Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Corporate Espionage's New Friend | Amazon Tablet: 5 Things We Know

InformationWeek Daily
InformationWeek Daily  
  Monday, September 26, 2011
Between The Lines Columnist5 Things We Know About Amazon's Kindle Tablet
By Eric Zeman
Amazon is holding a press conference in New York on September 28, and will likely introduce the Amazon Kindle tablet. Here's what we know.

Take Charge Of Your Mobile App Strategy
10 Mobile Security Vendors To Watch

Corporate Espionage's New Friend: Embedded Web Servers
Many types of Web-connected photocopiers, scanners, and VoIP servers have no default passwords or other security enabled to stop remote eavesdropping.

Liferay Portal Adds Social Features, Marketplace
Open source Java portal LifeRay 6.1 improves social capabilities, welcomes app developers.

IBM Tops Oracle, HP In Data Center Win
Indian engineering giant Escorts Group opts for Power systems over PA-RISC, Exadata, as part of a technology refresh.

Facebook Looks Beyond Like, But Not Far Enough
Facebook says it's defining a new language for how people connect. In this limited language, you are what you eat, watch, read, and buy.

How Yammer Helps ReachLocal Reach Farther
Web marketing company adopted Yammer's enterprise social networking to hold the organization together during period of rapid growth.

How To Fix The Personal Health Record Mess
So few Americans are interested in creating a digitalized PHR that Google had to close its service. But there are ways to get the public interested.

ECM Reaches For The Clouds
IT doesn't have to give up content management features when users adopt online storage and document sharing.

No person will make a great business who wants to do it all himself or get all the credit. -- Andrew Carnegie


How To Fix The Personal Health Record Mess
ECM Reaches For The Clouds
Automation And Orchestration: Prepare For Successful Deployment
How to: Simplify Offsite Data Management
5 Things We Know About Amazon's Kindle Tablet
7 Types of Power Problems
Time Is Running Out To Attend Interop New York

Posted By adgorn:
"PHRs fail because ...the vast majority of people are basically healthy and don't need anything more than one piece of paper to document all their health info."
In reply to: How To Fix The Personal Health Record Mess
View Entire Response | Post Your Own Reply

Posted By alur:
"Manufacturing an inferior product doesn't even rise to the point of being a copy. It's less than a cheap imitation. Good luck, Amazon. Who makes these stupid decisions?"
In reply to: 5 Things We Know About Amazon's Kindle Tablet
View Entire Response | Post Your Own Reply

  Digital Issue  
Most companies have little control over their heaps of unstructured data, our research reveals. It's time for an enterprise content management strategy.

ALSO: Kurt Marko looks at the latest tools for integrating content management with online storage and file-sharing sites.

DOWNLOAD NOW (Registration Required)

Automation And Orchestration: Prepare For Successful Deployment
In this report, we outline the potential snags and share strategies and best practices to ensure successful implementation.
Download Now (Registration Required)
Featured Report

Charge IT: Why We Need Usage-Based Accounting
In this report, we chart the new service-oriented IT landscape and provide a guide to the key components: service catalogs, cost and pricing models, and financial systems integration.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
How to: Simplify Offsite Data Management
In the beginning, IT ran on the mainframe and workloads were predictable. But the Internet and the need for 24x7 availability changed the workload model. But the data center still has the same goal: manage the workloads to provide the highest level of service at the lowest cost. Download this white paper to discover a single workload automation scheme and framework that meets the needs of your applications, your multi-tiered infrastructure, and your business- to cost-effectively automate your data center.
Download Now (Registration Required)

Layered Intelligent DDoS Mitigation Systems
As the size, frequency and complexity of DDoS attacks increase, security and availability are quickly becoming top business concerns. Yet, traditional security products are inadequate when it comes to stopping today's volumetric and application-layer DDoS attacks. The solution? A layered Intelligent DDoS Mitigation System (IDMS). Download this white paper to review solutions that provide a comprehensive, layered IDMS solution that extends from the data center edge to the ISP cloud.
Download Now (Registration Required)


5 Things We Know About Amazon's Kindle Tablet
Amazon is holding a press conference in New York on September 28, and will likely introduce the Amazon Kindle tablet. Here's what we know.

10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.

12 Brawny Business Intelligence Products For SMBs
Business intelligence isn't just for the big boys anymore. Check out our short list of star SMB options, from easy-to-deploy SaaS choices to affordable versions of the biggest BI suites.

20 Innovative IT Ideas To Steal
InformationWeek 500 innovators have creative solutions to not-so-unusual business problems. How can these help your company?

Gmail Add-On Boosts Support Features
The Shared Inbox add-on for Google Apps Business accounts is designed to provide improved help desk and customer support ticket features for businesses using Gmail as their main communications platform.



10 Mobile Security Vendors To Watch Who are the key players in the fast-changing mobile security world? These 10 mobile operating system and mobile device management vendors should be on your radar screen.   View Now

Google+ : Open to the Public, Adds New Features
HP TouchPad: Teardown


spacer spacer spacer
WhisperCore Mitigates Risks Of Android In Businesses
TechWebTV catches up with Whisper Systems' CTO and co-founder Moxie Marllinspike to discuss and demo WhisperCore -- a mobile security solution that brings BlackBerry-like centralized enterprise-grade security to Android devices.   Watch

MANDIANT CSO Talks Threats To His Company and His Clients
Intel Labs Invests in the Future of Cloud and Embedded Computing



7 Types of Power Problems
IT Security Professionals or Mobile Administrators should attend this LIVE webcast to learn how to identify users connecting personal devices to the network, protect enterprise data through Apple security policies and enforce application whitelists/ blacklists on any iOS device It Happens Wednesday, October 5, 2011 -- Time: 10:00 am PT / 1:00 pm ET More Information & Registration


Time Is Running Out To Attend Interop New York
October is almost here, and with it the latest IT solutions at Interop New York. Save 25% on Flex and Conference Passes or get a Free Expo Pass with code CPFHNY25. It happens in New York City, Oct. 3-7, 2011.
Register Today

This e-mail was sent to %%email%%
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.