Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Intel Discloses Flaw In Sandy Bridge Chipset

InformationWeek Daily: Issue Highlights
Manage Subscription  |  Contact Us

TOP STORY: Intel Discloses Flaw In Sandy Bridge Chipset

MORE NEWS: Windows Faces Zero Day MHTML Vulnerability

ANALYTIC REPORT: State Of Enterprise Storage Report

WHITEPAPER: IPv4 Address Pool Will Run Dry: Network Management Whitepaper

SLIDESHOW: 12 Advances In Medical Robotics

VIDEO: Using Intel TBB parallel_for to Parallelize Serial Code

BLOG: Is Apple (Finally) Stepping Up Its Security Game?

WEBCAST: Tips and Tricks on Memory Management in Virtualized Environments

RESOURCES: Nominate Healthcare IT Execs

InformationWeek Daily
InformationWeek Daily  

Tuesday, February 1, 2011


"Nothing can stop the man with the right mental attitude from achieving his goal; nothing on earth can help the man with the wrong mental attitude." -- Thomas Jefferson



Intel Discloses Flaw In Sandy Bridge Chipset

Fixing the 6 Series chipset design error will cause a $300 million revenue drop in the first quarter, said the company.


IBM, ARM Team Up On Tablet Chips

AMD Takes Fusion Processors To Embedded Systems

Nvidia To Build ARM-Based Microprocessor


Windows Faces Zero Day MHTML Vulnerability

Microsoft releases temporary fix for bug that allows attackers to run malicious scripts on a user's computer via Internet Explorer.

Global CIO: The Software Revolution: Can SAP Light The Fuse?

Three emerging technologies have sparked a new generation of incredibly fast enterprise apps with huge disruptive potential -- and SAP plans to lead this revolution.

4 Strategies To Lower Mobile Device Risk

Employees want their own phones, and managers want them using apps for productivity. Your problem: Secure all this.

Online Dating Site Breach Exposes 30 Million Accounts has been compromised and the company is blaming the messenger.

Google Docs Gets Facelift

A revamped interface for Google Docs promises to promote greater productivity.

Trend Micro Unveils IBM Security Suite

ScanMail Suite for 64-bit Lotus Domino platforms uses a cloud-based database to detect threats, including those generated by URL-shortening services recently linked to the spread of malware.

IBM Takes Social Business Mobile

Lotus-integrated social features for the Apple iPad, iPhone, BlackBerry, Android, and Nokia devices were unveiled at Big Blue's Lotusphere event in Orlando.

IBM Tapped For NYC Data-Center Consolidation

Big Blue will build a cloud computing infrastructure to merge IT operations for 14 New York City agencies.

Facebook Expands Places Deals To Europe

Social network users in Germany, France, Italy, Spain, and the U.K. can now get discounts by checking in at Starbucks, Mazda, and other partner businesses.

  Digital Issue  


Having trouble sorting one vendor EHR from the next? Seven
companies responded to our RFI -- find out how they compare
and what questions you'll want to ask. Plus, discover the
lessons learned from the largest civilian EHR deployment
ever...only in our February issue of InformationWeek Healthcare.

DOWNLOAD NOW (Registration Required)




State Of Enterprise Storage Report

Budgets may be stagnant, but the recession has not put a damper the growth of enterprise data and related storage requirements. Too bad, then, that our infrastructures aren't keeping pace, according to our survey respondents. In this report we'll analyze poll results and discuss top technologies that can help storage managers do more with less.

Download Now (Registration Required)

Featured Report

Beating Cloud Lock-In: Our 3 Top Considerations

Whether you're talking about SaaS, IaaS, or storing data in the cloud, companies must consider how they'll unwind relationships -- customizations, metadata, contracts, and depth of integration are all factors.

Download Now (Registration Required)

Featured Report


spacer spacer spacer

IPv4 Address Pool Will Run Dry: Network Management Whitepaper

Compliance for compliance's sake is not a best practice in protecting cardholder data.
Learn why compliance is the byproduct of a well-executed information security program that focuses on risk managementand minimizes the use of compensating controls.
Download Now

The Cloud-based Telework Solution

By combining a cloud-based management platform with user-friendly devices, discover a new approach to remote access with the simplicity, centralized visibility & control, and economies of scale.
Download Now



12 Advances In Medical Robotics

Robots play a critical -- and growing -- role in modern medicine, from training the next generation of doctors, dentists, and nurses, to comforting and protecting elderly patients in the early stages of dementia. Using robots, medical professionals can make smaller incisions for shorter surgeries, reducing hospital stays and improving patients' prognoses and saving costs. As robots become even smaller and developers continue to further integrate the devices with artificial intelligence, the medical community will continuously expand the ways in which it uses this technology to save patients, improve quality of life and prevent health problems. At the other end of the spectrum, medical schools are turning to robots that mimic live patients' feelings of pain or discomfort to help the next wave of doctors and dentists prepare to treat real people. Of course, dummies and cadavers are not new to medical students, but by giving students access to sensitive patients, healthcare educators hope to hone the bedside manners of soon-to-be doctors and dentists.   View Now


Top Features Absent From Windows 7

Inside Watson, IBM's Jeopardy Computer


spacer spacer spacer

Using Intel TBB parallel_for to Parallelize Serial Code

This video instructs on using the parallel_for template from Intel Threading Building Blocks.' The video walks through the sample code from'the Add Parallelism Evaluation Guide for Intel Parallel Studio.   Watch


Data Protection Day

EXCLUSIVE: Socialcast to Announce Extension to its Platform




Featured BloggerIs Apple (Finally) Stepping Up Its Security Game?

By George Hulme

Apple's reported recent hire of noted security author and expert, David Rice, is yet another step the company has made in the past year to help improve its sloppy security image.


How Careful Do You Need To Be With Cloud Storage? - Bandwidth

By George Crump

Cloud storage continues to get treated as this extra special project that you need to be more careful with than other projects you would undertake in the data center. Our belief is that you need to be no more careful with cloud storage than any other IT project and in some cases you can be a bit more risky. In this entry we will address some of the concerns surrounding bandwidth.

Case Study: 'David' Defense Contractor Has Goliath Mindset

By Michele Pepe-Warren

Government contractors and agencies, like everybody else, are feeling the burn of tough financial times. So how is it that one of those players grew by leaps and bounds in 2010--and has been growing steadily, in fact, since opening its doors about 14 years ago?

Samsung Sells 2 Million Tablets

By Eric Zeman

Samsung says sales of its Galaxy Tab Android tablet have surpassed the two million mark after three months. Can it maintain that pace?

Microsoft Embraces Jailbreakers

By Ed Hansberry

Microsoft's history has involved a bit of heavy-handedness against those that have tried to hack or jailbreak their systems. That seems to be changing with Windows Phone 7 and the Kinect motion sensor for the Xbox 360.

Wanted: Healthy, Channel-Centric Vendors

By Michele Pepe-Warren

In the years I've spent writing about technology, I've given a fair amount of attention to discussing what vendors look for in their VAR partners. But what about the flip side of the coin?


Tips and Tricks on Memory Management in Virtualized Environments

Join this informative webcast and gain a greater appreciation for the strategies experts use today in managing their virtual environments. Attendees will gain a better understanding of how to recognize where memory constraints are impacting performance. We'll also explore how memory ballooning and swapping may impact the performance of your virtualized applications.

It happens Tuesday, February 8, 2011

More Information & Registration


Nominate Healthcare IT Execs

We're looking for forward-thinking IT leaders for InformationWeek's Healthcare CIO 25 - people who exemplify the new leadership role that IT plays at healthcare provider organizations.

Send a brief description of your nominee to [email protected]

We'll See You At Interop Las Vegas

Get up to speed on IT innovations in cloud computing, virtualization, security, and more at Interop Las Vegas, May 8-12.

Register Today

Plugging The Leaks: Finding And Fixing The Security Holes In Your Enterprise

In this all-day virtual event sponsored by Dark Reading and InformationWeek, you'll find out how criminals target the flaws in your IT environment, and you'll get some insight on the best methods for finding and fixing your vulnerabilities -- before you're hit by malware or unauthorized access.

You'll also get a look at the reasons why insiders may leak data to the outside, and get some recommendations on how to stop those leaks before they happen.

It happens Feb 3. (Free registration required.)

This e-mail was sent to %%email%%

InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
[email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.


Keep up with the latest news, insights and trends as InformationWeek reports them: