Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

7 Keys: Mobile Device Security | MS Office For iPad Nears

InformationWeek Daily
InformationWeek Daily  
  Tuesday, February 21, 2012
Between The Lines Columnist Microsoft Office For iPad Nears Release?
By Eric Zeman
Microsoft appears close to debuting a version of its Office productivity suite for Apple's iPad.

10 iPad Annoyances, Solved
Kindle Fire Vs. iPad 2: Top Tablet Troubles

7 Ways To Toughen Enterprise Mobile Device Security
Smartphones extend the network perimeter like never before, but also give potential attackers new entry routes. Consider these get-tough strategies.

5 Reasons You Blew Your IT Budget
CIOs constantly struggle to keep IT spending under control. Consider these common reasons for budget overruns, along with some potential solutions.

HIMSS Chief Predicts Dialed-Down Health IT Requirements
Government's Stage 2 Meaningful Use requirements may get less stringent, based on lower than expected Stage 1 adoption, forecasts health IT group's CEO.

RIM Finally Gives The PlayBook Email
With PlayBook OS 2.0, Research In Motion tablet gains native email and other enterprise-critical features, nearly a year after launch.

Teradata Builds Big Data Pipeline To Hadoop
Hortonworks will collaborate with Teradata on cooperative data exchange tools and a reference guide for when--and how--to use Hadoop.

What Makes A Top Storage Startup?
IT professionals need to keep an eye on the recent boom in innovative, new storage firms. Here's why.

Solid State: From Silver Bullet To Silver Lining
Solid state storage looks to become a standard part of an enterprise IT infrastructure, providing a boost to applications and general IT needs such as tiering and virtualization.

Confrontation is something that I accept as part of the project though not its purpose. -- Andy Goldsworthy


What Makes A Top Storage Startup?
Solid State: From Silver Bullet To Silver Lining
Research: Can RIM Be Saved?
Three Steps to Effective Cloud Planning and Design
10 Steps To Smartphone Privacy
Social Analytics: Putting the Science into Social Business
Take Our Strategic Security Survey

Posted By herman_munster:
"I think the thing that interests me most is MS's dedication to that Metro theme. I'm not a fan of it, I am very curious to see how the general public will receive it once it's released."
In reply to: Microsoft Office For iPad Nears Release?
View Entire Response | Post Your Own Reply

Posted By TuleeGirl:
"I hate being tracked by Google with their 'above the rest' attitude. I thought they were 'special' when it came to using users personal information."
In reply to: Google's Privacy Invasion: It's Your Fault
View Entire Response | Post Your Own Reply

  Digital Issue  
As federal agencies embrace devices and apps to meet employee demand, the White House seeks one comprehensive mobile strategy.

Also: Smartphone Security; FedRAMP Takes Shape; NIST Lays Out Priorities...and more!

DOWNLOAD NOW (Registration Required)


Research: Can RIM Be Saved?
While the future looks pretty grim, there are some moves the company can make-but they need to be bold, and fast.
Download Now (Registration Required)

Featured Report
Research: State of Storage 2012
With solid state reaching new levels of affordability, it's rapidly displacing mechanical disk for many Tier 1 applications. In short, it's an interesting time to be in the storage business.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
Three Steps to Effective Cloud Planning and Design
Before you build your cloud, there are many considerations. Are there security requirements? Compliance rules? Will you use public cloud resources as well? Learn how to plan a cloud effectively from defining requirements to identifying the costs.
Download Now (Registration Required)

Man-in-the-Browser Attacks Explained
This white paper introduces the MITB attack, explains the infection rate, features and functionality of the attack and provides advice on how financial institutions can mitigate the threat.
Download Now (Registration Required)

10 Steps To Smartphone Privacy
Smartphone owners, it's you versus bad guys and nosy apps. Follow these 10 tips to keep your data locked down.

Telcos Poised To Disrupt Amazon's Enterprise Cloud
Telephone companies have the assets and track record in delivering secure and reliable services to grab a piece of the enterprise cloud services market popularized by Amazon and Rackspace.

InformationWeek News Images

How One SMB Went Green With iPads
West Paw Design discovered that Apple's tablets let the pet supply company save money, improve productivity, and reduce its environmental impact.

6 Predictions For Business Intelligence In 2012
A look at in-memory analysis, visual discovery, big data, mobile BI, cloud and social BI achievements in 2011 and forecasts for the year ahead.


10 Tablet Tricks To Try
Do you know your tablet can also act as a teleprompter, whiteboard, heart rate monitor, or even an emergency Windows 7 machine?   View Now

Top 10 Open Government Websites
12 Hadoop Vendors To Watch In 2012


spacer spacer spacer
Big Data, Big Social, Big MDM
In Episode 3 of Valley View, hosts David Berlind and Fritz Nelson have guests from Google,, MetaMarkets, telyHD, Good Technology, Mobile Iron and the CIO of the San Francisco Symphony.   Watch

Robert Holleyman, President and CEO, Business Software Alliance
Chris C. Kemp, CEO, Nebula and Co-Founder, OpenStack



Social Analytics: Putting the Science into Social Business
In this session we will discuss how social analytics can be applied to a variety of functions such as human capital management, sales force automation, and enterprise marketing management and the impact that social analytics is having on social channel interactions and traditional business processes. It happens Thursday, March 1, 2012. More Information & Registration


Take Our Strategic Security Survey
InformationWeek is conducting a survey on information security and risk management. Upon completion of our survey, you will be eligible to enter a drawing to receive an 64-GB Apple iPad 2.
Survey ends March 9

Virtual Event: The Future of Multi-Channel Distribution
In this all-day virtual event, top business technologists, experts, and solution providers will discuss strategies, essential technologies and evolving regulator/legal issues around the next generation of multi-channel distribution best practices.
It happens March 1st -- Register Today!

This e-mail was sent to EmailAddress
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.