Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

5 Steps To Facebook Security |Indian Outsourcing Reboots

InformationWeek Daily
InformationWeek Daily  
  Monday, November 14, 2011
REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  
MUST READ
Between The Lines ColumnistIndian Outsourcing Model 'Over,' Says HCL Exec
By Paul McDougall
Offshore player builds out U.S. presence and plans to hire more domestic talent to support customers' strategic IT engagements.

RELATED
Foreigners Don't Take IT Jobs, They Create Them
Occupy Wall Street A Threat To Outsourcing?

5 Ways Enterprises Can Stay Safer On Facebook
Some companies are pumping more time and money into business Facebook pages without considering the lack of control when things go wrong. Consider...

Warren Buffett Takes 5.5% Stake In IBM
Oracle of Omaha went long on Big Blue after reviewing IT operations at Berkshire Hathaway's various holdings.

W3C Proposes Do Not Track Privacy Standard
Microsoft, Mozilla, Google, Apple, privacy groups, and online advertising associations work to balance consumers' interests with Web companies' requirements for user data.

Microsoft, Google Strugle With New Face Of Collaboration
Microsoft's Office 365 is not the future and neither is Google's Gdocs. But it just might be Facebook or Chatter.

RIM Loses Developer Interest, Microsoft Gains
Microsoft's partnership with Nokia led to a surge in interest in its Windows Phone platform by developers, according to IDC research.

Encryption Security Lags In Healthcare?
Tech leaders warn policymakers that even as more electronic health records flood health IT systems, more encryption is needed.

Hackathon Crowdsources Radical Ideas In Management
How should management reinvent itself in the social era? At this week's Enterprise 2.0 conference, management hackathon will use collaboration tools to crowdsource ideas.

QUOTE OF THE DAY
Time is what we want most, but what we use worst. -- William Penn

ALSO SEE

Encryption Security Lags In Healthcare?
Hackathon Crowdsources Radical Ideas In Management
IT Pro Impact: Windows 8
Stop SQL Injection: Don't Let Thieves in Through Your Web Apps
10 Epic iPad Apps
Tackling Top Priorities For IT Infrastructure & Operations Leaders
InformationWeek 2012 Midrange SAN Vendor Evaluation Survey

JOIN THE CONVERSATION
Posted By SimonS1:
"This is going to make Intel absolutely furious. The more interesting aspect of this story is how Intel is going to react to HP going after their bread and butter x86 space. Goodbye Itanium?"
In reply to: HP Plans Low-Power Servers Using Calxeda ARM Chips
View Entire Response | Post Your Own Reply

Posted By hoapres:
"What is needed is a complete freeze on visas with the exception of true geniuses. If we have a true labor shortage then wages go up to encourage young Americans to enter the field."
In reply to: "Foreigners Don't Take IT Jobs, They Create Them"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD OUR SMB DIGITAL ISSUE
A phased data center upgrade makes technical and financial sense. Randy George suggests six steps to follow.

ALSO: Michael A. Davis discusses strategies for how the make your Managed Service Provider work for you.

DOWNLOAD NOW (Registration Required)
 


 
ANALYTICS & WHITEPAPERS
FEATURED REPORTS
IT Pro Impact: Windows 8
Our exclusive research shows many IT organizations are still in the midst of efforts to move to Microsoft's Windows 7 and as such are not ready to jump into a Windows 8 migration now-or, for many, anytime soon. Higher on the docket: Minimizing the need to worry about the underlying OS.
Download Now (Registration Required)
Featured Report

Strategy: Patch Management
It's no longer sufficient to patch just Windows, Office and IE. With the massive array of applications now residing on enterprise PCs, and the proliferation of mobile and cloud-based applications, your business is far too vulnerable to exploitation unless you have a solid strategy for patch prioritization, deployment and quality assurance. Follow these steps to put your plan in place.
Download Now (Registration Required)
Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS
Stop SQL Injection: Don't Let Thieves in Through Your Web Apps
Think your corporate website isn't vulnerable to a SQL injection attack? Start rethinking. SQL injection is among the most prevalent -- and most dangerous -- techniques for exploiting Web applications and attacking back-end databases that house critical business information at companies of every size. And it persists despite relatively simple and effective countermeasures. Learn how SQL injection works and how to secure your Web apps and databases against it.
Download Now (Registration Required)

Business at the Speed of Virtualization
In order for businesses to be simultaneously more agile, flexible, efficient, and green, IT must become all these things first through server virtualization and cloud computing. Download this white paper to learn how to prepare your IT department for an agile and flexible future.
Download Now (Registration Required)

MORE WHITEPAPERS
 


MOST POPULAR NEWS
10 Epic iPad Apps
Apple's iPad completely changed the way people think about tablets and mobile computing. These 10 must-have iPad apps will help you understand why.

iPhone 4S: 4 Fastest Ways To Drain Battery
As Apple continues to investigate the iOS 5.0.1 battery life problems, learn about the four things that will kill your iPhone's battery as quickly as possible.

10 Epic Android Apps
Among the hundreds of thousands of Android apps, we've rounded up 10 epic, must-have choices. These apps will save your bacon, day in and day out.

10 Essential Cloud Apps For SMBs
Online tools let you get going fast and pay as you go, two factors that appeal especially to SMBs. From productivity to analytics, these 10 apps deserve your attention.

The Doctor Will See Your Data Now: Wirelessly?
Thirty-six percent of consumers interested in sending health data to their doctors via a wireless device; 32% would do a video consult, survey says.

 

SLIDESHOWS

10 Epic iPad Apps Apple's iPad completely changed the way people think about tablets and mobile computing. These 10 must-have iPad apps will help you understand why.   View Now

ALSO SEE
Enterprise 2.0: Meet The Launch Pad Finalists
12 Tech Startups To Watch, For SMBs

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
Huge Mobile Traffic Projections
Huge Mobile Traffic projections highlight Ericsson's Traffic and Market Data report   Watch

ALSO WATCH
Welcome to the FFIEC Solutions Lab
Machine-to-Machine Market -- PyramidPreview

MORE VIDEOS

spacer
 


WEBCASTS
Tackling Top Priorities For IT Infrastructure & Operations Leaders
Join this webinar to understand why IT executives are prioritizing these initiatives, the business value they expect to receive, and recommended steps to address them. It happens Thursday, November 17, 2011 -- Time: 11:00am ET / 8 am PT More Information & Registration

 


RESOURCES AND EVENTS
InformationWeek 2012 Midrange SAN Vendor Evaluation Survey
InformationWeek is conducting a survey on the state of database technology in the enterprise. Respond to the survey and be eligible to win an iPad 2.
Survey ends Nov. 18

Cloud Connect Is Coming!
Learn about the latest cloud technologies and platforms from industry leaders and thinkers at Cloud Connect. It takes place in Santa Clara, Calif., Feb. 13-16.
Get More Details And Register Today!


This e-mail was sent to %%email%%
INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.