Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

BlackBerry Z10: 5 Best Features | PC Shipments: A Tale Of Two Spins

InformationWeek Daily
InformationWeek Daily  
  Friday, February 08, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
Between The Lines Columnist PC Shipment Numbers: A Tale Of Two Spins
By Thomas Claburn
Are PC shipments up or down? That depends on whether your definition of "personal computer" includes tablets.

7 Moves Dell Must Make Now
PC Makers, Learn From Car Makers: Use Model Years

BlackBerry Z10: 5 Best Features
After spending more than a week with the BlackBerry Z10 and the BlackBerry 10 OS, I have some opinions on what BlackBerry got right.

SavvisDirect Launches Private Cloud For Enterprise Developers
SavvisDirect AppGrid lets companies test and develop in a private cloud, avoiding the security and control issues that come with working in a public cloud.

Feds Update Cybersecurity Compliance Handbook
The federal government will soon finalize the most comprehensive overhaul to its internal cybersecurity guidelines since its initial release.

Coursera Courses Approved For College Credit
Certification group says five Coursera classes measure up, but universities must decide whether to award formal credit.

5 Social Best Practices From Cisco
Cisco social chief shares advice on listening, engagement and more.

CIO Profiles: Ken Harris Of Shaklee
Hands-on attention from higher-ups key to IT project success, says CIO for natural nutrition company Shaklee.

"Advice is like snow -- the softer it falls, the longer it dwells upon, and the deeper in sinks into the mind." -- Samuel Taylor Coleridge


5 Social Best Practices From Cisco
CIO Profiles: Ken Harris Of Shaklee
IT Pro Ranking: Unified Threat Management
Understand Your Mobile Vulnerability Risks
10 Best Android Apps Of 2012
Mobile Security -- A Holistic Approach
Virtual Event: Hackers Unmasked

Download our iPad App

Posted By moarsauce123:
"What a dumb comparison! Windows Phone 8 came out last year while Blackberry announced new product to come early this year. Of course the numbers for Blackberry will be low."
In reply to: Windows Phone Tops BlackBerry In U.S.
View Entire Response | Post Your Own Reply

  Digital Issue  
Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?

Also in the new, all-digital issue of Dark Reading: The shift in hacking requires a new defense mindset.

DOWNLOAD NOW FREE (Registration Required)


IT Pro Ranking: Unified Threat Management
Unified threat management appliances combine multiple security functions into a single device to provide a streamlined security infrastructure with a compelling operational cost model. IT pros who use or have used or evaluated UTM appliances assess five vendors -- Check Point Software, Cisco Systems, Dell SonicWall, HP and Juniper Networks -- on critical features such as malware detection, intrusion prevention and throughput.
Download Now (Registration Required)

Featured Report
Strategy: One-Click Disaster Recovery
Automation and orchestration are all the rage among IT architects these days. One of the best places to apply the technology is to disaster recovery. Most organizations still want a "go" button, but after that, timely recovery requires automation. Here's what you need to know to make it happen.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
Understand Your Mobile Vulnerability Risks
Do you know how to protect your company data against mobile vulnerabilities? Watch Rapid7's where Dirk Sigurdson, Director of Engineering for Mobilisafe at Rapid7 discusses the importance of understanding mobile vulnerabilities and risks and best practices for mitigation.
Download Now (Registration Required)

Decision-Driven Data Management: 3 Key Areas of Focus
There is a crucial need for operational data quality upon which to base their analytical and decision support systems. This white paper examines three areas of focus when considering the implementation of an operational data quality process.
Download Now (Registration Required)

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

7 Moves Dell Must Make Now
Dell's decision to go private was a bold step, but the company must continue making aggressive decisions to succeed.

FDA Approves RFID Tags For Humans
VeriChip says its RFID chip could save lives and prevent medical mistakes.

BlackBerry Touts 'Record' Z10 Sales
BlackBerry says sales of its Z10 smartphone are off to a strong start in Canada and the U.K., but doesn't offer hard data.

Samsung Galaxy S IV: What To Expect
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.


Samsung Galaxy S IV: What To Expect
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.   View Now

BlackBerry 10: Visual Tour Of Smartphones, OS
7 Portals Powering Patient Engagement


spacer spacer spacer
CES 2013: It's A Wrap!
While some claim CES has lost its luster and big name headliners over the years, the show refuses to be deemed irrelevant. With trends spanning healthcare, mobile and automotive, there was plenty to see.   Watch

CES; the car show
Intel shows off eye tracking and gesture tech



Mobile Security -- A Holistic Approach
Managing and securing the mobile enterprise requires taking a holistic approach to defending the end-to-end scope of each mobile engagement. Security and management are highly intertwined and prerequisites to one another. Get more details during our webcast on Wednesday, February 6, 2013. More Information & Registration

Click here


Virtual Event: Hackers Unmasked
In this all-day InformationWeek and Dark Reading Virtual Event, experts and vendors will offer a detailed look at how enterprises can detect the latest malware, analyze the most current cyber attacks, and even identify and take action against the attackers. Attendees will also get a look at how cybercriminals operate, how they are motivated -- and what your business can do to stop them.
It happens Feb. 7 -- Don't Miss It!

Don't Miss Interop Las Vegas
Attend Interop Las Vegas May 6-10, and attend the most thorough training on Apple deployment at the NEW Mac & iOS IT Conference. Use Priority Code DIPR02 by Jan. 26 to save up to $500 off the price of Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies, and the latest technology.
Get More Details and Register Today

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.