Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

3 Truths: Cloud SLAs |Should Businesses Unlock Old iPhones?

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Monday, April 9, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist Unlocking Old iPhones: Should Business Users Bother?
By Eric Zeman
Apple and AT&T have finally begun allowing customers to unlock old iPhones. Consider the implications for business users.

RELATED
Hackers Jailbreak iPad 2, iPhone 4S
Want IT Flexibility? Demand Jailbreaking Be Legal

Q&A: IBM Global Business Services CTO Talks Cloud
IBM Fellow and Global Business Services CTO Kerrie Holley, who helped shape SOA, shares his thoughts on cloud trends, the future of IT, and more.

Is Legacy Storage Dead?
Every major vendor will bring out a flash-only storage system before the end of the year--and almost every one of these products will fail. Legacy vendors have got to stop treating solid-state storage as if it were just a faster hard drive.

4 Tips: How To Land An IT Security Job
IT security pro salaries continue to rise. Here's one security expert's advice on how to break into the field.

Calling While Driving Bans: Readers Speak Out
In a state where government plays nanny, mobile phones equal a danger as great as DUI. Let's apply critical thinking to the issue of regulating phone use in cars, instead of mob mentality.

Microsoft's Switch From Siebel CRM To Dynamics Speaks Volumes
The "moat" around Oracle's CRM products that once kept customers from leaving is drying up as Fusion comes up short and more viable options emerge.

iPad Mini: 6 Reasons Apple Must Do It
Apple has good reasons to think smaller with its next iPad, as a Google Android tablet waits in the wings.

QUOTE OF THE DAY
"The ultimate tragedy is not the oppression and cruelty by the bad people but the silence over that by the good people." -- Martin Luther King, Jr.

ALSO SEE

Microsoft's Switch From Siebel CRM To Dynamics Speaks Volumes
iPad Mini: 6 Reasons Apple Must Do It
Strategy: Development Labs in the Cloud
Learn to Navigate Evolving Enterprise Security Threats
iPad Mini: 6 Reasons Apple Must Do It
Prepare Your Infrastructure For The Cloud Using Open Standards
It's Coming: Interop Las Vegas

Download our iPad App

JOIN THE CONVERSATION
Posted By Number 6:
"How much will AT&T and Verizon charge for the Google Glasses data plan and will they throttle it as you exceed the "average" usage?"
In reply to: "Google Demos Its Augmented Reality Glasses"
View Entire Response | Post Your Own Reply

Posted By Fill:
"I remember [Steve] Jobs said that anything smaller than 10 inches wouldn't be a good tablet. I suppose there is a market for a smaller iPad, but is it large enough or profitable enough?
In reply to: "iPad Mini: 6 Reasons Apple Must Do It"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD DARK READING's APRIL 9 2012 DIGITAL ISSUE
Stop insider theft and accidental disclosure with network and host controls--and don't forget to keep employees on their toes.

Also: Lessons From The Global Payments Breach; FTC Proposes "Privacy By Design"; and More -- Exclusively in Dark Reading's latest digital issue!

DOWNLOAD NOW FREE (Registration Required)

 


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Strategy: Development Labs in the Cloud
The options available for putting a lab in the cloud are increasing. We take a look at the costs, complexities and challenges involved in making a move to either a public or private cloud lab, and help you figure out how to get there.
Download Now (Registration Required)

Featured Report
Informed CIO: Is Your IT Infrastructure Ready for Mobility?
No one likes to think about a large meeting with multiple mobile devices bringing a WLAN to its knees, but we've seen it happen. Here's how to help your wired and wireless networks seamlessly support mobile and/or remote users--and not buckle under pressure.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Learn to Navigate Evolving Enterprise Security Threats
nternet security has evolved over the last 10 years. Sophistication of the malware has fundamentally changed the way security teams must think about these new threats and the tools used for detective controls. Learn how security professionals are taking full advantage of Splunk's analytics and visualization capabilities, and unique ability to process big data.
Download Now (Registration Required)

Storage: The 5 Keys to Successful Desktop Virtualization
Desktop virtualization is attractive to IT managers to simplify IT management, enhance security, ease regulatory compliance and reduce desktop infrastructure costs. To prepare your data center for its rigorous demands, you must choose the right storage infrastructure. Learn to identify the unique problems with desktop virtualization and five keys to desktop virtualization success.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
iPad Mini: 6 Reasons Apple Must Do It
Apple has good reasons to think smaller with its next iPad, as a Google Android tablet waits in the wings.

8 Things Tablets Still Can't Do
Have we really entered a post-PC world? The new Apple iPad and its tablet rivals still come up short on a few important measures.

New iPad Teardown: Inside Apple's Tablet
The new iPad isn't just beautiful on the outside. Check out the inside view of how Apple made this tablet's power and design click.

10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.

Nokia Lumia 900: Windows 7 Phone King
Nokia's Lumia 900 is the new king of the Microsoft Windows Phone 7 hill. But it doesn't really stand apart from Apple, Samsung, or HTC smartphone rivals.

 


SLIDESHOWS
6 Social Sites Sitting On The Cutting Edge
Your company's Facebook and Twitter presence are established, but don't rest there. Consider these other social sites--some familiar, some less so--that you need to have in your sights.   View Now

ALSO SEE
8 Things Tablets Still Can't Do
10 CIOs: Career Decisions I'd Do Over

MORE SLIDESHOWS

spacer spacer spacer
spacer
 


WEBCASTS
Prepare Your Infrastructure For The Cloud Using Open Standards
Take part in our Interop Webcast which will look at the new drivers influencing cloud infrastructure. It happens April 18. More Information & Registration

 


RESOURCES AND EVENTS
It's Coming: Interop Las Vegas
See the future of business technology at Interop Las Vegas, May 6-10. It's the best place to learn how cloud computing, mobile, video, virtualization, and other key technologies work together to drive business. Register today with priority code CPQCNL07 to get a free Expo Pass or to save 25% on Flex and Conference passes.
Don't Miss It -- Register Today!

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.