Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Google Preps Dropbox Rival? | Microsoft To Fix 21 Bugs

InformationWeek Daily
InformationWeek Daily  
  Friday, February 10, 2012
Between The Lines Columnist Microsoft To Patch 21 Bugs Tuesday
By Mathew J. Schwartz
Microsoft previews fixes in apps including Internet Explorer and Windows. Meanwhile, Google patched 20 bugs in its Chrome browser.

Microsoft Trustworthy Computing Turns 10: What's Next
Eliminating Vulnerabilities In Enterprise Software

Google Preps Dropbox Cloud Storage Rival
Google will soon release an update to its long-rumored "GDrive" and a home entertainment system, reports the Wall Street Journal.

Apple Manufacturer Foxconn Hit By Hacktivists
Hacktivist group Swagg Security releases log-in credentials for the electronics manufacturing giant and its customers, numerous servers taken offline.

Windows 8 ARM Tablets: 8 Must-Know Facts
Microsoft is building a version of Windows specifically for tablets and ultralight notebooks that will run ARM SoC chips, and it's unlike any Windows version you've seen before.

Big Data Brings Customer Challenges, Opportunities To Banks
As banks amass exabytes of data on their customers, they are responsible for mining and responsibly using it.

Google Wallet PIN Cracked
Fix for mobile payment vulnerability could require banks to take over some security responsibility.

India's Outsourcing Economy Booms
Despite calls from Washington to keep jobs onshore, U.S. companies seem to be sending more tech work to the subcontinent, as offshoring sales spike 19%

The Public Sector CRM Opportunity
Disconnected governments and disempowered citizens are why we need a full-blown, nationwide public sector CRM program.

Webcam Bug Enables Virtual Home Invasions
Trendnet releases firmware updates to prevent home security cameras from being accessed without a password.

Seize the moments of happiness, love and be loved! That is the only reality in the world, all else is folly. -- Leo Tolstoy


The Public Sector CRM Opportunity
Webcam Bug Enables Virtual Home Invasions
Research: 2012 State of Cloud Computing
Data Protection Strategies in the Age of the iPad, Malicious Insiders, and PCI
Who Is Anonymous: 10 Key Facts
Don't Get Hooked by the Latest Phishing Attacks
Time Is Running Out: Register Today For Cloud Connect

Posted By AustinIT:
"It's ridiculous to have a BYOD policy when you don't have the security infrastructure and training in place to support it. Tail wagging Dog IMO"
In reply to: "Feds To Employees: Use Your Own Devices At Work"
View Entire Response | Post Your Own Reply

Posted By DarkSideGeek:
"Facebook has really changed my life. I get free stuff for Farmville and I can see what beers my buddies are drinking and thousands of family pictures. Not exactly rewiring society is it?"
In reply to: "3 Things To Remember Before Investing In Facebook"
View Entire Response | Post Your Own Reply

  Digital Issue  
IT's jumping into cloud services with too much custom code and too little planning, our annual State of Cloud Computing Survey finds. Our newest digital issue shows you what to be aware of when using the cloud.

Also in this issue: Cloud success stories from Six Flags and Yelp, and how to write a SAN RFI.

DOWNLOAD NOW (Registration Required)


Research: 2012 State of Cloud Computing
In this report, we lay out the critical steps every organization needs to take to make sure its cloud leap goes on more than just faith.
Download Now (Registration Required)

Featured Report
IT Pro Ranking: Endpoint Antivirus/Anti-Malware
46% of respondents to our survey are considering replacing or adding a vendor. Lucky for them, choices abound in this market.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
Data Protection Strategies in the Age of the iPad, Malicious Insiders, and PCI
This white paper addresses the issues and challenges of protecting information as it moves across networks, to mobile devices, and in the cloud, and deny illegitimate access without compromising the productivity of legitimate users. Find out about recommendations and solutions for effective protection.
Download Now (Registration Required)

The CIO's Guide To Design Global IT Infrastructure
Is it possible to eliminate the impact of distance? This paper explores the 5 key principles successful CIOs are using to redesign IT infrastructure of any size. Learn how to be prepared to adapt your environment in a way that supports distributed employees, anytime anywhere collaboration and the need for business continuity during a disaster.
Download Now (Registration Required)

Who Is Anonymous: 10 Key Facts
Anonymous 'hacktivists' aim to expose what they call government and establishment hypocrisy. Take a closer look at the group, its offshoots, and its infamous attacks.

Windows 8 Consumer Preview Date Confirmed
Microsoft is set to release a trial version of its touch-centric operating system to everyday computer users.

Windows 8 Upgrade Plans: Exclusive Research
A majority of enterprises have upgrade plans for Windows 8, though it won't be available until next year. See what else IT pros have to say about Microsoft's "reimagined" operating system.

10 Android App Flops
Among Android apps, you'll find some jewels--and many stinkers. Here's our top 10 list of Android apps to skip, including a few names you might not expect.

6 Predictions For Business Intelligence In 2012
A look at in-memory analysis, visual discovery, big data, mobile BI, cloud and social BI achievements in 2011 and forecasts for the year ahead.


Use Facebook Apps To Woo Customers: 6 Examples
Several savvy organizations use Facebook apps to increase brand awareness and engage new and existing customers. Consider these interesting examples.   View Now

Health IT's Newest Ideas: HIMSS12 Preview
How IT Views RIM's Future: Exclusive Research


spacer spacer spacer

Don't Get Hooked by the Latest Phishing Attacks
Attend this live webinar to learn about the latest trends in phishing attacks and how you can keep your organization safe. It happens Wednesday, February 22, 2012. More Information & Registration

Click here


Time Is Running Out: Register Today For Cloud Connect
We're a week out from the defining conference and expo for IT professionals, developers and cloud providers. If you haven't registered yet, there's still time. Sign up by 2/10 and save 15% on On-Site Conference and Platinum Pass Prices.
Just use Priority Code SAVE15

Take Our Alternative Application Delivery Survey
InformationWeek is conducting a survey exploring alternative application architecture strategies. Upon completion of our survey, you will be eligible to enter a drawing to receive an Apple 32-GB iPod Touch.
Survey ends Feb. 10

This e-mail was sent to EmailAddress
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.