News

12:37 PM
Connect Directly
RSS
E-Mail
50%
50%

Inside U.S. Bank Hacks | 8 Key Changes In MS SharePoint 2013

InformationWeek Daily
InformationWeek Daily 
Join the community
FacebookTwitterLinkedIn
  Wednesday, January 09, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist 8 Key Changes In Microsoft SharePoint 2013
By Kevin Casey
Microsoft's popular collaboration platform gets a significant revamp with SharePoint 2013. Here's what you gain.

RELATED
7 Business Tasks That Don't Work On Social
Social Business Vs. Old-School Collaboration

U.S. Bank Hack Attack Techniques Identified
Security researchers detail how poorly secured, hosted servers helped launch botnet-based attacks; U.S. government continues to blame Iran.

How To Fill Big Data Talent Gaps Fast
Consider training current employees or recruiting from our list of analytics master's degree programs.

Windows 8 License Sales Top 60 Million
Despite analyst misgivings, Microsoft exec says at CES new operating system is on pace to match early Windows 7 sales.

Google Big Data Tools Vs. The Flu Bug
Google Flu Trends mines aggregated search queries to estimate flu activity across much of the world.

10 Mobile Health Apps From Uncle Sam
New mobile apps from the Department of Health and Human Services, for consumers and doctors alike, let you search medical literature, locate health centers, fight drug abuse and much more.

HIPAA 101: Universities Use Office 365 To Meet Regs
Federal healthcare privacy requirements don't apply only to medical institutions -- schools that maintain student health records must also comply with HIPAA law.

Problems I'd Like Disney's New Tech To Solve
Disney's new vacation management system could improve the park experience and boost sales and loyalty, or it could create bad feelings with princesses whose parents don’t pay top rates.

QUOTE OF THE DAY
"Courage is being scared to death, but saddling up anyway." -- John Wayne

ALSO SEE
HIPAA 101: Universities Use Office 365 To Meet Regs
Problems I'd Like Disney's New Tech To Solve
Fundamentals: Cloud ID Management
How to Make Tax Time, Relax Time
10 Best Android Apps Of 2012
Is Your Network Ready for BYOD?
2013 InformationWeek 500: Nominations Now Accepted

Download our iPad App

JOIN THE CONVERSATION
Posted By Sherry Nouraini:
"I don't think consumers really care whether a business can afford a security certification or not, they just want privacy and if they cannot get it they won't shop at a site that does not make them feel safe!"
In reply to: "Gigya Certification Aims To Allay Social Login Fears"
View Entire Response | Post Your Own Reply

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Fundamentals: Cloud ID Management
Worried about controlling access to all the cloud applications your employees use? IT has a variety of options to help manage cloud-based identities, including Active Directory synchronization, federation and purpose-built cloud services that provide single sign-on for online applications.
Download Now (Registration Required)

Featured Report
Research: 2012 Application Security Survey
Tried-and-true methods like defense in depth can provide breathing room while you get a secure SDLC in place-a job still facing 56% of our 475 respondents. And they'd better get moving, because 51% of those with secure SDLC programs on their radar have developed and/or assumed responsibility for securing 11 or more Web apps.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacerspacerspacer
FEATURED WHITEPAPERS
How to Make Tax Time, Relax Time
Filing taxes can be a hassle and many people put the job off until the last minute for that very reason. Thanks to Intuit SnapTax, users can now file their taxes from their phones in a matter of minutes. Read how Intuit can automatically extract fields from tax forms using mobile device cameras.
Download Now (Registration Required)


Bring Your Own Device Policy Consideration
By putting the right usage policies and security technology in place, you can ensure your sensitive corporate data stays safe in transit and on employee devices. That's why Good Technology is offering you the Bring Your Own Device Policy Consideration Document.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Big Data Analytics Masters Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

CES 2013: 7 Standout Technologies
What happens at CES 2013 doesn't stay in Vegas. From giant tablets to $20,000 televisions, take a peek at a few early standouts for gadget lovers.

CES 2013: 9 Cool Gadgets
Consumer Electronics Show is a tech smorgasbord. Here are nine products that attest to the show's overwhelming variety.

12 Best iPhone, iPad Apps Of 2012
You already know about Skype, Instagram and Angry Birds. Check out these business-friendly iPhone and iPad apps you may not have tried, plus an amusing diversion or two.

 

SLIDESHOWS
8 Key Changes In Microsoft SharePoint 2013
Microsoft's popular collaboration platform gets a significant revamp with SharePoint 2013. Here's what you gain.   View Now

ALSO SEE
10 Mobile Health Apps From Uncle Sam
CES 2013: 7 Standout Technologies

MORE SLIDESHOWS
spacerspacerspacer
VIDEOS

CES 2013: Intel core for tablets, ultrabooks
Intel announced pull ins for core products, noting the new processors would come out earlier than expected and enable thinner, lighter ultrabooks and tablets with all-day battery life.   Watch

ALSO WATCH
CES 2013: Intel's new smartphone reference design
CES Unveiled (Call of the Weird)

MORE VIDEOS
spacer
 
WEBCASTS
Is Your Network Ready for BYOD?
Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy. More Information & Registration

Click here
 
RESOURCES AND EVENTS
2013 InformationWeek 500: Nominations Now Accepted
Nominate your company for the 2013 InformationWeek 500 -- our 25th annual ranking of the country's most innovative users of business technology. Organizations with $250 million or more in revenue may pre-register now to receive more information.
Deadline is April 12



This e-mail was sent to EmailAddress

InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Comment  | 
Print  | 
More Insights
Cartoon
White Papers
Register for Network Computing Newsletters
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Slideshows
Twitter Feed