Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Galaxy Nexus Vs. RAZR | Facebook Calls 'Hack' A Dud

InformationWeek Daily
InformationWeek Daily  
  Friday, October 21, 2011
Between The Lines ColumnistFacebook: Latest 'Hack' Was Old, Invalid User IDs
By Mathew J. Schwartz
Hacking group "Team Swastika" released apparent Facebook usernames and passwords, but the social network says the data isn't tied to live accounts.

Facebook Is Web's Future, Say Parker and Benioff
8 Techniques To Block SQL Attacks

Galaxy Nexus Vs. RAZR: Android Smackdown
Motorola and Samsung both debuted brand new LTE 4G Android superphones on Tuesday. Which is the better device?

The Three Most Frequently Attacked Mobile Devices
Android devices, tablets, and jailbroken devices top list of riskiest mobile products in the enterprise setting.

SAP And Oracle: Get Real About In-Memory Analysis
These tech giants are making plenty of promises about their Hana and Exalytics appliances. But do you really need all that power?

T-Mobile: Our Smartphones Are Better Than iPhones
T-Mobile, looking to remain relevant as the only major U.S. carrier without the Apple iPhone, boasts that its phones are faster and more powerful.

Storage Administrators Of 2015: Must-Have Skills
What's your three-year career plan? Make sure you have the knowledge that will be required to handle storage systems of the future.

NSA Chief Plays Offense on Cloud, Cybersecurity
Cloud has become a key part of the NSA's IT strategy, said Gen. Keith Alexander. Coming soon: A DOD offensive strategy for responses to cyberattacks and threats.

DHS Appoints Weatherford Cybersecurity Chief
Former energy exec has extensive security experience working for the states of California and Colorado.

A sure way to lose happiness, I found, is to want it at the expense of everything else. -- Bette Davis


NSA Chief Plays Offense on Cloud, Cybersecurity
DHS Appoints Weatherford Cybersecurity Chief
Managed Services Deliver Cost Savings And Control
Motivations for software security
Android 4.0 Ice Cream Sandwich: Brilliant Thievery?
Broken State of Backup
Virtual Event: Gathering And Analyzing Security Intelligence In The Enterprise

Posted By ANON1235515107178:
"Calling it a "phone" is a stretch. You have to be able to reliably send and receive calls to call it a phone."
In reply to: iPhone Nano Cast As Possible Answer To Android
View Entire Response | Post Your Own Reply

Posted By JerryJohnson:
"What? Mobile didn't make the top ten? Surely it is foundational to collaboration, but possibly implied by consumerization and a post-PC era."
In reply to: Top 10 CIO Priorities
View Entire Response | Post Your Own Reply

  Digital Issue  
Sensitive data is scattered in forgotten corners of your IT infrastructure. Find and protect it before it winds up in the wrong hands.

Also: • The Practical Side Of Data Defense
• Dueling SIEM Deals
• Poor Marks For Training Programs

And much more, exclusively in our October 10 Digital Issue

DOWNLOAD NOW (Registration Required)

Managed Services Deliver Cost Savings And Control
Companies that have implemented or are evaluating managed print services look to the model for its ability to reduce costs and increase end user productivity. However, IT teams need to be aware of security and scalability when selecting a partner.
Download Now (Registration Required)
Featured Report

Key Steps To Safeguarding Your VM Disk Files
We provide best practices for backing up VM disk files and building a resilient infrastructure that can tolerate hardware and software failures. After all, what's the point of constructing a virtualized infrastructure without a plan to keep systems up and running in case of a glitch--or outright disaster?
Download Now (Registration Required)
Featured Report


spacer spacer spacer
Motivations for software security
Review a comprehensive portfolio of application vulnerability management solutions that span all stages of the software delivery life cycle to address a wide range of security and compliance issues, reduce business risks and improve return on investment.
Download Now (Registration Required)

Enterprise 2.0: What, Why and How?
Download this white paper to review an introduction to Enterprise 2.0, learn why it is one of the most crucial concepts to understand in business today and how you can begin to take advantage of E2 in your organization.
Download Now (Registration Required)


Android 4.0 Ice Cream Sandwich: Brilliant Thievery?
Google rolled out Android 4.0 Ice Cream Sandwich on Wednesday. What's in, what's out, and what features did Google steal from the competition?

7 Hottest Features In Windows Phone 7 Mango
Microsoft this week shipped its Windows Phone "Mango" update to phone makers--adding key features to the smartphone OS that Microsoft is pitting against Apple iPhone and Google Android. Check out this visual tour of seven significant new functions.

How to Ease Your Transition to the Cloud
Is your head in the "cloud" or at least thinking of going there?

Simplifying the Cloud On-Boarding Process...Securely
As we talk to customers, they are looking for ways to simplify the Cloud On-boarding process as they migrate application workloads between cloud environments.

Keeping Your Workloads Portable across Clouds
A hybrid cloud offers the promise of uniting resources across multiple cloud providers, including those running different virtualization technology stacks.



What's New in iOS 5 iOS 5 might be the most popular version of Apple's mobile OS yet. When Apple released it as a digital download through iTunes on Oct. 12 the heavy demand almost crashed Apple's servers. Available for the iPhone 3GS, iPhone 4, iPhone 4S, and all iPads, this update includes more than 200 enhancements for a reasonable price--it's free. This visual tour focuses on 11 major enhancements and four new apps introduced with iOS 5.   View Now

Firefox 8 Beta: Visual Tour
12 Top Big Data Analytics Players


spacer spacer spacer
Solar-Powered Mobile Device Charging Goes Social
German startup Changers launches solar-powered charger for mobile phones and a community and marketplace for turning energy produced into tangible credit.   Watch

Q&A: Reid Hoffman, Partner at Greylock, Co-Founder & Executive Chairman of LinkedIn
High Order Bit: PepsiCo Inc. -- Frank Cooper and Shiv Singh



Broken State of Backup
Data protection industry analysts agree that "backup is broken." In this webcast we'll identify key areas where current backup models are failing and how to resolve those issues. It happens Thursday, October 20, 2011 -- Time: 10:00 am PT / 1:00 pm ET More Information & Registration

Click here


Virtual Event: Gathering And Analyzing Security Intelligence In The Enterprise
In this all-day virtual event from InformationWeek and Dark Reading, experts will offer detailed insight in how to collect security intelligence in the enterprise, and how to analyze and study it in order to efficiently identify new threats as well as low-and-slow attacks such as advanced persistent threats.
Register today. It happens Oct. 20

Cloud Connect Is Coming!
Learn about the latest cloud technologies and platforms from industry leaders and thinkers at Cloud Connect. It takes place in Santa Clara, Calif., Feb. 13-16.
Get More Details And Register Today!

This e-mail was sent to %%email%%
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.