| MUST READIW500: Ray Lane Says HP Strategy Sound, Messaging Stinks By Art WittmannHP chairman says company will spin off its PC business, build a services business based on cloud models, and will stay away from low-margin businesses, while still promoting the webOS mobile operating system.
• HP Must Decide What It Wants To Be
• HP's New Strategy: IT Pros Get Their Say
IW500: 5 Lessons From IT First Movers
What can you learn from CIOs who reaped rewards by taking early risks on virtualization and consumerization of IT? Consider these lessons shared at the InformationWeek 500 conference.
IW500: 6 Lessons Learned From FedEx's Private Cloud
CIO Rob Carter describes how FedEx plunged ahead on its journey to private cloud computing, relying on observations from partners and industry leaders.
IW500: Ken Robinson Lays Out 3 Misconceptions About Creativity
Leaders who buy into these have a ready-made excuse for not honing employees' creative capabilities.
TechCrunch Disrupt: Startup Battlefield
Several startups pitched their plans to revolutionize aspects of the music, grocery, contracting, currency, and health businesses. Some might even succeed.
HTC: iPhone Not 'Cool' Anymore
The acting president of HTC America said during a recent interview that Apple's iPhone is "a little less cool" than it used to be. HTC also had some comments about Windows Phone 7 Mango.
Data Security Not High On Hospitals' Priority List
Fewer than half of large facilities conduct annual risk assessments, but that might have to change, according to CSC consultant.
Hotmail Crash Blamed On System Update Error
Microsoft explains why its email service disappeared from the Internet's Domain Name System.
| DOWNLOAD OUR SMB DIGITAL ISSUE New SaaS productivity apps promise to replicate the desktop experience --if you can get past security and data ownership concerns.
ALSO: Beware these common exploits against Web-based apps put your users' credentials in jeopardy, Kurt Marko says.
DOWNLOAD NOW (Registration Required)
ANALYTICS & WHITEPAPERS
|FEATURED WHITEPAPERSHow to: Implement a Layered Defense Strategy Putting premium malware protection at the network gateway and on every endpoint of your network enables the IT infrastructure to detect when malware is being delivered, and block and neutralize the malware before it performs malicious activities. Discover how to implement a layered defense strategy to protect against Web 2.0 threats.
Download Now (Registration Required)
10 Reasons to Modernize the Desktop
IT departments need a solution that meets the evolving needs of both the employees and IT - something not possible with a traditional PC model. Download this white paper to review the benefits of moving beyond the physical PC to a modern desktop that is highly flexible, easy to manage, customizable to suit users' needs, and ready for new and future technology.
Download Now (Registration Required)
MOST POPULAR NEWS
Windows 8 Could Make Or Break Microsoft
BUILD conference will give developers their first in-depth look at what may be Redmond's last chance to play in the tablet market.
7 Hottest Features In Windows Phone 7 Mango
Microsoft this week shipped its Windows Phone "Mango" update to phone makers--adding key features to the smartphone OS that Microsoft is pitting against Apple iPhone and Google Android. Check out this visual tour of seven significant new functions.
AT&T Reveals Windows Phone Mango Smartphones
HTC and Samsung handsets feature built-in 4G support and front- and rear-facing cameras.
100 Years Of IBM: 25 Historic Milestones
IBM this week celebrates 100 years of innovation and business optimization. From punch cards to the S/360, from tabulators to teraflops, from CEO Watson to supercomputer Watson, IBM has a unique history. Take a visual tour back through the decades.
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
RESOURCES AND EVENTS
Don't Miss Interop New York See the latest IT solutions at Interop New York. Learn to leverage business technology innovations--including cloud, virtualization, security, mobility, and data center advances--that cut costs, increase productivity, and drive business value. Save 25% on Flex and Conference Passes or get a Free Expo Pass with code CPFHNY25. It happens in New York City, Oct. 3-7, 2011.Register Today