Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

HP: No Windows 8 ARM Tablets | Google's Risky Business

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Monday, July 02, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist Google's Risky Business
By Thomas Claburn
Google I/O, company's annual developer conference, confirms that Google is on a mission to organize the world's information. Big bets such as Project Glass could bring big rewards, or painful lessons.

RELATED
Google Compute Engine Leverages Third Party Support
Google Nexus 7 Tablet: 10 Coolest Features

HP To Skip Windows 8 ARM Tablets
World's biggest PC maker says it will stick with Intel architecture, which offers full compatibility with legacy apps like Microsoft Office.

Dell Acquires Quest Software For $2.4 Billion
Acquisition to bolster systems management, data protection, security, and workspace management.

Nokia Needs A Good Contingency Plan
Nokia chairman suggests the struggling smartphone maker has a contingency plan in the works should its Windows Phone business fail.

How To Hire A Hacker
Hackers might have shady pasts, but they can also bring a lot of IT expertise to the table. Should you consider hiring one?

4 Steps To A Successful BYOC Program
Many employees are ready and willing to use their own computers to get work done. Consider these steps to launch a bring-your-own-computer program.

E-Stores Should Cater To Tablet Users, Study Says
Social sites are driving more referrals but few conversions. Meanwhile, mobile traffic is also on the rise, with tablet visitors converting to buyers at almost the same rate as PC users.

British Police Bust Baltic Financial Malware Trio
Men face jail time for using SpyEye malware to steal consumers' online bank account information and launder $157,000. Separately, a TeamPoison hacker awaits sentencing for stealing former U.K. prime minister Tony Blair's online address book.

QUOTE OF THE DAY
Life without liberty is like a body without spirit. -- Khalil Gibran

ALSO SEE

E-Stores Should Cater To Tablet Users, Study Says
British Police Bust Baltic Financial Malware Trio
Research: Private Cloud Vision vs. Reality
How To Turn BYOD into Productivity
Secret Spy Satellite Takes Off: Stunning Images
Supporting an Enterprise-wide Data Archive and Retention Strategy
Virtual Event: SIP Trunking: The Straight Scoop

Download our iPad App

JOIN THE CONVERSATION
Posted By Ravi stahmasebi9211:
"I don't understand this constant Apple bashing by Mr. Feldman. Apple does a lot to make sure their customers are happy and taken care of."
In reply to: "Apple's Planned Obsolescence: Customer Revolt Brews"
View Entire Response | Post Your Own Reply

Posted By pcalento011:
"Perspectives or management philosophies are like diets. While you can debate the merits of each, ultimately following through on one ultimately yields better results than doing nothing."
In reply to: "Lean Startup Concept No Silver Bullet"
View Entire Response | Post Your Own Reply


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Research: Private Cloud Vision vs. Reality
We asked 87 respondents with private clouds in place about their experiences and quizzed 123 more who are just starting initiatives about their expectations. We also asked 204 respondents who aren't aiming for a private cloud about their concerns. 32% say their applications are a major hurdle-and even more say they just don't have the budget for new initiatives. Are they right to hold back?
Download Now (Registration Required)

Featured Report
Informed CIO: VDI Snake Oil Check
You won't lose your shirt on a desktop virtualization initiative, but don't expect it to be simple to architect, easy to implement--or free of unforeseen complications. The bigger question is, will it help you along to the next stage in end user support?
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
How To Turn BYOD into Productivity
One of the most overlooked aspects of the BYOD phenomenon isn't just connecting the users to the network, but how to manage them once they're there. Getting mobile and BYO devices onto the network is now table stakes. This white paper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Download Now (Registration Required)

Adaptive Behavior-Based Malware Protection
A new generation of customized, tightly targeted, and byte-level obfuscated malicious code (malware) disguises its appearance to evade reactive security measures of all kinds, specifically signature-based antivirus solutions. Download this white paper to learn why IT organizations should carefully consider upgrading their IT security solutions to include SONAR protection.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
Secret Spy Satellite Takes Off: Stunning Images
The National Reconnaissance Office provides satellite imagery for intelligence operations and national defense. Here's a look at the agency's most recent rocket launches.

Microsoft Surface Tablet: 10 Coolest Features
Microsoft's slick new Windows 8 Surface tablet looks great, though pricing remains a question. Get up close with 10 of its most compelling features.

8 Things Tablets Still Can't Do
Have we really entered a post-PC world? The new Apple iPad and its tablet rivals still come up short on a few important measures.

Apple's Planned Obsolescence: Customer Revolt Brews
Short term, Apple will make more money. Long term, it will annoy, and lose, even ardent device fans.

7 Ways Sentiment Is Hard To Decipher Online
Online comments don't fall neatly into like or dislike, so it take nuances to understand them.

 


SLIDESHOWS
Google Nexus 7 Tablet: 10 Coolest Features
Google's Android 4.1 slate takes aim at Amazon's $199 Kindle Fire.   View Now

ALSO SEE
Microsoft Surface Tablet: 10 Coolest Features
10 Windows Ultrabooks: Not Just For SMBs

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
Ixia Ensures OpenFlow Hardware No Longer Untestable
Ixia has long been known as a premier provider of network test hardware and software and now hopes to support development of a new OpenFlow-based equipment ecosystem.   Watch

ALSO WATCH
Gnodal GS0072 The Baddest Switch At Interop
Zynga's Adventures in Cloud Computing: From the Public Cloud to ZCloud

MORE VIDEOS

spacer
 


WEBCASTS
Supporting an Enterprise-wide Data Archive and Retention Strategy
Join us as we discuss the best practices for controlling the expanding data growth through an effective data archiving strategy, significantly improving application performance, mitigating the risks associated with data retention needs, and reducing the costs of managing storage. More Information & Registration

Click here

 


RESOURCES AND EVENTS
Virtual Event: SIP Trunking: The Straight Scoop
SIP trunking has the potential to save your enterprise big dollars, but it's not a slam dunk. You need to match the capabilities against the cost, and determine whether it's the right fit for you. This virtual event from our colleagues at Enterprise Connect will feature detailed presentations by independent technology experts who will give you the straight scoop--what SIP trunking can deliver, what it can't, and how much it really costs.
It happens July 11

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.