Ready To Outsmart PCI? New Techs Help IT Comply
The PCI Data Security Standard is costly, complex, and rigged against the retailers, merchants, and processors that must comply with it. But those very attributes may be the most potent catalyst to bring about meaningful protection of credit card data -- not because of the PCI requirements themselves, but because PCI will drive merchants toward end-to-end encryption and tokenization. Download Now (Registration Required)
VoIP Best Practices
Learn how VoIP-enabled meeting systems are revolutionizing the world of audio conferencing. This white paper explains why VOIP is fast becoming the audio conferencing technology of choice.
FEATURED BLOG Gov 2.0: Aspiring To Greatness In Open Government By John Foley Tim O'Reilly is raising the bar on what he envisions for the open government movement. At this week's Gov 2.0 Expo in Washington, D.C., O'Reilly won't be talking merely about government serving as "a platform" -- that was last year's idea -- but about government as "a platform for greatness."
Droid Shadow Materializes, Droid Incredible Vanishes By Eric Zeman It's not quite the same story as getting drunk and leaving it in a bar, but a Motorola Droid Shadow was lost (and then found) in Verizon corporate gym. At the same time, the Droid Incredible has mysteriously vanished from Verizon Wireless' web site.
Gov 2.0: Quit The Social Media Whining, Bureaucrats By J. Nicholas Hoover
Even at the Gov 2.0 Expo, a government IT event where the geeks seem to outnumber the bureaucrats, I hear the same old refrain about social media and open data from some questioners and attendees: we can't do this, management won't accept it, government regulations make it too hard.
Microsoft Says China Piracy Killing Thousands Of U.S. Jobs By Bob Evans
Insisting that software piracy in China has become so pervasive that "there is no software market to speak of" in the fast-growing country, Microsoft CEO Steve Ballmer said yesterday that enhanced enforcement in China of intellectual-property rules could save U.S. firms tens of thousands of jobs, Bloomberg reports.
What Exactly Is '4G'? By Eric Zeman
The term "4G" is being tossed around a lot in the tech industry right now, and in some instances is being misapplied. InformationWeek takes a few moments to to help sort out this alphabet soup and explain what's really going on here.
Cloud Platform Strategy
In this editorial Webcast, we'll analyze the key IT infrastructure considerations that must be taken into account for creating private clouds in federal data centers: software/hardware environment, multi-tenancy, security, virtualization, and management tools. We'll also discuss the key role that APIs play in supporting hybrid scenarios that tap into public cloud services.
Virtual Event: Merging Mobility And UC In The Enterprise
Microsoft has made the Ribbon a standard feature across all Office applications in its latest release, and it has made the Ribbon customizable. It also has made many of the Office 2010 features more visible in the Ribbon, and added some new features.
Take Our Cloud Computing & IT Staffing Survey -- You Could Win An iPod Touch!
InformationWeek Analytics is conducting a survey to investigate the impact of cloud computing on IT professionals. The results of this survey will appear in an upcoming issue of InformationWeek as well as an in-depth InformationWeek Analytics report. This survey will take under 10 minutes to complete. Upon completion, you will be eligible to enter a drawing to receive one Apple 32-GB iPod Touch valued at $299 from TechWeb. Your responses will remain confidential and will only be reported in aggregate.
Survey ends June 3
InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030
To subscribe to our other newsletters, change your e-mail address or format (Text/HTML) or to unsubscribe, click here
This e-mail was sent to %%email%%
Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@example.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
Jeremy Schulman, founder of Schprockits, a network automation startup operating in stealth mode, joins us to explore whether networking professionals all need to learn programming in order to remain employed.
Research: 2014 State of the Data CenterOur latest survey shows growing demand, fixed budgets, and good reason why resellers and vendors must fight to remain relevant. One thing's for sure: The data center is poised for a wild ride, and no one wants to be left behind.
6 UC Trends to WatchInformationWeek’s 2014 Unified Communications Survey shows a revitalized market; 77% of 488 respondents have deployed UC or plan to within 24 months. Among those deploying or with plans, internal IT owns this tech: 40% will keep UC completely on premises vs. 3% going all cloud. For hybrid setups, 24% are primarily on premises vs. 17% mostly cloud.