Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Google's Challenges Mount In China


InformationWeek Daily: Issue Highlights
  
Manage Subscription  |  Contact Us

TOP STORY: Google's Challenges Mount In China

MORE NEWS: Tech Vendors Face New Accounting Rules

ANALYTIC REPORT: Research: 2010 State of Server Technology

WHITEPAPER: RFID Guide

IMAGE GALLERY: Image Gallery: 10 FIFA World Cup Mobile Apps

VIDEO: Mobile App Store--PyramidPreview

BLOG: Cloud Is Real Culprit In iPad/AT&T Security Hole

WEBCAST: Designing Tomorrow's Data Center Today

RESOURCES: Take Our Application Consolidation Survey -- You Could Win an iPod Touch!

InformationWeek Daily
InformationWeek Daily  

Monday, June 14, 2010

 
QUOTE OF THE DAY...


Any change, even a change for the better, is always accompanied by drawbacks and discomforts. -- Arnold Bennett

INFORMATIONWEEK.COM
  |  
NEWS
  |  
ANALYTIC REPORTS & WHITEPAPERS
  |  
BLOGS
  |  
WEBCASTS
  |  
RESOURCES


TODAY'S TOP STORY

Google's Challenges Mount In China


A number of upcoming license deadlines loom and Beijing could decide to rebuke the Internet giant for the public censorship battle that began earlier this year.

RELATED INSIGHTS

Baidu Hopes Google Loss In China Is Its Gain

Microsoft Says China Piracy Killing Thousands Of U.S. Jobs

Global CIO: Cutting Google And Apple Down To Size

ALSO SEE

Tech Vendors Face New Accounting Rules

NetSuite responds with cloud-based revenue-recognition module for ERP systems.

Verizon Wireless Expanding Skype To Feature Phones

Verizon Wireless says that more handsets, including normal feature phones, will be able to use the Skype application.

World Cup IT Security Follows Swiss Rules

Mahindra Satyam, the soccer tournament's official IT services provider, is responsible for safeguarding 160,000 users, the distribution of 3 million tickets, and 40 terabytes of data.

Microsoft Security Vulnerability Disclosed

A Google security researcher revealed the flaw; Microsoft may release out-of-cycle fix.

Fujitsu, Toshiba Consider Merger

Combining the companies' cell phone operations would create Japan's second largest handset maker.

White House Orders Data Center Consolidations

The administration eliminating unnecessary federal data centers and other properties should produce at least $3 billion in cost savings by the end of fiscal year 2012.

Spy Shots Reveal Motorola Droid 2

Pictures and details of Motorola Droid 2 leak, show only modest refresh to current design.

Tagged.com Warned Over Children's Online Safety

N.Y. attorney general says the teen-oriented social networking site isn't doing enough to protect children against abuse.

 

DOWNLOAD INFORMATIONWEEK'S DIGITAL SUPPLEMENT ON SMB SECURITY


It doesn't pay to protect against security threats faced by only
the largest companies. Learn how to focus your efforts on the right
threats.

We'll also show you five low-cost tactics to help you
get better Web security -- only in our June 14th digital supplement.



DOWNLOAD NOW (Registration Required)
 



ANALYTIC REPORTS & WHITEPAPERS

FEATURED REPORTS

Research: 2010 State of Server Technology

The value proposition is shifting from the processor to peripheral considerations, such as the ability to effectively implement virtualization, system manageability, and power and cooling. Find out what the InformationWeek Analytics 2010 State of Server Technology Survey showed before making your next implementation decision.

Download Now (Registration Required)

Featured Report

Integrity Check: 5 Steps To Data-Centric Cybersecurity

It's becoming progressively more challenging to protect sensitive data and systems, and agencies that outsource major applications to the private sector are further abstracting system boundary and perimeter concepts. The answer is a shift in thinking away from yesterday's security approaches and toward data-centric protection via technologies like encryption, data loss prevention, and strong access controls.

Download Now (Registration Required)

Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS

RFID Guide


This whitepaper shows how RFID technologies enable asset tracking, streamline the supply chain, and help improve operational efficiency.
Download Now

Leveraging Virtualization for Business Continuity and Disaster Recovery


This InformationWeek Analytics report reveals best practices to leverage virtualization for business continuity and disaster recovery. Download the complimentary report today.
Download Now

MORE WHITEPAPERS AT

MULTIMEDIA
IMAGE GALLERIES


Image Gallery: 10 FIFA World Cup Mobile Apps

No matter how far or near you are to South Africa these mobile apps for Blackberry, Android, iPhone, iPad, and Symbian devices put world-class football action in your hands.   View Now

ALSO SEE

Image Gallery: Top 10 Google Videos

Image Gallery: SAP Unveils Integrated BI Strategy Roadmap

MORE GALLERIES

spacer spacer spacer
VIDEOS


Mobile App Store--PyramidPreview

This report provides in-depth, up-to-the-moment analysis of the mobile content marketplace, focusing on the app stores of major market players such as Apple, Google, Nokia, BlackBerry, and Microsoft, as well as operator app stores.   Watch

ALSO WATCH

06.11.10 Lessons Learned From The Flash Crash

Cloud Test Solution with Azure

MORE VIDEOS

spacer

TODAY AT THE BLOG


FEATURED BLOG
Featured BloggerCloud Is Real Culprit In iPad/AT&T Security Hole

By Jim Rapoza


The recent revelation that over 100,000 iPad users had their email and account information exposed to hackers due to a mistake by AT&T made a lot of news this week and caused no small amount of embarrassment for AT&T and Apple. Bu the big news isn't the security failure itself, it's the reminder that in the modern world of cloud computing, security goes well beyond personal devices.

ALSO SEE

On AT&T's iPad E-mail Security Snafu

By George Hulme


While the flaw that made it possible for onlookers to access the e-mail addresses of Apple iPad users wasn't directly Apple's fault, the incident is certainly disrupting the Jobs' Reality Distortion Field and dulling some shine of the successful iPad launch.

Internet Week New York Startup Demo Recap

By Allen Stern


This week brings the third-annual Internet Week to New York City. Four new web startups took to the stage in a fast-paced, lightning round of demos at the NY Tech Meetup.

Because A Single 1GHz Core Isn't Enough

By Ed Hansberry


One of the hot processors right now is the Qualcomm 1GHz Snapdragon processor. The HTC HD2 uses it, as well as the recently released HTC EVO 4G on the Sprint network. If that kind of power isn't enough for you though, there is hope. Qualcomm has just announced a line of dual core 1.2GHz Snapdragons.


WEBCASTS

Designing Tomorrow's Data Center Today


Join Intelligent Enterprise editor-in-chief Doug Henschen for a Webcast as he shares insight on the latest trends in BI as well as in-depth research on priorities within midsize companies.

Date: Tuesday, June 22. Time: 9:00 a.m. PT/12:00 p.m. ET

More Information & Registration



RESOURCES AND EVENTS


Take Our Application Consolidation Survey -- You Could Win an iPod Touch!


InformationWeek Analytics is conducting a survey to investigate the extent to which companies are consolidating applications. The results of this survey will appear in an upcoming issue of InformationWeek as well as an in-depth InformationWeek Analytics report. This survey will take under 10 minutes to complete.

Upon completion, you will be eligible to enter a drawing to receive one Apple 32-GB iPod touch valued at $299 from TechWeb.

Thanks For Your Participation

Virtual Event: Creating And Leveraging The Private Cloud


Join us for this virtual event, as InformationWeek editors gather the leading thinkers on the topic of private cloud computing to answer your questions and provide expert insight in creating and leveraging the private cloud.

It happens June 23

Get More Details And Attend

There's Still Time To Attend Black Hat USA 2010


InformationWeek Analytics is conducting a survey to investigate the extent to which organizations are consolidating applications. The results of this survey will appear in an upcoming issue of InformationWeek as well as an in-depth InformationWeek Analytics report.

This survey will take under 10 minutes to complete. Upon completion, you will be eligible to enter a drawing to receive one Apple 32GB iPod touch valued at $299 from TechWeb.

Get More Details And Register



This e-mail was sent to %%email%%


InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here


Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
[email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.


GET MORE OUT OF INFORMATIONWEEK



Keep up with the latest news, insights and trends as InformationWeek reports them:
Facebook Facebook Twitter Twitter
More Free
Newsletters
Join Us On
Facebook
Follow Us
On Twitter
Get Topical
News Alerts