Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

HP's Lane: Our Messaging Stinks | 5 Lessons From IT First Movers

InformationWeek Daily
InformationWeek Daily  
  Tuesday, September 13, 2011
Between The Lines ColumnistIW500: Ray Lane Says HP Strategy Sound, Messaging Stinks
By Art Wittmann
HP chairman says company will spin off its PC business, build a services business based on cloud models, and will stay away from low-margin businesses, while still promoting the webOS mobile operating system.

HP Must Decide What It Wants To Be
HP's New Strategy: IT Pros Get Their Say

IW500: 5 Lessons From IT First Movers
What can you learn from CIOs who reaped rewards by taking early risks on virtualization and consumerization of IT? Consider these lessons shared at the InformationWeek 500 conference.

IW500: 6 Lessons Learned From FedEx's Private Cloud
CIO Rob Carter describes how FedEx plunged ahead on its journey to private cloud computing, relying on observations from partners and industry leaders.

IW500: Ken Robinson Lays Out 3 Misconceptions About Creativity
Leaders who buy into these have a ready-made excuse for not honing employees' creative capabilities.

TechCrunch Disrupt: Startup Battlefield
Several startups pitched their plans to revolutionize aspects of the music, grocery, contracting, currency, and health businesses. Some might even succeed.

HTC: iPhone Not 'Cool' Anymore
The acting president of HTC America said during a recent interview that Apple's iPhone is "a little less cool" than it used to be. HTC also had some comments about Windows Phone 7 Mango.

Data Security Not High On Hospitals' Priority List
Fewer than half of large facilities conduct annual risk assessments, but that might have to change, according to CSC consultant.

Hotmail Crash Blamed On System Update Error
Microsoft explains why its email service disappeared from the Internet's Domain Name System.

To love abundantly is to live abundantly, and to love forever is to live forever. -- Henry Drummond


Data Security Not High On Hospitals' Priority List
Hotmail Crash Blamed On System Update Error
State Of Storage 2011 Report: Consolidation And Centralization
How to: Implement a Layered Defense Strategy
Windows 8 Could Make Or Break Microsoft
Broken State of Backup
Don't Miss Interop New York

Posted By MLEWIS000:
"Do you think most average users know what all those buttons in android even do? I think not. They are confused as hell. That's where Mango comes in."
In reply to: AT&T Reveals Windows Phone Mango Smartphones
View Entire Response | Post Your Own Reply

Posted By Tronman:
"As long as Windows 8 isn't a repeat of Vista, there should be no problem. Windows 7 is a fine OS and Windows 8 should be even better."
In reply to: Windows 8 Could Make Or Break Microsoft
View Entire Response | Post Your Own Reply

  Digital Issue  
New SaaS productivity apps promise to replicate the desktop experience --if you can get past security and data ownership concerns.

ALSO: Beware these common exploits against Web-based apps put your users' credentials in jeopardy, Kurt Marko says.

DOWNLOAD NOW (Registration Required)


State Of Storage 2011 Report: Consolidation And Centralization
Download this report to see how smart CIOs will accelerate this trend by adopting new multipurpose arrays and converged networks.
Download Now (Registration Required)
Featured Report

Deduplication To Optimize Disaster Recovery
Designing infrastructure for business continuity and disaster recovery requires a mix of business and technological savvy. Deduplication at the disk and the network level can make it easier to move and store critical information in your DR environment.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
How to: Implement a Layered Defense Strategy
Putting premium malware protection at the network gateway and on every endpoint of your network enables the IT infrastructure to detect when malware is being delivered, and block and neutralize the malware before it performs malicious activities. Discover how to implement a layered defense strategy to protect against Web 2.0 threats.
Download Now (Registration Required)

10 Reasons to Modernize the Desktop
IT departments need a solution that meets the evolving needs of both the employees and IT - something not possible with a traditional PC model. Download this white paper to review the benefits of moving beyond the physical PC to a modern desktop that is highly flexible, easy to manage, customizable to suit users' needs, and ready for new and future technology.
Download Now (Registration Required)


Windows 8 Could Make Or Break Microsoft
BUILD conference will give developers their first in-depth look at what may be Redmond's last chance to play in the tablet market.

7 Hottest Features In Windows Phone 7 Mango
Microsoft this week shipped its Windows Phone "Mango" update to phone makers--adding key features to the smartphone OS that Microsoft is pitting against Apple iPhone and Google Android. Check out this visual tour of seven significant new functions.

AT&T Reveals Windows Phone Mango Smartphones
HTC and Samsung handsets feature built-in 4G support and front- and rear-facing cameras.

100 Years Of IBM: 25 Historic Milestones
IBM this week celebrates 100 years of innovation and business optimization. From punch cards to the S/360, from tabulators to teraflops, from CEO Watson to supercomputer Watson, IBM has a unique history. Take a visual tour back through the decades.

10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.



HP's New Strategy: Exclusive User Research When InformationWeek asked IT pros about HP's recent change in course, they spoke clearly--that HP's future direction looks anything but clear. Check out the full survey results.   View Now

10 Key Steve Jobs Moments and Innovations
10 Lessons Learned By Big Data Pioneers


spacer spacer spacer
WhisperCore Mitigates Risks Of Android In Businesses
TechWebTV catches up with Whisper Systems' CTO and co-founder Moxie Marllinspike to discuss and demo WhisperCore -- a mobile security solution that brings BlackBerry-like centralized enterprise-grade security to Android devices.   Watch

MANDIANT CSO Talks Threats To His Company and His Clients
Intel Labs Invests in the Future of Cloud and Embedded Computing



Broken State of Backup
Data protection industry analysts agree that "backup is broken." In this webcast we'll identify key areas where current backup models are failing and how to resolve those issues. It happens Thursday, October 20, 2011 -- Time: 10:00 am PT / 1:00 pm ET More Information & Registration

Click here


Don't Miss Interop New York
See the latest IT solutions at Interop New York. Learn to leverage business technology innovations--including cloud, virtualization, security, mobility, and data center advances--that cut costs, increase productivity, and drive business value. Save 25% on Flex and Conference Passes or get a Free Expo Pass with code CPFHNY25. It happens in New York City, Oct. 3-7, 2011.
Register Today

This e-mail was sent to %%email%%
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.