Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Lion Pounces At Windows 8 | Google Hacks Rise

InformationWeek Daily
InformationWeek Daily  
  Thursday, July 21, 2011
REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  
MUST READ
Between The Lines ColumnistGoogle Hacking Tools Prepped For Black Hat
By Tim Wilson
'Diggity' family of search tools will help security teams and pen testers find searchable flaws before bad guys, Stach & Liu researchers say.

RELATED
Five Steps To Help Repel The 'Lulz'
Google Warns Searchers Of Windows Malware Infection

OS X Lion Makes Windows 8 Too Late
Apple and Microsoft race to '"tablify" their desktop operating systems. Guess who's winning?

Telefonica Strategy Hints At Future of E-Commerce
It's all about a managed API platform, not websites, the telecom's strategy declares. Netflix, AT&T, and Google already understand.

CIGNA CIO: Technology Influences Customer Experience
Mark Boxer, who took on the CIO role at CIGNA in April 2011, talks about technology's role in supporting the health insurer's...

Infor Promises Investment In Lawson ERP
ION integration layer will link Lawson M3 to Infor options for planning, product lifecycle management, distribution, and corporate performance management.

Attack On PNNL Started At Public Web Servers
Zero-day Flash payload infected visitors to Department of Energy contractor Pacific Northwest National Lab's public-facing Web servers.

Google-Style Data Analysis For Loans
Financial startup ZestCash is getting an infusion of funding to realize its plan to rewrite the rules of high-risk loans.

Is Being Transparent With Customers Overrated?
Take a cue from Domino's when considering how open you should be with customers on the web.

QUOTE OF THE DAY
Opportunity does not knock, it presents itself when you beat down the door. -- Kyle Chandler

ALSO SEE

Google-Style Data Analysis For Loans
Is Being Transparent With Customers Overrated?
Charge IT: Why We Need Usage-Based Accounting
A Hitchhiker's Guide To Process-Driven Business Transformation And Application Delivery
Lenovo Takes On 7 Rivals: Tablet Faceoff
The Security Threat Report: The Threats to Watch
InformationWeek 500 Conference: The Need For Speed

JOIN THE CONVERSATION
Posted By ANON12378:
"I don't use either of those crappy OS's, but I find it strange Google likes to to get its hand in everyone's business, even on a personal level. Kind of creepy and evil if you ask me."
In reply to: Google Warns Searchers Of Windows Malware Infection
View Entire Response | Post Your Own Reply

Posted By Topher_SD:
"In essence, isn't this still placing the financial burden on future generations for the sake of showing how many billions they can save over the next 5 years or are they considered?"
In reply to: Feds To Close 178 Data Centers Next Year
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD DARK READING'S DIGITAL ISSUE

The vendors, contractors, and other outside parties with which you do business can create a serious security risk. Here's how to keep this in check.

PLUS: Focusing solely on your own company's security ignores the bigger picture.

And much more, exclusively in Dark Reading's July 18th Digital Issue.


DOWNLOAD NOW (Registration Required)
 

-------------------------------------------------------
This issue is sponsored by HDI Connect
-------------------------------------------------------


 
ANALYTICS & WHITEPAPERS
FEATURED REPORTS
Charge IT: Why We Need Usage-Based Accounting
A service catalog is pivotal in moving IT from an unresponsive mass of corporate overhead to an agile business partner. In this report, we chart the new service-oriented IT landscape and provide a guide to the key components: service catalogs, cost and pricing models, and financial systems integration.
Download Now (Registration Required)
Featured Report

Cloud Security: Understand The Risks Before You Make The Move
In this Tech Center report, we explain the risks and guide you in setting appropriate cloud security policies, processes and controls. Plus: How to catch up when security is an afterthought to a cloud migration.
Download Now (Registration Required)
Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS
A Hitchhiker's Guide To Process-Driven Business Transformation And Application Delivery
Business process professionals and application delivery professionals must share a common approach: express business requirements and customer value as business processes and use Agile methods to deliver both business process and application change. Discover how to institute collaboration between business process pros and application delivery pros and combine BPM and Agile approaches - and your business and customers will greatly benefit.
Download Now (Registration Required)

Social Media and the Contact Center for Dummies
Interested in increasing the size of your audience? Learn how by adding - and managing - social media in your contact center.
Download Now (Registration Required)

MORE WHITEPAPERS
 


MOST POPULAR NEWS
Lenovo Takes On 7 Rivals: Tablet Faceoff
Lenovo's 3 new tablets square off against Apple iPad 2, Samsung Galaxy Tab, HP TouchPad, and other top contenders.

Google Warns Searchers Of Windows Malware Infection
Google has started alerting users running Windows about a specific form of local malware it can detect through network traffic flows.

Lenovo's 3 New Tablets Pack Some Surprises
Lenovo jumps into the tablet wars with Android and Windows 7 devices--hearty competitors with a few special features.

Johns Hopkins Execs: How To Make Medicine Smarter
CIO and chief medical information officer share lessons learned on electronic health records, embedded intelligence, risk reduction, and personalized medicine.

E-Prescribing Doesn't Make The Grade
Outpatient electronic prescribing doesn't cut out the common mistakes made in manual systems, study finds.

 

SLIDESHOWS

Lenovo Takes On 7 Rivals: Tablet Faceoff Lenovo's 3 new tablets square off against Apple iPad 2, Samsung Galaxy Tab, HP TouchPad, and other top contenders.   View Now

ALSO SEE
12 Brawny Business Intelligence Products For SMBs
50 Most Influential Government CIOs

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
10 Hot iPad Apps For Summer Summertime--and the tablet apps are everywhere. With the recent launch of the Apple iPad 2, application developers just keep on finding new ways to exploit the tablet's portability and beautiful display. Check out these free and low-cost tools for planning summer fun, or just kicking back during your vacation time.   View Now

ALSO SEE
HP TouchPad Tablet: Visual Tour
14 Cool Mobile Apps From Uncle Sam

MORE VIDEOS

spacer
 


WEBCASTS
The Security Threat Report: The Threats to Watch
With over 95,000 pieces of malware analyzed by SophosLabs every day, it's clear the threat isn't going away. Join Chester Wisniewski, senior security advisor at Sophos, for a live Webcast to learn about what makes the latest security threats tick. It happens Thursday, July 28th, 2011 -- Time: 11:00 am PT / 2:00 pm ET More Information & Registration

Click here

 


RESOURCES AND EVENTS
InformationWeek 500 Conference: The Need For Speed
Join C-level executives from leading global companies as they gather to discuss how their organizations are turbo-charging business execution and growth -- how their accelerated enterprises manage cash more effectively, invest more wisely, delight customers more consistently, manage risk more profitably. It happens Sept. 11-13 in St. Regis Monarch Beach
Register Today

Take Our Printing Options Survey
InformationWeek Analytics is conducting a survey to assess the evolution in enterprise printing. Respond to the survey and be eligible to win an iPod Touch.
Survey ends July 22


This e-mail was sent to %%email%%
INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.