Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

11 Linux History Milestones | HP Has Much To Prove

InformationWeek Daily
InformationWeek Daily  
  Friday, August 19, 2011
Between The Lines ColumnistWild Day Leaves HP With Much To Prove
By Fritz Nelson
A low margin PC business combined with a stilted mobile effort was a distraction for a company with much bigger battles to win. But it's a shame HP didn't realize this long ago.

R.I.P. HP WebOS and Palm: An Obituary
HP Spins Off PCs, Kills TouchPad, Eyes Autonomy

11 Milestones In Linux History
As Linux turns 20, we look back on key moments for the OS that started as a school project and became a major force in technology.

Apple Preps iPad3 With Retina Display
Apple looks to outpace competition by releasing an iPad with a high-resolution display in early 2012.

Enterprise Social Networking: What's The Worst Case Scenario?
Experts weigh in on some of the biggest social security risks that threaten enterprises and how to thwart them.

Can Google AdWords Express Deliver ROI?
Google's automated version of AdWords touts easy search campaigns for smaller businesses. SMBs and online marketers highlight some pros and cons...

Motorola's Security Expertise Could Help Google's Android
Motorola can help Google make Android more secure, and more attractive to business and government customers.

IBM Reveals Chip That Acts Like Human Brain
IBM is testing a computer chip modeled on human neural processing, as it tries to create silicon better suited to real-world, multi-source data processing at low power.

Google Disputes Socially Engineered Malware Study
After IE9 beat Chrome on security in a report, Google says social engineering accounts for only 2% of malware found on the Web.

"All change is not growth, as all movement is not forward." -- Ellen Glasgow


IBM Reveals Chip That Acts Like Human Brain
Google Disputes Socially Engineered Malware Study
Database Breaches: Lessons Learned From Real-World Attacks
Chose a Cloud Hosting Provider with Confidence
Is Google Eying Healthcare Once Again?
The End User Experience: The Metric that Matters
Take Our 2011 State Of Server Technology Survey

Posted By SMP:
"ARM's chips that power smartphones and other portable low power devices are far more power efficient than Intel's Atom, and far more compact (allowing more other circuits like video decoders or GPS receivers to be crammed onto a single chip). This has nothing to do with Intel lacking engineering prowess, but rather it is down to the fact that Intel's chips support an extensive instruction set that carries the baggage necessary to run the Windows operating system and Windows applications."
In reply to: Intel's Atom chips will never catch up with ARM
View Entire Response | Post Your Own Reply

Posted By dyoung804:
"Text messages consume FAR less bandwidth than other data uses (such as video) so it is possible for AT&T and other service providers to offer an unlimited text plan."
In reply to: AT&T Kills $10 Texting Plans, Pushes Unlimited Options
View Entire Response | Post Your Own Reply

  Digital Issue  
UC Gotchas: Lessons from five companies on the front lines of implementing unified communications.

ALSO: Making The UC Case: Mike Fratto discusses the right way to go about it.

DOWNLOAD NOW (Registration Required)


This issue sponsored by Trend Micro, Inc:
Ranked #1 in Virtualization Security* Find out how our specialized Server, Data Storage, and Encryption technologies help enterprises reduce risk, maintain compliance and control costs.

Database Breaches: Lessons Learned From Real-World Attacks
In this Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk.
Download Now (Registration Required)
Featured Report

State Of Storage 2011 Report: Consolidation And Centralization
Download this report to see how smart CIOs will accelerate this trend by adopting new multipurpose arrays and converged networks.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
Chose a Cloud Hosting Provider with Confidence
The conversation around adopting cloud technology has progressed from "if" to "when." Many cloud service providers deliver the security that enterprises need, using SSL (secure sockets layer) certificates to secure data in motion. This white paper outlines specific issues that you must raise with hosting providers before selecting a vendor and highlights the ways in which SSL from a trusted certificate authority helps enterprises conduct business in the cloud with confidence.
Download Now (Registration Required)

Deduplication: The New Math
Deduplication changes IT's storage calculations for everything from backup to primary storage to capacity planning. With the old math, up to 50 percent of your storage capacity could sit idle. Download this report to review how deduplication changes the equation.
Download Now (Registration Required)


Nokia CEO: Google's Motorola Buy Bad For Android
Android device makers should be wary of how Google's acquisition of Motorola will affect their relationship with Google, says Nokia CEO Stephen Elop.

AT&T Kills $10 Texting Plans, Pushes Unlimited Options
AT&T is forcing new wireless customers to choose between an unlimited text messaging plan and a 20-cent per-message rate.

VMware Pricing Controversy: Users Say Microsoft Door Open
InformationWeek surveyed IT pros about VMware's recent licensing policy change and their virtualization plans. They had plenty to say about VMware--and Microsoft.

5 Smartphone Location Tracking Myths, Busted
Apple, Google, and Microsoft are taking renewed heat over smartphone location tracking, but the topic is fraught with misunderstanding. Keep these points in mind.



100 Years Of IBM: 25 Historic Milestones IBM celebrates 100 years of innovation and business optimization. From punch cards to the S/360, from tabulators to teraflops, from CEO Watson to supercomputer Watson, IBM has a unique history. Take a visual tour back through the decades.   View Now

VMware Pricing Controversy: Exclusive User Research
Top 20 Add-Ons For Microsoft SharePoint


spacer spacer spacer
WhisperCore Mitigates Risks Of Android In Businesses
TechWebTV catches up with Whisper Systems' CTO and co-founder Moxie Marllinspike to discuss and demo WhisperCore -- a mobile security solution that brings BlackBerry-like centralized enterprise-grade security to Android devices.   Watch

MANDIANT CSO Talks Threats To His Company and His Clients
Intel Labs Invests in the Future of Cloud and Embedded Computing



The End User Experience: The Metric that Matters
Don't miss this informative webcast, sponsored by Quest Software, exploring the value of monitoring web application performance from the user perspective. It happens Thursday, August 25, 2011 -- Time: 11:00 AM PT / 2:00 PM ET More Information & Registration


Take Our 2011 State Of Server Technology Survey
InformationWeek Analytics is conducting a survey on the current state of server technology within the enterprise.
Take the survey now -- ends Aug. 19

Don't Miss Enterprise 2.0
Attend Enterprise 2.0 Santa Clara, Nov. 14-17, 2011, and learn how to drive business value with collaboration, with an emphasis on how real customers are using social software to enable more productive workforces and to be more responsive and engaged with customers and business partners. Save 30% off conference passes, or get a free expo pass with priority code CPHCES02.
Register Today

This e-mail was sent to %%email%%
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.