Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

80% Of Browsers Have Known Vulnerabilities

InformationWeek Daily: Issue Highlights
Manage Subscription  |  Contact Us

TOP STORY: 80% Of Browsers Have Known Vulnerabilities

MORE NEWS: Microsoft Releases Windows 7 SP1

ANALYTIC REPORT: Best Practices: IPv6 Transition

WHITEPAPER: 5 Steps to Transforming the Data Center

SLIDESHOW: 12 Worst Tech Predictions Of All Time

VIDEO: Desktop Virtualization Benefits

BLOG: Verizon iPhone Sales Disappoint

WEBCAST: 5 Key Considerations When Investing in a New Solution

RESOURCES: Attend Cloud Connect

InformationWeek Daily
InformationWeek Daily  

Thursday, February 24, 2011


"By cultivating the beautiful we scatter the seeds of heavenly flowers, as by doing good we cultivate those that belong to humanity." -- Robert A. Heinlein



80% Of Browsers Have Known Vulnerabilities

Most problems are caused by insecure plug-ins, such as Java, Adobe Reader, QuickTime, and Flash, finds Qualys.


Browser Guide: Choosing The Best Standard For Business

Review: Google Chrome 9 Unleashes New Features
Microsoft Internet Explorer 9 RC Arrives


Microsoft Releases Windows 7 SP1

Service Pack 1 for Windows 7 and Windows 2008 R2 bundles all bug fixes to date, but includes few new features.

Global CIO: SAS Takes On IBM, As IT Meets Marketing

Analytics is changing marketing, as recent M&A activity shows.

Apple Shareholders Reject Steve Jobs Succession Plan

Annual meeting sees company stockholders vote down a call for a formal arrangement that would identify potential replacements if Jobs' health deteriorates further.

HP Upgrades EliteBooks, ProBooks For Businesses

Intel's second-generation Core processors, as well as a Celeron processor option, will available on the business notebooks.

SAP Announces Blockbuster BusinessObjects Upgrade

Business intelligence and information management suites are synchronized and enhanced in a feature-packed release highlighting real-time analysis.

Apple MacBook Pro Expected With Light Peak

The company's updated MacBook Pro should be the first to bring Intel's Light Peak technology to market.

Meaningful Use Big Business For Healthcare Consulting Firms

IT consulting firms are helping healthcare providers assess health IT systems for potential HIPAA violations and achieve the fine points of meaningful use compliance.

TeleTech Offers Crowdsourcing, Simulations For Training

The business process outsourcer says the new educational tools can cut training time and produce better workers.

FBI Redesigns 'Most Wanted' Site

The agency has enhanced its search and other tools to improve the way people can help it locate fugitives and missing persons.

Apple Event Ignites iPad 2 Speculation

The iPad 2 is expected to make its debut at a special event Apple is hosting in San Francisco on March 2, along with some other surprises.

Few Businesses Use Social Media For Disaster Recovery

Only about 25% of businesses have added social media like Facebook or Twitter to their disaster recovery and business continuity plans, a survey by Janco Associates reveals.

  Digital Issue  


Federal agencies are making progress on the Obama administration's
Open Government Directive, but there's still a long way to go.
We give you our list of top priorities.

ALSO: Can the tech industry's ambitious plan to improve government
efficiency work? No way, says InformationWeek Government editor
John Foley.

Plus much more, exclusively in our Digital Issue

DOWNLOAD NOW (Registration Required)


Click here to visit: Channelweb



Best Practices: IPv6 Transition

IPv4 is not extinct, exactly, but it may as well be. If you don't act to add IPv6 capability to your network, you're not only limiting the growth and innovation potential of your business, you may also be turning away thousands of customers. In this report, we'll discuss strategies and provide an in-depth look at three real-world deployment models.

Download Now (Registration Required)

Featured Report

Research: 2011 Backup Survey

There's no excuse for your backup strategy being stuck in a rut. Today's system administrators can take advantage of myriad new and improved data protection technologies, including disk-to-disk backup, virtual tape libraries, data deduplication and cloud-based backups. These and other methods can help overcome two big problems: continued use of backup tapes as an archiving strategy (bad idea) and a lack of data protection for branch offices and remote employees.

Download Now (Registration Required)

Featured Report


spacer spacer spacer

5 Steps to Transforming the Data Center

Preparing a data center for the future requires automating the management tasks that consume most of an IT administrator's time. Check out this roadmap to make your data center truly efficient by aligning people, processes and technology.
Download Now

Web Searches from Blackhat SEO to System Infection

Every business on the Web wants attention. That's why Search Engine Optimization (SEO), an orchestrated attempt to attract visitors to a site, is so popular. But be warned: Cybercriminals increasingly use SEO to deliver malware to unsuspecting Web surfers' systems. This profitable practice, called Blackhat SEO, is simple to perpetuate, yet effective and dangerous. Find out how to protect your systems.
Download Now


  InformationWeek on Your iPad!  


It's easier than ever to get the business technology news and analysis you need with the InformationWeek Select iPad application, which provides a daily, easy-to-read compendium of stories hand selected by InformationWeek's editors.

Download the iPad app now so that you don't miss the latest reporting and insights from InformationWeek's award-winning editors!



12 Worst Tech Predictions Of All Time
The epic history of technology is littered with some incredibly lousy prophecies, often made by some very smart, very successful -- and very wealthy -- executives. We trolled the timeline of technology to find the most misguided (and in some cases just plain crazy) calls in the industry's storied past, from the telephone to television to YouTube.   View Now


Clicking Through Drupal 7's Features

NFC, Pico & Audio: Mobile Chips In Full View


spacer spacer spacer

Desktop Virtualization Benefits

Enhancing Security and Flexibility Through Desktop Virtualization   Watch


Big Ideas at the Mobile World Congress

Picochip Demos Streaming Video Over 4G




Featured BloggerVerizon iPhone Sales Disappoint

By Ed Hansberry

Despite record online sales for the Verizon iPhone, overall sales have been disappointing to those at Apple. Before you read too much into that though, there are a few things to consider.


Xerox Offers Mid-Range SMB Color Toner Printers

By Lamont Wood

High-price is justified by high print quality, says Xerox. The jury remains out on that, but the refill toner price is, as usual, no bargain.

Virtual PBX Offers IP Solution

By Paul Korzeniowski

Movement from traditional to IP telephony services has been taking place for several years. A leader in traditional voice services, Virtual PBX has now broadened its offerings, so they work better with IP.

This Isn't The Update You Are Looking For

By Ed Hansberry

Even as Windows Phone 7 was launching late in 2010, everyone knew there was an update on the horizon that at a minimum would bring copy and paste to the platform. On Monday Microsoft started rolling out the first update for its mobile platform, but this won't have copy and paste, or anything else you will really use either.

Security Coming To Mobile And Embedded Devices

By George Hulme

Security firm McAfee expects 50 billion mobile and connected embedded devices by the year 2020. And guess who is promoting new tools promising to protect them. But is this a layer of protection we are going to need?

Hacks From China Strike Canadian Government

By George Hulme

CBC is reporting that attacks from IP addresses based in China have managed to successfully breach networks within the Finance and the Treasury Board of Canada, as well as Defence Research and Development Canada. The attack is the latest in a string of attacks aimed at high level government agencies.


5 Key Considerations When Investing in a New Solution

Join Josh Duncan and Floyd Strimling from Zenoss for a lively discussion on the future of monitoring the datacenter -- from the physical, to the virtual, to the Cloud.

It happens Wednesday, March 2, 2011 -- Time: 11:00 AM PT / 2:00 PM ET

More Information & Registration

Automatically fix broken links when you move or rename files!

Patented LinkFixerPlus is the first application that automatically fixes broken links in Excel, Word, PowerPoint, Access, Acrobat, AutoCAD, MicroStation, PageMaker, InDesign, HTML and other files when performing data migrations due to: server consolidation, server name changes, path name changes or folder reorganizations.

Click for your free trial now!


Attend Cloud Connect

Learn how to take the next step in cloud computing at Cloud Connect, the leading conference and expo for IT professionals, executives, and developers.

It happens in Santa Clara, Calif., March 7-10.

2011 InformationWeek Government IT Innovators

For the past 22 years, InformationWeek has honored the country's most technologically innovative companies with its prestigious InformationWeek 500 ranking. Now in its third year, InformationWeek's 2011 Government IT Innovators program will feature the most innovative government IT organizations in the 2011 InformationWeek 500 issue and on

Nominations Accepted Until April 29, 2011 -- Register Today!

This e-mail was sent to %%email%%

InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
[email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.


Keep up with the latest news, insights and trends as InformationWeek reports them: