflection, I'm not too worried, at least yet.

Do You Really Need A Server?
By Lamont Wood
A lot of SMBs are apparently deciding that they don't, and firms like Cbeyond are banking on that.

WEBCASTS

Tips and Tricks on Memory Management in Virtualized Environments
Join this informative webcast and gain a greater appreciation for the strategies experts use today in managing their virtual environments. Attendees will gain a better understanding of how to recognize where memory constraints are impacting performance. We'll also explore how memory ballooning and swapping may impact the performance of your virtualized applications.

It happens Tuesday, February 8, 2011 More Information & Registration

----------------------------------------------
This Issue Sponsored by Symantec
----------------------------------------------
Authenticating Your Open Enterprise:
Common Myths and Critical Recommendations View this webcast and find out the information needed to revisit security policies and controls around "open" environments.
View Now!


RESOURCES AND EVENTS

Nominate Healthcare IT Execs
We're looking for forward-thinking IT leaders for InformationWeek's Healthcare CIO 25 - people who exemplify the new leadership role that IT plays at healthcare provider organizations.

Send a brief description of your nominee to iwhealthcare@techweb.com

We'll See You At Interop Las Vegas
Get up to speed on IT innovations in cloud computing, virtualization, security, and more at Interop Las Vegas, May 8-12.
Register Today

Plugging The Leaks: Finding And Fixing The Security Holes In Your Enterprise
In this all-day virtual event sponsored by Dark Reading and InformationWeek, you'll find out how criminals target the flaws in your IT environment, and you'll get some insight on the best methods for finding and fixing your vulnerabilities -- before you're hit by malware or unauthorized access.

You'll also get a look at the reasons why insiders may leak data to the outside, and get some recommendations on how to stop those leaks before they happen.
It happens Feb 3. (Free registration required.)


This e-mail was sent to %%email%%

InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

GET MORE OUT OF INFORMATIONWEEK
Keep up with the latest news, insights and trends as InformationWeek reports them:

newsletters
Facebook
Twitter


Comment  | 
Print  | 
More Insights
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Slideshows
Twitter Feed