Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

How To Win CIO Title | Cisco's Private Cloud Pays Off

InformationWeek Daily
InformationWeek Daily  
  Wednesday, January 23, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
Between The Lines ColumnistCisco's Private Cloud: Pain And Profit
By Charles Babcock
Cisco's four-year effort to reduce costs and increase agility through a private cloud deployment pays off.

Cloud Standards: Bottom Up, Not Top Down
Biggest Private Cloud Deployment Threat: Your IT Staff

Secret CIO: 5 Steps To That CIO Title
I advise a frustrated reader on how to win the CIO title he wants and deserves.

RIM Launches BlackBerry Enterprise Service 10
RIM's new mobility management platform will help companies manage BlackBerry 10 devices, as well as those powered by iOS and Android, in an effort to regain relevance in the BYOD market.

Doctors Take Dim View Of Users' Online Ratings
Doctors question small sample sizes and what ratings measure, but many peek at their own report cards anyway.

Microsoft Might Invest In Dell Buyout
Microsoft is considering investing $1 billion to $3 billion to help Michael Dell take his company private, according to a report issued Tuesday.

Storage Gets Exciting -- Really
We saw a big uptick in the use of Ethernet, SSDs and virtualization last year. Expect that trend to continue in 2013.

DARPA Takes Aim At Space Junk
Defense research agency seeks partners to help it repair and reuse retired satellites.

"Everyone is a genius at least once a year; a real genius has his original ideas closer together." ~ Georg Lichtenberg


Storage Gets Exciting -- Really
DARPA Takes Aim At Space Junk
Alert: Making Insiders Foot Soldiers in Enterprise Security
Alter Ego Finds a Practical Solution to Its Data Backup Dilemma
Java Hacker Uncovers Two Flaws In Latest Update
Big Data Analytics: Is Your Elephant Enterprise Ready?
InformationWeek 2013 State of Cloud Computing Survey

Download our iPad App

Posted By jjohnson551:
"With PC's we can remotely install software, configure the anti-virus, lock down file shares, configure the browser setting, install security certificates, etc. With Mac's it is configure your Mac, walk over to next Mac start over."
In reply to: "Why Apple Is IT's Arch Frenemy"
View Entire Response | Post Your Own Reply

  Digital Issue  
Offensive cybersecurity is a tempting prospect. It's also way too early to go there. Here's what to do instead.

Also in our new, all-digital issue: Military agencies worldwide are figuring out the tactics and capabilities that will be critical in any future cyber war.

DOWNLOAD NOW FREE (Registration Required)


Alert: Making Insiders Foot Soldiers in Enterprise Security
Insider threat-borne attacks remain the minority of data breaches but tend to inflict the most damage -- especially when it comes to intellectual property theft. Here's a look at the hot trends and tips on how to flip the equation in the insider threat.
Download Now (Registration Required)

Featured Report
Alert: Java Insecurity
In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea?
Download Now (Registration Required)
Featured Report


spacer spacer spacer
Alter Ego Finds a Practical Solution to Its Data Backup Dilemma
With limited IT staff, video production company Alter Ego needed to simplify the backup and recovery of its mission-critical data. Download this case study to see how the company achieved its goals.
Download Now (Registration Required)

Three Rules for Building Smarter Order Management
A seamlessly orchestrated order management system lets companies cross over from simply filling orders to effectively leveraging inventory, maximizing internal and external resources and keeping order promises, which keeps customers happy.
Download Now (Registration Required)

Java Hacker Uncovers Two Flaws In Latest Update
Expert Java bug hunter says Oracle's latest Java 7 update, released last week, has two sandbox-bypass bugs.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

DARPA Takes Aim At Space Junk
Defense research agency seeks partners to help it repair and reuse retired satellites.

SoftRAM in 95 - Memory Optimizer in 2013
A new Windows 8 program claims to "optimize memory," implying a performance boost, but what it actually does - flushing the disk cache - is likely to degrade performance significantly. It evokes the memory of the greatest Windows utility scam of all time.

Mozilla Reveals Firefox OS Developer Preview Phone
Developers invited to hacking events later this month to encourage app creation for open source mobile OS.


New England Patriots' Winning Technology Plan
IT pros from Boston's professional teams -- the Patriots, Celtics, Bruins and Red Sox -- met at Gillette Stadium to talk tech, the future of live sports, and how to deliver real-time, high-definition video to a crowd of 70,000.   View Now

Android Smartphone Developments At CES 2013
10 Social Networks For Special Interests


spacer spacer spacer
CES 2013: It's A Wrap!
While some claim CES has lost its luster and big name headliners over the years, the show refuses to be deemed irrelevant. With trends spanning healthcare, mobile and automotive, there was plenty to see.   Watch

Intel shows off eye tracking and gesture tech
CES; the car show



Big Data Analytics: Is Your Elephant Enterprise Ready?
Hadoop's cost effective scalability and flexibility to analyze all data types is driving organizations everywhere to embrace big data analytics. This webinar will address critical project components such as data security, data privacy, high availability, user training and use case development It happens Tuesday, January 29, 2013. More Information & Registration

Click here


InformationWeek 2013 State of Cloud Computing Survey
Take our survey on cloud computing usage and optimization strategies and you could win a 32GB Google Nexus 7 tablet!
Survey ends Jan. 25

Don't Miss Interop Las Vegas
Attend Interop Las Vegas May 6-10, and attend the most thorough training on Apple deployment at the NEW Mac & iOS IT Conference. Use Priority Code DIPR02 by Jan. 26 to save up to $500 off the price of Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies, and the latest technology.
Get More Details and Register Today

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.