Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

MS Office Cloud Heads To Beta | Chinese Military Cyber-Attacked U.S.

InformationWeek Daily: Issue Highlights
Manage Subscription  |  Contact Us

TOP STORY: Leaked Cables Indicate Chinese Military Hackers Attacked U.S.

MORE NEWS: Microsoft Office 365 Signals Huge Cloud Shift

ANALYTIC REPORT: Let The I/O Roll: 8 Steps To Maximize Performance

WHITEPAPER: Application Scanning - Find & Fix

SLIDESHOW: Top 20 Enterprise Laser Printers

VIDEO: Sprint and HTC Go EVO 3D and EVO View Tablet

WEBCAST: The Business Case for Standards-based Security

RESOURCES: Take Our IT Automation Survey -- You Could Win An iPod Touch

InformationWeek Daily
InformationWeek Daily  

Tuesday, April 19, 2011


A man who dares to waste one hour of life has not discovered the value of life. -- Charles Darwin



Leaked Cables Indicate Chinese Military Hackers Attacked U.S.

U.S. authorities have reportedly traced the "Byzantine Hades" spear-phishing attacks to specific Chinese military groups.


Federal Biometric ID Cards Get Iris Scan Option

66% Of Security Software Submitted With Flaws


Microsoft Office 365 Signals Huge Cloud Shift

More than 100,000 organizations are signed up to test the vendor's new on-demand platform, suggesting email and collaboration could overtake CRM as the top services-based app.

Apple MacBook Air Laptops Sport Samsung SSDs

Solid-state drives with faster read and write speeds have been discovered inside newer models of Apple's thin, lightweight laptop.

Bending The 80/20 Process Barrier

Think you can offload complexity only by outsourcing? Not so. Tackle process improvements, then add IT automation to get all the goodness with less risk.

Google Map Maker Enables Editing Of America

Like the territory of some 183 other countries and regions, the map of the United States is now open for anyone to embellish.

Keeping Up With Facebook Platform Changes

IFrame page tabs and "secure browsing" together are causing headaches for many Facebook business page operators.

Schwartz On Security: Talking Risk Equals Reward

Understanding your business's risk appetite will help you get the money for the security threats that matter.

Architect Your Databases Against Data Breaches

If you haven't considered data architecture to help protect your data, now is as good a time as any. Your business and even your job may depend on it.

Sizing Up The Unified Computing Stack Wars

Server vendors are now armed with formidable network and storage offerings, and software vendors have acquired hardware companies. But should you tie your data center's future to an integrated vision?

NASA To Leverage Nebula For Gulf Ecosystem Project

The agency moves ahead with work on its cloud-computing infrastructure even after its creator Chris Kemp has left the agency.

  Digital Issue  


Take a sneak peek at data from our 2011 Strategic Security Survey,
with a focus on the five biggest problems faced by midmarket companies.

Also: Our experts share innovative ways to meet security challenges.

DOWNLOAD NOW (Registration Required)


Click here to visit: Channelweb



Let The I/O Roll: 8 Steps To Maximize Performance

Networks are the lifeblood of any data center, but effective updates aren't just about pushing more bits around. IT must also form a symbiotic ecosystem with virtual servers and shared storage -- the three legs of the virtualized, cloud-like Data Center 2.0 infrastructure. In this report, we'll also explore the latest tactics for maximizing I/O and taming cable and port sprawl.

Download Now (Registration Required)

Featured Report

How To Choose The Best Cloud Services

We provide guidelines for evaluating SaaS and the public cloud, including total cost of ownership, to help you choose the best cloud services for your company.

Download Now (Registration Required)

Featured Report


spacer spacer spacer

Application Scanning - Find & Fix

Get this 12-page research report on how companies like yours address web application security threats, including:
* Current practices in web application security
* Market trends and adoption of enabling technologies
* Analysis of users adopting the find and fix approach to application security
Download Now

How To Virtualize Business-Critical Applications with Confidence

This white paper provides an overview of the challenges that organizations face in virtualizing business critical applications given their current tools and processes.
Download Now


  InformationWeek on Your iPad!  


It's easier than ever to get the business technology news and analysis you need with the InformationWeek Select iPad application, which provides a daily, easy-to-read compendium of stories hand selected by InformationWeek's editors.

Download the iPad app now so that you don't miss the latest reporting and insights from InformationWeek's award-winning editors!



Top 20 Enterprise Laser Printers

Demand for networked color laser printers continues to grow. They offer high-resolution, crisp text, and vivid colors, and are playing a greater role in businesses. But they face challenges: high-performance and lower cost inkjet printers and a weak economy that caused companies to look for ways to cut print costs or allocate those costs to departments. And there's still a big market for black and white printers.   View Now


Firefox 4 Is Faster, Cleaner, More Secure

Top 15 Cloud Collaboration Apps


spacer spacer spacer

Sprint and HTC Go EVO 3D and EVO View Tablet

Sprint announced its 21st and 22nd 4G devices: the HTC EVO 3D, a 4.3-inch, stereoscopic display phone with dual core 1.2 GHz processors; and the HTC EVO View, a 7-inch tablet with a 1.5 GHz processor. Both offer hot spots that support 8 devices.   Watch


Samsung Announces Two Super Thin Galaxy Tablets

03.22.11 Is OTC Derivatives Reform In Jeopardy?




The Business Case for Standards-based Security

Please join us for a webinar about the TNC network security architecture, open standards created by the Trusted Computing Group, and the products that have implemented those standards. Hear customers talk about how they're using products based on these standards to deliver stronger security at lower cost, integrating existing products and automating routine tasks.

It happens Tuesday, April 26, 2011 -- Time: 9:00 AM PT / 12:00 PM ET

More Information & Registration


Take Our IT Automation Survey -- You Could Win An iPod Touch

InformationWeek is conducting a survey on IT automation and the data center. This survey will take approximately 10 minutes to complete.

Upon completion, you will be eligible to enter a drawing to receive one Apple 32-GB iPod Touch valued at $299 from TechWeb. Your responses will remain confidential and will only be reported in aggregate.

Survey ends April 22

InformationWeek Government IT Leadership Forum 2011

Attend this day-long event where senior IT leaders in government come together to discuss how they're using technology to drive change in federal departments and agencies.

We will also be hosting an awards luncheon for the InformationWeek Government 50, featuring leading CIOs in local, state, and federal government. (Registration limited to government technology execs)

It happens May 5, 2011 in Washington, DC -- Register Today!

Download The Dodd-Frank Cheat Sheet

At nearly 1,000 pages long, the Dodd-Frank Wall Street Reform and Consumer Protection Act is dense, confusing and often boring. it's also the most important piece of financial regulation in decades.

That's why the InformationWeek Financial Services editors read the entire legislation for you.

Download Your Free Cheat Sheet Today

This e-mail was sent to %%email%%

InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
[email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.


Keep up with the latest news, insights and trends as InformationWeek reports them: