News

07:18 PM
Connect Directly
RSS
E-Mail
50%
50%

Google Co-Founder Larry Page To Replace Schmidt As CEO

InformationWeek Daily: Issue Highlights    Manage Subscription  |  Contact Us

TOP STORY: Google Co-Founder Larry Page To Replace Schmidt As CEO

MORE NEWS: Malware, Mobile Lead SMB Security Threats

ANALYTIC REPORT: Eliminating Vulnerabilities In Enterprise Software

WHITEPAPER: IPv4 Address Pool Will Run Dry: Network Management Whitepaper

SLIDESHOW: Inside Joomla 1.6: Improved Access Control, Categories

VIDEO: JetBrains' Dmitry Jemerov

BLOG: Who Are The Top CIOs in Government?

WEBCAST: The Security Threat Report: A look at the latest malware and attack vectors

RESOURCES: Be Part Of The 2011 InformationWeek 500


InformationWeek Daily

InformationWeek Daily

 

Friday, January 21, 2011

 

QUOTE OF THE DAY...
"The mark of an immature man is that he wants to die nobly for a cause, while the mark of a mature man is that he wants to live humbly for one." -- William Stekel

INFORMATIONWEEK.COM   |   NEWS   |   ANALYTIC REPORTS & WHITEPAPERS   |   BLOGS   |   WEBCASTS   |   RESOURCES

TODAY'S TOP STORY

Google Co-Founder Larry Page To Replace Schmidt As CEO
Google on Thursday reported Q4 2010 revenues of $8.44 billion, but the bigger news was that co-founder Larry Page will take over as CEO in April, with current chief Eric Schmidt moving out of day to day leadership to become Executive Chairman.

RELATED INSIGHTS
Analysis: Google Dropping H.264 Support In Chrome Is Shortsighted
Google Docs Preparing For Life As A Platform
Google Promises No Planned Downtime

ALSO SEE

Malware, Mobile Lead SMB Security Threats

Online marketing and blogs are another key attack vector that small and midsize businesses need to guard, says Blue Coat Security researcher.



Global CIO: Apple Hammers Google Over Tablet Flaws
By the time Google's Android tablet OS is available, 20 million iPads will be in full use. And until then, Apple's spreading the fragmentation FUD.

Google Docs Preparing For Life As A Platform
Renovated last April, Google Docs appears to be getting fixed up again, this time in preparation for third-party applications.

Box.Net Unboxes All-New Software, Cloud Integration

A redesigned interface and cloud integration with Netsuite and VMware is part of the all-new release aimed at enticing Microsoft Sharepoint users.



Facebook Fields Feature Phone App

The social network is trying to reach the majority of mobile phone users who don't have smartphones.



FDA Revamps Medical Device Approval

The 510(k) program overhaul aims to facilitate innovation, streamline the review process, and protect patient safety.



Pentagon OKs Navy Shipboard Network

CANES project moves into the development phase after meeting key cost, schedule, and performance criteria.



HP, Microsoft Team-Up Yields New Appliances

Partnership between Redmond and Palo Alto targets IT pros looking to reduce complexity and deployment times.



Security Experts Probe Oracle Patches

While the number of products in the Oracle stables has risen dramatically, the number of quarterly security patches has noticeably declined.



Facebook Ad Spending To Hit $4.05 Billion In 2011

In the U.S., the social media site will garner 7.8% of the online ad market, compared with its 4.7% share in 2010, reported eMarketer's annual forecast.



  Digital Issue  
DOWNLOAD OUR JANUARY 17, 2011 DIGITAL ISSUE

Cloud adoption is in full swing. But ignore integration, management, and monitoring at your peril.

ALSO:
• Real Costs Of The Cloud: An incomplete financial analysis will end up biting you. We look at how to do a better assessment.

• Cloud Results: These four companies are way past testing the cloud. They're looking at what's next.


DOWNLOAD NOW (Registration Required)

 


ANALYTIC REPORTS & WHITEPAPERS

FEATURED REPORTS

Eliminating Vulnerabilities In Enterprise Software
Most of the hacks that compromise enterprise security today are those that exploit flaws in applications. How can organizations find and fix these vulnerabilities -- before they lead to a breach? In this special Alert, Dark Reading offers a look at some tips and tricks for software development and vulnerability assessment, as well as some advice on how to eliminate security flaws in the enterprise.
Download Now (Registration Required)

Featured Report

Hardening Next-Gen Web Applications
Slick interactive applications have opened up new vistas of opportunity for businesses--and for attackers seeking to make off with data. In this report, we provide an in-depth analysis of the challenges around secure dynamic apps without stifling the very attributes that make them so popular with end users and customers.
Download Now (Registration Required)

Featured Report

MORE ANALYTICS

spacer spacer spacer

FEATURED WHITEPAPERS

IPv4 Address Pool Will Run Dry: Network Management Whitepaper
Compliance for compliance's sake is not a best practice in protecting cardholder data. Learn why compliance is the byproduct of a well-executed information security program that focuses on risk managementand minimizes the use of compensating controls. Download Now

The Cloud-based Telework Solution
By combining a cloud-based management platform with user-friendly devices, discover a new approach to remote access with the simplicity, centralized visibility & control, and economies of scale. Download Now

MORE WHITEPAPERS AT


MULTIMEDIA

SLIDESHOWS


Inside Joomla 1.6: Improved Access Control, Categories
The new Joomla system now features much stronger user access control features that make it possible to define who can access and change content on a site and do so in a very fine grained and detailed manner. And Joomla 1.6 has ditched its old two-level site organization and added a new Categories system that allows for unlimited nested levels of content.   View Now


ALSO SEE

Top 15 Facebook Apps For Business

NRF Big Show 2011: Breakthrough Technologies For Retailing

MORE SLIDESHOWS

spacer spacer spacer

VIDEOS


JetBrains' Dmitry Jemerov
Dr. Dobb's Mike Riley discusses the latest improvements in JetBrains IntelliJ IDEA 10 with JetBrains development lead Dmitry Jemerov   Watch

ALSO WATCH

Man Versus Machine

Trading Desk Of The Future: The Rise Of the Robo-Trader

MORE VIDEOS

spacer


TODAY AT THE BLOG


FEATURED BLOG
Featured Blogger Who Are The Top CIOs in Government?
By J. Nicholas Hoover
The editors of InformationWeek Government are putting together our list of the top CIOs in federal, state and local government, and we'd like to invite our readers to be a part of the process.

ALSO SEE

Photos Of webOS Tablet Emerge
By Eric Zeman
Ahead of its probable February 9 debut, images and specs of a webOS-based tablet from HP have hit the 'net.

Backup Deduplication 2.0 - Density
By George Crump
As we continue our requirements for the next era of backup deduplication, the next important area for improvement is in the denseness of systems. This means more raw capacity in less physical space. While getting sufficient power to the data center is a problem for some data centers, the lack of available data center floor space is becoming a problem for even more of them. Backup deduplication systems need to help address that pain by increasing density.

Epson Brings Out Double-Sided SMB Inkjet
By Lamont Wood
The new MFP is touted as being the world's fastest double-sided printing solution for small offices. There is also a non-MFP version.

Survey Says: U.S. SMBs Must Bolster Backup Strategies
By Michele Pepe-Warren
A worldwide survey has revealed some disheartening news about U.S.-based SMBs: They're not feeling very confident about their disaster recovery and backup solutions.

WEBCASTS

The Security Threat Report: A look at the latest malware and attack vectors
Join Graham Cluley, senior technology consultant at Sophos, for a live Webcast to learn about the latest security threats and trends in malware. Armed with the latest threat data, Graham will discuss the tactics the bad guys are using to infect your systems and steal your data.

Thursday, January 27, 2011 -- 9 AM PT/12:00 PM ET More Information & Registration

-----------------------------------------------------------------
Risk, Compliance, and Next-Generation Threats Executive Security Seminar Series
-----------------------------------------------------------------
Executive Security Seminar Series
Hackers are getting better at their jobs every day. How do you know which new threats pose the greatest dangers? How can you find out what the latest attacks look like and how they might affect your enterprise? How can you begin to build up your defenses? Join us for this executive breakfast and walk away with insights and new ideas on how to protect against the latest wave of cyber attacks and prioritize your security efforts.
Thursday, January 27th - San Francisco


RESOURCES AND EVENTS

Be Part Of The 2011 InformationWeek 500
Nominate your company for the 2011 InformationWeek 500 -- our 23rd annual ranking of the nation's very best business technology innovators. Deadline is April 29. Organizations with $250 million or more in revenue may apply now.
Don't Miss Out!

We'll See You At Interop Las Vegas
Get up to speed on IT innovations in cloud computing, virtualization, security, and more at Interop Las Vegas, May 8-12.
Register Today


This e-mail was sent to %%email%%

InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

GET MORE OUT OF INFORMATIONWEEK
Keep up with the latest news, insights and trends as InformationWeek reports them:

newsletters
Facebook
Twitter


Comment  | 
Print  | 
More Insights
Cartoon
White Papers
Register for Network Computing Newsletters
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Slideshows
Twitter Feed