Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

9 Standout IT Resume Tips | Google's Page: 'Android Is On Fire'

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Friday, April 06, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
Between The Lines Columnist Google's Page: 'Android Is On Fire'
By Eric Zeman
Google CEO Larry Page shared the latest data about Android's adoption around the world, and the stats are staggering.

Google Rethinks Price, Specs On Android Tablet
Google CEO Larry Page Touts First-Year Accomplishments

9 Tips: Make Your IT Resume Stand Out
There's a fine line between grabbing a hiring manager's attention and making a complete fool of yourself. Consider these innovative ways to move your resume to the top of the pile.

BYOD: How To Calculate Hidden Security Costs
Find the hidden costs of a bring your own device policy in order to make appropriate financial and risk decisions.

Inside IT Security's New Reality: Damage Containment
More security experts and vendors are espousing the view that bad guys will eventually sneak into your corporate network, even your big data. Can your IT team contain the damage once the hackers arrive?

If Bono Loves Dropbox, Shouldn't You?
'Bring your own cloud' is coming to an enterprise near you. It's time for CIOs to study their options.

2 Healthcare Data Breaches Show Importance Of Encryption
Patient data from Howard University Hospital and California Department of Child Support Services wasn't fully encrypted, and one security expert wants to know why.

Army Cloud Plans Include Containerized Data Centers
Army's $249.8 million cloud computing contract includes mobile cloud services and HP containerized data centers.

Ideas are like rabbits. You get a couple and learn how to handle them, and pretty soon you have a dozen. -- John Steinbeck


2 Healthcare Data Breaches Show Importance Of Encryption
Army Cloud Plans Include Containerized Data Centers
Research: 2012 IT Salary Survey, BI/Analytics
SANs: The Key to Maximizing Microsoft Exchange 2010
8 Tablets Fit For Windows 8 Beta
Retain Customers, Increase Revenues, Reduce Costs
InformationWeek 500 2012: Call For Nominations!

Download our iPad App

Posted By kupjones:
"We've taken our eye off the real ball: the fact that we are posting our lives onto a medium that is inherently not private, for millions to see. If this doesnt scare you, nothing will."
In reply to: "Girls Around Me App: Not Today's Creepiest Stalker"
View Entire Response | Post Your Own Reply

Posted By rsamuel:
"lets avoid the generalized equation 'CheapLabor = IndianWorker = H1Bvisa'. Thats just not true."
In reply to: "Microsoft Presses: More Green Cards For India IT"
View Entire Response | Post Your Own Reply

  Digital Issue  
When picking endpoint protection software, step one is to ask users what they think. Also in our new, all-digital issue of InformationWeek: CIO Chad Fulgham gives us an exclusive look at the agency's new case management system, Sentinel; and a look at how LTE changes mobility.

DOWNLOAD NOW FREE (Registration Required)


Research: 2012 IT Salary Survey, BI/Analytics
Our 2012 InformationWeek Salary Survey shows there's a war on for analytics experts and information management professionals who can ask the right questions and make use of vast and growing big data stores. So say the 660 BI and analytics pros responding to our poll.
Download Now (Registration Required)

Featured Report
Fundamentals: Secure Native Mobile Development
This report covers development basics for Apple iOS, Google Android, RIM BlackBerry and Microsoft Windows; pros and cons of cross-platform development; and how to build secure apps from the get-go.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
SANs: The Key to Maximizing Microsoft Exchange 2010
Microsoft Exchange is the world's most popular email system. Exchange 2010, the latest version, will represent 57 percent of all Exchange installations by 2014, according to the Radicati Group. Download this white paper to learn how to achieve the highest ROI, the most flexibility in planning and deployment, the greatest scalability, and improved business agility from Exchange 2010 implementations.
Download Now (Registration Required)

How to Easily Virtualize Microsoft Applications
To succeed with the next phase of virtualization, administrators must ensure that their infrastructure is up to the task. Learn how to confidently virtualize mission-critical Microsoft applications such as Microsoft Exchange, Microsoft SQL Server, and Microsoft Office SharePoint Server software to achieve outstanding performance, simplified management, and granular data protection.
Download Now (Registration Required)

8 Tablets Fit For Windows 8 Beta
Can't wait until the new Windows 8 tablets are released in the fall? These currently available tablets can handle the beta version of the OS now.

New iPad Teardown: Inside Apple's Tablet
The new iPad isn't just beautiful on the outside. Check out the inside view of how Apple made this tablet's power and design click.

Google Demos Its Augmented Reality Glasses
Google+ page reveals how the company's augmented reality glasses might look and operate.

10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.

10 iPad Problems, Solved
Don't let iPad annoyances drive you crazy or steal your time. We've chased down solutions to vexing iPad problems.


8 Tablets Fit For Windows 8 Beta
Can't wait until the new Windows 8 tablets are released in the fall? These currently available tablets can handle the beta version of the OS now.   View Now

Break Into Health IT: 9 Master's Degree Programs
10 Essential Android Apps For SMBs


spacer spacer spacer

Retain Customers, Increase Revenues, Reduce Costs
Join us for an exclusive live video webcast to learn how leading IT executives are implementing comprehensive data management solutions that produce measurable returns on their data investments. It happens Wednesday, April 11, 2012. More Information & Registration

Click here


InformationWeek 500 2012: Call For Nominations!
We've started accepting nominations for this year's InformationWeek 500 -- our 24th annual ranking of the nation's very best business technology innovators. Orgs with $250 million or more in revenue may apply now!
Deadline is April 27 -- Don't Miss It!

Take Our Public Cloud Survey
InformationWeek is conducting a survey on the state of private cloud use in the enterprise. Upon completion of our survey, you will be eligible to enter a drawing to receive an 32-GB Apple iPod Touch. Additionally, you will receive a discount code good for 25% off Flex and Conference passes to Interop Las Vegas 2012, to be held at the Mandalay Bay, May 6-10.
Extended To March 30

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.