TODAY'S TOP STORY
Gov IT Execs Skeptical Of Data Center Consolidation
Three-quarters say agencies won't meet the plan's objectives on schedule, and some doubt if the targeted consolidation will even happen.
RELATED INSIGHTS
• Defense Agency To Pilot Cloud Apps
• Federal CIO Pushes Performance Gains
• NASA Seeks To Optimize IT Innovation
ALSO SEE
Salesforce.com Launches Chatter Collaboration Tool
The "Facebook for business" brings social networking elements to the 160,000-plus custom applications available on Force.com.
Federal IT Spending To Reach $112 Billion
More than five percent growth is predicted for Federal IT spending spurred by the Obama's administration cost-saving and transparency goals.
Senators To Combine Cybersecurity Bills
Reforming the Federal Information Security Management Act and defining the role of the White House and other agencies are common themes in the multiple cybersecurity bills now circulating.
Mayo Clinic, University Of Illinois Announce Research Alliance
The collaboration will focus on technology-based healthcare, individualized medicine, telehealth and point-of-care clinical tools.
Adobe Flash Player 10.1 For Mobile Debuts
Long delayed and much disparaged, Flash Player 10.1 for mobile devices will finally be tested in the market place.
Q&A: Dr. Steven Waldren On What's At Risk With E-Health Records
It's time for doctors to move on EHRs or get left behind, says head of American Academy of Family Physicians health information group.
Acer Introduces Powerful, Portable Laptops
The top-of-the-line AS8943G is a desktop replacement multimedia or gaming laptop, the Timeline X models are highly portable, and two Aspire laptops balance portability and power.
How To Use Google Voice On iPhone 4
Google opened up Google Voice to everyone today. While there's still no dedicated application for the iPhone, don't let that stop you. Here's how to use Google Voice with the iPhone 4.
Palo Alto Introduces Security For Cloud, Mobile Users
GlobalProtect applies firewall policies to users when they use PCs, mobile devices and in the cloud.
This issue sponsored by Progress Software.
Operational Responsiveness makes it possible for business
processes and systems to respond instantly to changing
conditions and customer interactions. It enables business
leaders to capitalize on new opportunities, reduce risk
and drive greater efficiencies throughout their company. http://web.progress.com/operational-responsiveness/
ANALYTIC REPORTS & WHITEPAPERS
|
FEATURED REPORTS
The Reinvention Of SAP
In a rollout of new products and a renewed strategy centered on in-memory and column-oriented database technology, SAP promises a commitment to "real" real-time analysis without risk. In our report, SAP management lays out vision and plans for the future. Download Now (Registration Required)
|
|
Building A Strong Base For UC In The Cloud
Virtualization and cloud computing have taken over the mantle of hottest technology that only a few years ago was held by unified communications, but that doesn't mean it's easy to align the cloud with UC--or any major initiative, for that matter. Still only by understanding how these and other foundational enterprise technologies are converging can you prepare for a long-term cloud strategy. Download Now (Registration Required)
|
|
|
 |
 |
 |
|
FEATURED BLOG
AT&T To Charge For Non-AT&T Bandwidth
By Ed Hansberry
Unlimited data plans are quickly going away and AT&T is leading the pack. For those that have a femtocell because AT&T coverage in your house is spotty, the bandwidth you use on that may also count against your monthly data allotment.
ALSO SEE
The Cache Value of SSD
By George Crump
When I speak with IT Managers about Solid State Disk (SSD) one of the most common questions is how and where should it be implemented? There are many options but an extremely simple risk free way to get started is using SSD as a large cache in front of a disk array.
Direct Deposit Means Green for SMBs
By Lamont Wood
Using direct deposit rather than writing paper payroll checks can save money, but most SMBs don't do it.
Salesforce.com Creates Some Industry Chatter
By Paul Korzeniowski
Traditional boundaries among software companies are falling to the wayside with the movement to social networking systems. Salesforce.com has become the latest vendor trying to craft a business version of Facebook.
Secure Web Surfing With HTTPS Everywhere
By Jim Rapoza
HTTPS Everywhere is a new Firefox extension that tries to make surfing the Web a little bit safer by ensuring that a secure connection is the default on many popular websites.
Printers, Copiers And Other Unexpected Vulnerabilities
By Keith Ferrell
When's the last time you updated and patched your printer's firmware -- if you ever have. Yet networked printers, copiers and other common workplace devices, including UPS backups and security cameras, can contain vulnerabilities that can put your business at risk.
10 Database Activities You Should Monitor to Prevent Data Breaches
Attend this live webcast featuring Gartner Research Director, Jeffrey Wheatman, as he discusses key findings from "Ten Database Activities Enterprises Need to Monitor," a newly-released Gartner Report, which details the latest security threats, reveals best practices for securing sensitive data and explains how to evaluate database activity monitoring (DAM) and fraud detection technologies.
It happens Tuesday, June 29, 2010 at 8:00 am PT / 11:00 pm ET
More Information & Registration
|
 |

|
The Battle For Mobile Supremacy
While it won't be long before billions of smartphones and tablets are in buyers' hands, PC history tells us that, of the dozen or so mobile platforms currently in play, not all can survive. It's clear that the warchests are opening up to win the battle for global mobile supremacy.
But who will reign supreme?
Follow our in-depth coverage
Black Hat USA 2010
This year's event will be hosted at Caesars Palace in Las Vegas, July 24-29, and offer over 50 multiday training sessions and seven tracks of topical briefings presentations provided by the most respected security experts in the world.
Get More Details And Attend
SMBs And Security
It doesn't pay for small and midsize businesses to protect against security threats faced by only the largest companies. Here's how to focus your efforts on the right threats. Download our all-digital supplement.
Download Now
|