Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Malware Targets Your Car | 5 Ways Social Changes IT Profession

InformationWeek Daily
InformationWeek Daily  
  Thursday, September 8, 2011
REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  
MUST READ
Between The Lines Columnist5 Ways Social Will Change The IT Profession
By Debra Donston-Miller
Social networking changes the way that companies do business--and the way that the IT department delivers support and value.

RELATED
How Social Can Improve Customer Service: Expert Advice
Tools To Help Analyze Mountains Of Social Data

Your Car's Next Enemy: Malware
The increasing sophistication and network connectivity of automotive electronics will leave cars vulnerable to malware, McAfee says.

Gmail Makes You 80 Times Greener, Says Google
Google pushes study that finds Gmail almost 80 times more energy efficient than in-house email.

Disclosure In The APT Age
Yet another widespread advanced persistent threat-type campaign has hit the federal government--this one aimed at civilian agencies.

HP Updates PC Lineup For SMBs
Despite speculation that it might get out of the PC business, HP unveils two all-in-one desktop computers aimed at smaller businesses.

Google Docs Outage: Offline Editing Needed, Now
An outage on Wednesday reminds me that Google Docs never should have been launched without full offline storage and editing. Why doesn't Google make this a priority?

How To Chat Online Across Language Barriers
With the Google Translate API no longer free, Lionbridge pushes realtime, customizable machine translation for online chat.

Talking Jobs And Heading To Washington
Macromedia founder and BYTE videoblogger Marc Canter's Digital City project is all about that four-letter word President Obama addresses Thursday: Jobs.

Hitachi Buys BlueArc, In Big Data Move
Storage market consolidation continues; Hitachi Data Systems gains technology targeted at big data analysis.

QUOTE OF THE DAY
Crave for a thing, you will get it. Renounce the craving, the object will follow you by itself. -- Swami Sivananda

ALSO SEE

How To Chat Online Across Language Barriers
Hitachi Buys BlueArc, In Big Data Move
State Of Storage 2011 Report: Consolidation And Centralization
Deduplication Provides Triple Strength Security
Motorola, Verizon Target Enterprise With $299 Droid Bionic
Broken State of Backup
Don't Miss Interop New York

JOIN THE CONVERSATION
Posted By ANON1237291702451:
"It should cost 1 year imprisonment and $1000 fine for EACH compromised computer system invaded by malware and botnet wranglers. "
In reply to: Inside The Booming Botnet Industry
View Entire Response | Post Your Own Reply

Posted By YMOM100:
"While I sympathize with not having access to your documents, expecting them to be edited offline is unrealistic. You're either "in" with the whole concept of cloud computing or you're not."
In reply to: Google Docs Outage: Offline Editing Needed, Now
View Entire Response | Post Your Own Reply


 
ANALYTICS & WHITEPAPERS
FEATURED REPORTS
State Of Storage 2011 Report: Consolidation And Centralization
Download this report to see how smart CIOs will accelerate this trend by adopting new multipurpose arrays and converged networks.
Download Now (Registration Required)
Featured Report

Deduplication To Optimize Disaster Recovery
Designing infrastructure for business continuity and disaster recovery requires a mix of business and technological savvy. Deduplication at the disk and the network level can make it easier to move and store critical information in your DR environment.
Download Now (Registration Required)
Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS
Deduplication Provides Triple Strength Security
Rapid growth through acquisitions left medical device provider ResMed with isolated backup systems at locations across Europe and a management-intensive data protection process. Discover how its new deduplication-based solution uses distributed DXi appliances to create a multi-site, edge-to-core approach for fast local backup and restore, daily replication for automated offsite protection, and centralized tape operations for long-term retention.
Download Now (Registration Required)

Top 5 Challenges for Protecting and Managing Virtual Server Data
From exploding backup windows to application object-level recoveries, the drive to extend virtual server capabilities across the data center can be fraught with difficulty. Discover the key challenges for protecting virtual server data and learn how to overcome them.
Download Now (Registration Required)

MORE WHITEPAPERS
 


MOST POPULAR NEWS
Motorola, Verizon Target Enterprise With $299 Droid Bionic
Will budget-conscious businesses use the LTE 4G-capable Droid Bionic and its Webtop accessories in lieu of a laptop or tablet?

100 Years Of IBM: 25 Historic Milestones
IBM this week celebrates 100 years of innovation and business optimization. From punch cards to the S/360, from tabulators to teraflops, from CEO Watson to supercomputer Watson, IBM has a unique history. Take a visual tour back through the decades.

Smartphone And Mobile Device Guide

12 Hot Mobile Medical Apps
Mobile medicine is everywhere. There's the iPhone app that lets you cut away images of muscle layers to see what lies beneath, an e-health record system for the iPad, and a smartphone-based blood pressure monitor. Here are a dozen innovative ones.

AMD Bulldozer Rolls Into View
New chips could flatten Intel in shops with multicore workloads.

 

SLIDESHOWS

12 Brawny Business Intelligence Products For SMBs Business intelligence isn't just for the big boys anymore. Check out our short list of star SMB options, from easy-to-deploy SaaS choices to affordable versions of the biggest BI suites.   View Now

ALSO SEE
50 Most Influential Government CIOs
My Mistake: 10 CIOs Share Do-Over Worthy Moments

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
WhisperCore Mitigates Risks Of Android In Businesses
TechWebTV catches up with Whisper Systems' CTO and co-founder Moxie Marllinspike to discuss and demo WhisperCore -- a mobile security solution that brings BlackBerry-like centralized enterprise-grade security to Android devices.   Watch

ALSO WATCH
MANDIANT CSO Talks Threats To His Company and His Clients
Intel Labs Invests in the Future of Cloud and Embedded Computing

MORE VIDEOS

spacer
 


WEBCASTS
Broken State of Backup
Data protection industry analysts agree that "backup is broken." In this webcast we'll identify key areas where current backup models are failing and how to resolve those issues. It happens Thursday, October 20, 2011 -- Time: 10:00 am PT / 1:00 pm ET More Information & Registration

Click here

 


RESOURCES AND EVENTS
Don't Miss Interop New York
See the latest IT solutions at Interop New York. Learn to leverage business technology innovations--including cloud, virtualization, security, mobility, and data center advances--that cut costs, increase productivity, and drive business value. Save 25% on Flex and Conference Passes or get a Free Expo Pass with code CPFHNY25. It happens in New York City, Oct. 3-7, 2011.
Register Today

This e-mail was sent to %%email%%
INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.