TODAY'S TOP STORY
Nokia Shareholders Slam Windows Phone 7 Plan
Dissident group wants the company to reject Microsoft alliance and instead focus on in-house research and innovation.
RELATED INSIGHTS
• Nokia Makes Last Stand With Microsoft
• Microsoft To Pay Nokia Billions For Windows Phone 7 Switch
ALSO SEE
Security Spending Grabs Greater Share Of IT Budgets
Businesses spent 8.2% of their IT budgets on security in 2007; last year it was 14%, according to a Forrester Research report.
The $1 Trillion Federal IT Challenge
The CEOs of IBM, Dell, and other tech companies say the U.S. government can reap huge savings from IT-driven initiatives, but their ambitious plan has virtually no chance of success.
Global CIO: Cisco Zapped By Destructive Power Of Innovation
While John Chambers's company has branched far beyond its networking roots, that core business has stumbled--and competitors are pouncing.
Intel Showcases MeeGo Tablet UI And Other Apps
Despite Nokia's insistence that it is still very much behind MeeGo, Intel is going to the mobile platform dance stag. It would be easy to feel sorry for them if it hadn't felt like a mistake from the beginning. "Disappointed" is how one Intel MeeGo product manager expressed the company's view on Nokia's fickleness. Still, the company presses on, announcing and demonstrating a tablet reference platform, among other advancements, at Mobile World Congress. Intel also showcased MeeGo running a variety of applications.
Myriad Launches Text-Based Social Networking Service
Users of mobile phones without data subscription plans will be able to access email, IM, and social network sites like Facebook and Twitter.
HP Adds Data Center Construction Services
The Critical Facilities Implementation service rounds out HP's data center design, testing, and management offerings.
RSA: Symantec Sees Stuxnet In Your Future
Now that a virtual weapon has caused physical damage, network security is more important than ever.
Homeland Security Seeks Cybersecurity Funding
The agency has requested more than $1 billion for technology-related activities in its fiscal 2012 budget, a slight increase from last year.
Obama Increases Budget For NIST's Tech Efforts
"It's a historic investment in IT-related technologies," said National Institute of Standards and Technology director Patrick Gallagher.
Username Choices Poses Security Risks
Unique usernames give marketers or attackers an edge on tying a pseudonym to a real person, says a new INRIA report.
---------------------------------- This issue is sponsored by LinkTek
----------------------------------
Automatically fix broken links when you move or
rename files!Patented LinkFixerPlus is the first
application that automatically fixes broken links
in Excel, Word, PowerPoint, Access, Acrobat, AutoCAD,
MicroStation, PageMaker, InDesign, HTML and other files
when performing data migrations due to: server
consolidation, server name changes, path name changes
or folder reorganizations. Click for your free trial now!
ANALYTIC REPORTS & WHITEPAPERS
|
FEATURED REPORTS
Networking In A Virtualized World
Virtualization is rapidly evolving into a core element of next-generation data centers. This expanded role places new strains on the network. This report explores the technical issues exposed by virtualized infrastructure and looks at standards, technologies, and best practices that can make your network ready to support virtualization. Download Now (Registration Required)
|
|
|
 |
 |
 |
FEATURED WHITEPAPERS
Exchange 2010 Data Protection Tips
Exchange Server administrators need to protect databases and provide disaster recovery. Check out this report to learn how to create volume-based copies of data using snapshots, clones and replicas by automating data protection and recovery operations. Download Now
Security Dangers of Using Open Wi-Fi Networks
There are several reasons why users (and their employers) should be concerned about the dangers of free wireless Internet access. When certain devices are enabled to connect to a network that requires no password, the data that flows between them and the wireless router is at great risk. This detailed paper explains how to keep data safe. Download Now
|
FEATURED BLOG
IBM To VARs: Services Are Secret To Success
By Michele Pepe-Warren
IBM has a message for its channel partners: Sell services! It's not exactly a new message, but it's an important one, and the vendor is putting more muscle behind it than ever before.
ALSO SEE
Go Green With Download Services
By Lamont Wood
Using courier services to deliver files by hand makes no sense, even if they are too big for e-mail delivery.
What If Storage Hardware Mattered?
By George Crump
It seems like every week I speak to a storage hardware company that informs me that they are really a software company. What they typically mean by this is that they are trying to differentiate themselves by the software capabilities that they put on top of the storage hardware more so than the actual hardware itself. This means that the hardware is basic. The reality is we need great hardware manufacturers more than ever.
LifeSize Enhances Video Conferencing Systems
By Paul Korzeniowski
Corporate use of video conferencing systems is on the rise. To widen its market niche, LifeSize enhanced its solution, with the highlight being support for HD content on mobile devices, such as the Apple iPhone and iPad.
Successful Security: It Is In The Details
By George Hulme
Security is both hard to do right, and easy to make the simple mistakes that could jeopardize the security of most any organization. It may be a mistake that comprises of being a single digit off. And that one number could be the difference between a secure network and one that is readily breached. That was the overriding message in a Security B-Sides Conference presentation given today by Mike Lloyd, chief scientist at security software maker Red Seal Systems.
Successful Security: It Is In The Details
By George Hulme
Security is both hard to do right, and easy to make the simple mistakes that could jeopardize the security of most any organization. It may be a mistake that comprises of being a single digit off. And that one number could be the difference between a secure network and one that is readily breached. That was the overriding message in a Security B-Sides Conference presentation given today by Mike Lloyd, chief scientist at security software maker Red Seal Systems.
How to Grow your Business in a Market of Continual Change
Join Stephanie Stahl, Executive Editor, InformationWeek & TechWeb and Paul Brunet, Vice President, IBM WebSphere and BPM Product Marketing for a discussion on how savvy business managers are using technology to chart a path to growth, partnering with their technology departments to deliver value, and creating an unprecedented advantage over the competition.
It happens Wednesday, February 23, 2010 -- Time: 9:00 am PT / 12:00 pm ET
More Information & Registration
|
 |

|
Attend Cloud Connect
Learn how to take the next step in cloud computing at Cloud Connect, the leading conference and expo for IT professionals, executives, and developers.
It happens in Santa Clara, Calif., March 7-10.
2011 InformationWeek Government IT Innovators
For the past 22 years, InformationWeek has honored the country's most technologically innovative companies with its prestigious InformationWeek 500 ranking. Now in its third year, InformationWeek's 2011 Government IT Innovators program will feature the most innovative government IT organizations in the 2011 InformationWeek 500 issue and on InformationWeek.com.
Nominations Accepted Until April 29, 2011 -- Register Today!
Now InformationWeek Is On Your iPad!
It's easier than ever to get the business technology news and analysis you need with the InformationWeek Select iPad application, which provides a daily, easy-to-read compendium of stories hand selected by InformationWeek's editors.
Download the iPad app now so that you don't miss the latest reporting and insights.
Download Our New App Today!
|