Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Maximize SaaS Value: 6 Tips| Nokia's N9 Phone Falls Short

InformationWeek Daily
InformationWeek Daily  
  Wednesday, June 22, 2011
Between The Lines ColumnistNokia's N9 Beautiful, But Not Business-Ready
By Eric Zeman
The first -- and last -- MeeGo handset is a gorgeous piece of hardware that will have little impact on Nokia's smartphone ambitions.

Nokia To Debut Windows Phone In Europe
Nokia To Lose Top Spot In Smartphone Sales

6 Tips To Maximize SaaS Value
Host Analytics' CFO says the midmarket firm's software as a service overhaul is more about technology sophistication and using tools previously only available to the enterprise than cost cutting.

Can Windows Servers Do WAN Optimization?
Certeon hopes to bring WAN optimization to the masses with aCelera Enterprise for Windows. But can a server app provide enough performance for enterprise data center links as workloads move to the cloud?

'Engineering Cloud' Promises To Modernize Manufacturing
Fujitsu's specialized cloud computing platform combines on-demand computer-aided design and analytics software with a thin-client environment to offer manufacturers additional product design and production power at an economical entry cost.

Oracle Buying FatWire To Boost Web, Cloud Engagement
Fast-growing website personalization and customer loyalty specialist's products will be retooled to work with Oracle middleware and other products.

Socialtext Adds Task Manager, Contact Matching
Socialtext's announcements at the Enterprise 2.0 conference include a social tasks module and a partnership with introNetworks to integrate contact recommendations.

LulzSec, Anonymous: Feds Most Wanted
While the hacker groups have drawn attention with public boasts, federal investigators have set up shop in numerous social media sites, going undercover where necessary to root cyber criminals.

Old Fashioned Bosses Threaten Enterprise 2.0 Progress
MIT's Andrew McAfee, who coined the term Enterprise 2.0, sees threats to the achievements in collaboration and communications brought about by social software.

Everyone who's ever taken a shower has an idea. It's the person who gets out of the shower, dries off and does something about it who makes a difference. -- Nolan Bushnell


LulzSec, Anonymous: Feds Most Wanted
Old Fashioned Bosses Threaten Enterprise 2.0 Progress
Deduplication To Optimize Disaster Recovery
What's your IT IQ?
LulzSec, Anonymous: Feds Most Wanted
Virtualize Without Compromise
Special Report: Enterprise 2.0

Posted By dchasselshp5:
"What do coders know about business when I want a custom solution? I look at business and see people work together in relatively small groups so why are IT projects so big and expensive?"
In reply to: Enterprise Software Failures Stem From Ignorance, Incompetence
View Entire Response | Post Your Own Reply

Posted By ANON1249547663249:
"I just wonder if the pending threat of releasing the census information of 60+ million citizens played any part of the stepped up efforts."
In reply to: Scotland Yard Busts Alleged LulzSec Mastermind
View Entire Response | Post Your Own Reply

  Digital Issue  
A well-planned approach to centralized storage will save you time and money in the long run.

ALSO: You can't afford to keep operating without redundancy for critical systems -- but business units must prioritize before IT begins implementation. We have the lowdown -- only in our June Digital Supplement

DOWNLOAD NOW (Registration Required)


Deduplication To Optimize Disaster Recovery
Designing infrastructure for business continuity and disaster recovery requires a mix of business and technological savvy. Deduplication at the disk and the network level can make it easier to move and store critical information in your DR environment.
Download Now (Registration Required)
Featured Report

Cloud Security: Understand The Risks Before You Make The Move
In this report, we explain the risks and guide you in setting appropriate cloud security policies, processes and controls. Plus: How to catch up when security is an afterthought to a cloud migration.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
What's your IT IQ?
Participate in the Great IT Challenge today and test your knowledge of IT topics while competing against your peers to find out how you stack up. Plus, the winner will receive a white-hot, superthin, superlight notebook computer and the top 100 performers will receive an IT Challenge T-Shirt. Good luck!
Download Now (Registration Required)

Application Development for the Cloud
Developers today need to use the most effective platform for cloud development and deployment, but there are key questions to ask when considering which platform is best: How do you develop for a target cloud destination? How do you target one workload for multiple clouds? What workloads should be sent to the cloud? Learn more about what questions you need to consider.
Download Now (Registration Required)


LulzSec, Anonymous: Feds Most Wanted
While the hacker groups have drawn attention with public boasts, federal investigators have set up shop in numerous social media sites, going undercover where necessary to root cyber criminals.

Scotland Yard Busts Alleged LulzSec Mastermind
British police, in a joint investigation with the FBI, arrest a teenager on charges of computer misuse and fraud.

AT&T Vs. Verizon: Which Data Plan Is Better?
With Verizon set to roll out tiered mobile data plans, comparisons with other carriers' pricing schemes are in order.

Nokia's N9 Beautiful, But Not Businesses-Ready
The first--and last--MeeGo handset is a gorgeous piece of hardware that will have little impact on Nokia's smartphone ambitions.

Inside DHS' Classified Cyber Coordination Headquarters
The Department of Homeland Security recently brought its classified National Cybersecurity and Communications Integration Center down to an unclassified level for one day only, and InformationWeek Government was there to take photos. The facility looks and functions like a state-of-the-art network operations center and much more. The NCCIC, as it's called, is the locus of DHS-led inter-agency cybersecurity work in the federal government. That includes providing an integrated response to cyber threats against government networks, monitoring network sensors across the government and coordinating any requested government aid and response to cyber attacks against private industry networks like power plants or communications networks.



10 Crowdsourcing Success Stories We looked at 10 applications of the crowdsourcing concept for business. They cover the broad disciplines of marketing, advertising, product development, customer service, public relations, human resources, outsourcing, project management, Web development, coding, social media, and quality assurance.   View Now

12 Hot Mobile Medical Apps
IT Salaries: 9 Ways We've Changed (Or Not) From 2001's Heyday


spacer spacer spacer
Extrahop Tackles Application Performance Management
Extrahop's appliance captures full transactions for detailed, real-time performance analysis.   Watch

Dream Theater's Jordan Rudess and BYTE Editor Gina Smith: A deep demo of SampleWiz.



Virtualize Without Compromise
Attend this webcast to learn how to avoid the common pitfalls of virtual machine data protection and how you can prepare yourself for a successful virtualization project. It happens Thursday, July 26, 2011 -- Time: 10:00 AM PT / 1:00 PM ET -- Duration: 60 minutes More Information & Registration


Special Report: Enterprise 2.0
Our colleagues at The Brainyard are at Enterprise 2.0 Conference in Boston this week, reporting on all the action -- before, during, and after the event. Visit our Special Report for all the very latest!
Register with code CPBDEB47 for a Free Expo Pass

Virtual Event: The Optimized Enterprise
This unique virtual event will feature presentations and discussions on the key topics related to creating a more competitive and efficient financial services organization.
It happens June 23 - Don't Miss It!

Survey: Content Management In The Enterprise
We are conducting a survey examining the struggles IT faces in managing content, and whether enterprise content management products make a difference. Respond to the survey and be eligible to win an iPod Touch.
Survey ends June 24

This e-mail was sent to %%email%%
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.