Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Apple's CEO Hunt: Jobs Speaks | 10 Tablets Face Off

InformationWeek Daily
InformationWeek Daily  
  Wednesday, July 20, 2011
Between The Lines Columnist Lenovo Takes On 7 Rivals: Tablet Faceoff
By Fritz Nelson
Lenovo's 3 new tablets square off against Apple iPad 2, Samsung Galaxy Tab, HP TouchPad, and other top contenders.

Amazon Tablet Expected By October
iPad Love Grows With Use

Apple Not Engaged In CEO Search, Jobs Says
Cupertino's current chief executive dismisses a report that its board is mulling a succession plan as "hogwash."

Bill Seeks 'Parity' In Meaningful Use Incentives
Current HITECH policy disadvantages many multi-campus hospitals, says American Hospital Association, legislation's sponsors.

Microsoft Azure Does Big Data As A Service
"Project Daytona" tools let researchers use Windows Azure cloud platform to crunch data, and some tech from archrival Google plays a part.

Ctera Links Cloud Storage With Data Protection
Appliance gives SMBs a cost-effective way to store data locally for speed, then replicate it in the cloud for disaster recovery.

Many Android Apps Leaking Private Information
In study of 10,000 Android apps, Dasient finds more than 800 may be compromising data.

When Social Features Meet Personal Health Records
Employer consortium Dossia takes cues from social networking and games as it vies to boost usage of its personal health record site.

Cloud Computing: Solving The Backup Problem
New York's famed Museum of Modern Art and its 750 employees recently transitioned to Google Apps and deployed Backupify's cloud backup and archiving platform to ensure data integrity.

A man who wants to lead the orchestra must turn his back on the crowd. -- Max Lucado


When Social Features Meet Personal Health Records
Cloud Computing: Solving The Backup Problem
Charge IT: Why We Need Usage-Based Accounting
Data Deduplication for Dummies
Bridgestor Launches Symantec Backup Exec Appliance
The Security Threat Report: The Threats to Watch
InformationWeek 500 Conference: The Need For Speed

Posted By WMCollins:
Google Apps Profiles is a MAJOR minus for me. If I was a paying customer, I would trying to cancel my contract or ask for a rebate.
In reply to: Google+ Has 5 Minuses
View Entire Response | Post Your Own Reply

Posted By XReader:
"All this password talk is also quite dubious. Dictionary hack can be countered by limiting continuous failed logins. Also, when is 'ilovecats' a word? "
In reply to: Hotmail Bans Guessable Passwords, Like 'Password'
View Entire Response | Post Your Own Reply

  Digital Issue  

The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this in check.

PLUS: Focusing solely on your own company's security ignores the bigger picture.

And much more, exclusively in Dark Reading's July 18th Digital Issue.

DOWNLOAD NOW (Registration Required)

Charge IT: Why We Need Usage-Based Accounting
A service catalog is pivotal in moving IT from an unresponsive mass of corporate overhead to an agile business partner. In this report, we chart the new service-oriented IT landscape and provide a guide to the key components: service catalogs, cost and pricing models, and financial systems integration.
Download Now (Registration Required)
Featured Report

Cloud Security: Understand The Risks Before You Make The Move
In this Tech Center report, we explain the risks and guide you in setting appropriate cloud security policies, processes and controls. Plus: How to catch up when security is an afterthought to a cloud migration.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
Data Deduplication for Dummies
Review methods for reducing the amount of duplicate data maintained by your organization and discover how data deduplication positively impacts your organization's data management.
Download Now (Registration Required)

Requirements Process: Top Business Benefits
Matching user requirements to software development has always been a challenge. When a mismatch occurs, the software often goes unused and the users tend to mistrust the software and the IT department. Discover how to streamline the requirements analysis and management process to ensure you meet user expectations and deliver business goals.
Download Now (Registration Required)


Bridgestor Launches Symantec Backup Exec Appliance
The backup and storage device is aimed primarily at midsize businesses and combines Symantec's data deduplication and Bridgestor's hardware-based thin provisioning and data compression capabilities.

LulzSec Hacks Murdoch's Sun, Cisco Sheds 6,500 Jobs
LulzSec's retirees came out of self-imposed exile and played a mean game of bingo against Rupert Murdoch Monday.

Cisco Layoffs: 6,500 Jobs Cuts, $1B Expenses Trimmed
Cisco Systems plans to eliminate 9% of its global workforce and will eliminate another 5,000 positions through the sale of a set-top box manufacturing facility.

Users Outraged Over New VMware Pricing Policy
Licensing costs will skyrocket to indefensible levels under new method of charging for memory usage.

6 Tips From Google: Search Smarter
Consider these how-to tips from one of Google's own search experts, plus insight into why searches sometimes go wrong.



12 Brawny Business Intelligence Products For SMBs Business intelligence isn't just for the big boys anymore. Check out our short list of star SMB options, from easy-to-deploy SaaS choices to affordable versions of the biggest BI suites.   View Now

50 Most Influential Government CIOs
10 Hot iPad Apps For Summer


spacer spacer spacer
10 Hot iPad Apps For Summer Summertime--and the tablet apps are everywhere. With the recent launch of the Apple iPad 2, application developers just keep on finding new ways to exploit the tablet's portability and beautiful display. Check out these free and low-cost tools for planning summer fun, or just kicking back during your vacation time.   View Now

HP TouchPad Tablet: Visual Tour
14 Cool Mobile Apps From Uncle Sam



The Security Threat Report: The Threats to Watch
With over 95,000 pieces of malware analyzed by SophosLabs every day, it's clear the threat isn't going away. Join Chester Wisniewski, senior security advisor at Sophos, for a live Webcast to learn about what makes the latest security threats tick. It happens Thursday, July 28th, 2011 -- Time: 11:00 am PT / 2:00 pm ET More Information & Registration

Click here


InformationWeek 500 Conference: The Need For Speed
Join C-level executives from leading global companies as they gather to discuss how their organizations are turbo-charging business execution and growth -- how their accelerated enterprises manage cash more effectively, invest more wisely, delight customers more consistently, manage risk more profitably. It happens Sept. 11-13 in St. Regis Monarch Beach
Register Today

Take Our Printing Options Survey
InformationWeek Analytics is conducting a survey to assess the evolution in enterprise printing. Respond to the survey and be eligible to win an iPod Touch.
Survey ends July 22

This e-mail was sent to %%email%%
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.