News

05:43 PM
Connect Directly
RSS
E-Mail
50%
50%

With Cloud, What You Don't Know Can Hurt You

InformationWeek Daily: Issue Highlights    Manage Subscription  |  Contact Us

TOP STORY: With Cloud, What You Don't Know Can Hurt You

MORE NEWS: Botnets, Hacked Credit Cards Selling At Bargain Prices

ANALYTIC REPORT: State Of Enterprise Storage Report

WHITEPAPER: IPv4 Address Pool Will Run Dry: Network Management Whitepaper

SLIDESHOW: Inside Joomla 1.6: Improved Access Control, Categories

VIDEO: Tutorial: 10 Steps To Mobile Worker Support

BLOG: SMB Security Means Putting Policy First

WEBCAST: Tips and Tricks on Memory Management in Virtualized Environments

RESOURCES: Plugging The Leaks: Finding And Fixing The Security Holes In Your Enterprise


InformationWeek Daily

InformationWeek Daily

 

Monday, January 24, 2011

 

QUOTE OF THE DAY...
"The first step to getting the things you want out of life is this: Decide what you want." -- Ben Stein

INFORMATIONWEEK.COM   |   NEWS   |   ANALYTIC REPORTS & WHITEPAPERS   |   BLOGS   |   WEBCASTS   |   RESOURCES

TODAY'S TOP STORY

With Cloud, What You Don't Know Can Hurt You

Inevitably, cloud announcements, like Amazon's introduction of Elastic Beanstalk, sound good, but there are limits.



RELATED INSIGHTS
6 Ways To Fail In The Cloud
Private Clouds Taking Off

ALSO SEE

Botnets, Hacked Credit Cards Selling At Bargain Prices

Cybercrime black market emphasizes entrepreneurialism and customer service, with money buying just about anything, finds Panda Security report.



Global CIO: IBM Zings Oracle And HP Over Limited Vision
Calling Oracle "a one-trick pony" and saying HP's failed to invest wisely, IBM's hardware chief says IBM's surging hardware revenue is a sign of things to come.

IBM Workers Get $1,000 Stock Bonuses
Record sales and profits provide an unexpected windfall for Big Blue's rank and file employees.

Dear Larry. A Personal Note From Byte.com To Google's New CEO

Gina Smith sends a note to Larry Page -- urging him to not be evil and please, start building stuff again!



Google Acknowledges Web Spam Complaints

Low-quality content has some Internet users worried about the relevance of Google search results.



Obama Nominates Army IT Leader To CIO Post

Lt. Gen. Susan Lawrence selected to assume the post that innovative IT leader Gen. Jeffery Sorenson vacated in November.



Camino Upgrades Open Source Mac Browser

Version 2.1 Alpha is based on Mozilla's Gecko rendering engine, adds six major features.



The Future of Google Docs

Docs has become a worthy competitor to Microsoft Office, but its future will rely less on feature parity and more on the value being added to Google's platform in the cloud.



Qwiki Snags $8 Million In Venture Funding

Founders of Facebook, YouTube invest in startup that delivers search results in multimedia, rather than links.



  Digital Issue  
DOWNLOAD DARK READING'S FIRST-EVER DIGITAL ISSUE

Cutting-edge attacks like Stuxnet and Zeus will be the everyday exploits of the future. Here's what you need to know. That and more -- including five best practices to improve the budgeting process for security spending -- in the debut all-digital issue of Dark Reading.


DOWNLOAD NOW (Registration Required)

 

--------------------------------------------------
This issue is sponsored by LinkTek:
--------------------------------------------------
Don't take unnecessary risks during your data migration! Moving or renaming files and folders can break (corrupt) thousands of links in your users' files. New, patented technology lets you migrate files without creating broken links! Use LinkFixerPlus to eliminate the risk of broken links in Excel, Word, PowerPoint, Access, PDF, AutoCAD, MicroStation, PageMaker, InDesign, HTML and other types of files.
Download your FREE trial version now!

ANALYTIC REPORTS & WHITEPAPERS

FEATURED REPORTS

State Of Enterprise Storage Report
Budgets may be stagnant, but the recession has not put a damper the growth of enterprise data and related storage requirements. Too bad, then, that our infrastructures aren't keeping pace, according to our survey respondents. In this report we'll analyze poll results and discuss top technologies that can help storage managers do more with less.
Download Now (Registration Required)

Featured Report

Beating Cloud Lock-In: Our 3 Top Considerations
Whether you're talking about SaaS, IaaS, or storing data in the cloud, companies must consider how they'll unwind relationships -- customizations, metadata, contracts, and depth of integration are all factors.
Download Now (Registration Required)

Featured Report

MORE ANALYTICS

spacer spacer spacer

FEATURED WHITEPAPERS

IPv4 Address Pool Will Run Dry: Network Management Whitepaper
Compliance for compliance's sake is not a best practice in protecting cardholder data. Learn why compliance is the byproduct of a well-executed information security program that focuses on risk managementand minimizes the use of compensating controls. Download Now

The Cloud-based Telework Solution
By combining a cloud-based management platform with user-friendly devices, discover a new approach to remote access with the simplicity, centralized visibility & control, and economies of scale. Download Now

MORE WHITEPAPERS AT


MULTIMEDIA

SLIDESHOWS


Inside Joomla 1.6: Improved Access Control, Categories
The new Joomla system now features much stronger user access control features that make it possible to define who can access and change content on a site and do so in a very fine grained and detailed manner. And Joomla 1.6 has ditched its old two-level site organization and added a new Categories system that allows for unlimited nested levels of content.   View Now


ALSO SEE

Top 15 Facebook Apps For Business

NRF Big Show 2011: Breakthrough Technologies For Retailing

MORE SLIDESHOWS

spacer spacer spacer

VIDEOS


Tutorial: 10 Steps To Mobile Worker Support
Find out ways a company can support workers' mobile computing/connectivity requirements, securely and economically.   Watch

ALSO WATCH

Intel Educational Exchage for Parallelism

CES 2011: Cellcontrol Device Sets And Enforces Safe Driving Policies

MORE VIDEOS

spacer


TODAY AT THE BLOG


FEATURED BLOG
Featured Blogger

SMB Security Means Putting Policy First
By Keith Ferrell
How long since you've taken a look at your business's security policy? (Assuming, of course that your business has a security policy.)

ALSO SEE

SMBs Expanding Marketing Options In 2011
By Jake Widman
According to Ad-ology Research, the numbers of small businesses planning to invest in online video and mobile marketing are both sharply up from last year, part of an overall increase in planned ad spending.

How Careful Do You Need To Be With Cloud Storage? - Security
By George Crump
Developing a cloud storage strategy is moving to the top of many IT managers project lists. How to use cloud storage and what applications or processes could benefit the most from the use of cloud storage are key questions to answer. One mantra that keeps coming up is 'you have to be careful' with cloud storage rollouts. Really? What makes cloud storage so risky that it requires this extra caution?

Tablets Used Mostly For Email And Media Consumption
By Eric Zeman
Data compiled by In-Stat reveals that the most widespread use of tablet computers is for PIM management and multimedia playback.

Changes To Sprint And AT&T Plans
By Ed Hansberry
If you have service with either AT&T or Sprint, you might want to keep an eye on your bill, or at the very least, be very careful before making any changes that could garner some new charges for you.

WEBCASTS

Tips and Tricks on Memory Management in Virtualized Environments
Join this informative webcast and gain a greater appreciation for the strategies experts use today in managing their virtual environments. Attendees will gain a better understanding of how to recognize where memory constraints are impacting performance. We'll also explore how memory ballooning and swapping may impact the performance of your virtualized applications.

It happens Tuesday, February 8, 2011 More Information & Registration

-----------------------------------------------------------------
Risk, Compliance, and Next-Generation Threats Executive Security Seminar Series
-----------------------------------------------------------------
Executive Security Seminar Series
Hackers are getting better at their jobs every day. How do you know which new threats pose the greatest dangers? How can you find out what the latest attacks look like and how they might affect your enterprise? How can you begin to build up your defenses? Join us for this executive breakfast and walk away with insights and new ideas on how to protect against the latest wave of cyber attacks and prioritize your security efforts.
Thursday, January 27th - San Francisco


RESOURCES AND EVENTS

Plugging The Leaks: Finding And Fixing The Security Holes In Your Enterprise
In this all-day virtual event sponsored by Dark Reading and InformationWeek, you'll find out how criminals target the flaws in your IT environment, and you'll get some insight on the best methods for finding and fixing your vulnerabilities -- before you're hit by malware or unauthorized access.

You'll also get a look at the reasons why insiders may leak data to the outside, and get some recommendations on how to stop those leaks before they happen.
It happens Feb 3. (Free registration required.)

We'll See You At Interop Las Vegas
Get up to speed on IT innovations in cloud computing, virtualization, security, and more at Interop Las Vegas, May 8-12.
Register Today

Web 2.0 Expo San Francisco 2011
Now in its fifth year, Web 2.0 Expo is for the builders of the next-generation Web: designers, developers, entrepreneurs, marketers, and business strategists. This year we're focusing on how you can unlock the digital economy as well as the ways you can leverage important ideas for your own success. We'll apply the economic filter to data collection, social connections, social media platforms, browser successes, old media in new channels, and global commerce among other hot topics.
It happens March 28-31 in San Francisco.

Interop Las Vegas
Get up to speed on IT innovations in cloud computing, virtualization, security, and more at Interop Las Vegas, May 8-12.
Register Today!


This e-mail was sent to %%email%%

InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

GET MORE OUT OF INFORMATIONWEEK
Keep up with the latest news, insights and trends as InformationWeek reports them:

newsletters
Facebook
Twitter


Comment  | 
Print  | 
More Insights
Cartoon
White Papers
Register for Network Computing Newsletters
Current Issue
2014 State of Unified Communications
2014 State of Unified Communications
If you thought consumerization killed UC, think again: 70% of our 488 respondents have or plan to put systems in place. Of those, 34% will roll UC out to 76% or more of their user base. And there’s some good news for UCaaS providers.
Video
Slideshows
Twitter Feed