Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Social Network Frenzy: Signs Of Another Tech Bubble?


InformationWeek Daily: Issue Highlights
  
Manage Subscription  |  Contact Us

TOP STORY: Social Network Frenzy Signals Another Tech Bubble

MORE NEWS: Microsoft Releases Vulnerability Analysis Tool

ANALYTIC REPORT: Eliminating Vulnerabilities In Enterprise Software

WHITEPAPER: The Compliance Trap

SLIDESHOW: Inside Joomla 1.6: Improved Access Control, Categories

VIDEO: JetBrains' Dmitry Jemerov

BLOG: Survey Says: U.S. SMBs Must Bolster Backup Strategies

WEBCAST: The Security Threat Report: A look at the latest malware and attack vectors

RESOURCES: Be Part Of The 2011 InformationWeek 500

InformationWeek Daily
InformationWeek Daily  

Thursday, January 20, 2011

 
QUOTE OF THE DAY...

"Living is a form of not being sure, not knowing what next or how…We guess. We may be wrong, but we take leap after leap in the dark." -- Agnes de Mille

INFORMATIONWEEK.COM
  |  
NEWS
  |  
ANALYTIC REPORTS & WHITEPAPERS
  |  
BLOGS
  |  
WEBCASTS
  |  
RESOURCES


TODAY'S TOP STORY

Social Network Frenzy Signals Another Tech Bubble

Some say the likes of Facebook, Twitter and Groupon deserve to be measured by a different yardstick. But that's what they said about the infamous flameouts of ten years ago.

RELATED INSIGHTS

MySpace Confirms Sale Rumors

Facebook Paid $8.5 Million For FB.com

ALSO SEE

Microsoft Releases Vulnerability Analysis Tool

Attack Surface Analyzer, available as a free beta, assesses operating system weaknesses which emerge after an install or an attack.

Global CIO: HP & Microsoft Launch Broad Fleet Of Application Appliances


The new HP-branded optimized systems are aimed at BI, data warehousing, Exchange, and database consolidation, with one priced at almost $2 million.

U.S. SMBs Lag In Disaster Recovery Readiness

Study finds that legacy equipment and lack of executive buy-in lead American firms to trail global counterparts in their ability to bounce back from an IT disaster.

FEMA To Use Social Media For Emergency Response

Administrator Craig Fugate discusses the agency's plans to employ text messaging, GPS, and other tools for improved 'situational awareness' and disaster relief.

AMD Takes Fusion Processors To Embedded Systems

The G-series chips compete with Intel's combo graphics-CPU processors, and are targeted toward Internet-enabled set-top boxes, thin clients, and point-of-sale kiosks.

Amazon EC2 Gains An Elastic Beanstalk

The automated system takes over scaling decisions for workload submitters.

Obama Orders FDA To Streamline Medical Tech Regulations

Executive order signed the same day PricewaterhouseCoopers reports that the U.S. is losing ground on medical device innovations, partially due to the agency's cumbersome and costly approval process.

IBM, ARM Team Up On Tablet Chips

Big Blue will lend its advanced fabrication techniques to ARM's next generation of mobile processors.

Amazon Web Services Simplifies App Deployment

A service called Elastic Beanstalk aims to serve as an on-ramp to the cloud.

  Digital Issue  


DOWNLOAD OUR JANUARY 17, 2011 DIGITAL ISSUE



Cloud adoption is in full swing. But ignore integration,
management, and monitoring at your peril.

ALSO:
• Real Costs Of The Cloud: An incomplete financial analysis
will end up biting you. We look at how to do a better assessment.

• Cloud Results: These four companies are way past testing the cloud.
They're looking at what's next.


DOWNLOAD NOW (Registration Required)

 


Click here to visit: Channelweb


ANALYTIC REPORTS & WHITEPAPERS

FEATURED REPORTS

Eliminating Vulnerabilities In Enterprise Software

Most of the hacks that compromise enterprise security today are those that exploit flaws in applications. How can organizations find and fix these vulnerabilities -- before they lead to a breach? In this special Alert, Dark Reading offers a look at some tips and tricks for software development and vulnerability assessment, as well as some advice on how to eliminate security flaws in the enterprise.

Download Now (Registration Required)

Featured Report

Hardening Next-Gen Web Applications

Slick interactive applications have opened up new vistas of opportunity for businesses--and for attackers seeking to make off with data. In this report, we provide an in-depth analysis of the challenges around secure dynamic apps without stifling the very attributes that make them so popular with end users and customers.

Download Now (Registration Required)

Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS

The Compliance Trap


Compliance for compliance's sake is not a best practice in protecting cardholder data.
Learn why compliance is the byproduct of a well-executed information security program that focuses on risk managementand minimizes the use of compensating controls.
Download Now

The Cloud-based Telework Solution


By combining a cloud-based management platform with user-friendly devices, discover a new approach to remote access with the simplicity, centralized visibility & control, and economies of scale.
Download Now

MORE WHITEPAPERS AT

MULTIMEDIA
SLIDESHOWS


Inside Joomla 1.6: Improved Access Control, Categories

The new Joomla system now features much stronger user access control features that make it possible to define who can access and change content on a site and do so in a very fine grained and detailed manner. And Joomla 1.6 has ditched its old two-level site organization and added a new Categories system that allows for unlimited nested levels of content.   View Now

ALSO SEE

Top 15 Facebook Apps For Business

NRF Big Show 2011: Breakthrough Technologies For Retailing

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS


JetBrains' Dmitry Jemerov

Dr. Dobb's Mike Riley discusses the latest improvements in JetBrains IntelliJ IDEA 10 with JetBrains development lead Dmitry Jemerov   Watch

ALSO WATCH

Man Versus Machine

Trading Desk Of The Future: The Rise Of the Robo-Trader

MORE VIDEOS

spacer

TODAY AT THE BLOG


FEATURED BLOG
Featured Blogger

Survey Says: U.S. SMBs Must Bolster Backup Strategies

By Michele Pepe-Warren


A worldwide survey has revealed some disheartening news about U.S.-based SMBs: They're not feeling very confident about their disaster recovery and backup solutions.

ALSO SEE

Photos Of webOS Tablet Emerge


By Eric Zeman

Ahead of its probable February 9 debut, images and specs of a webOS-based tablet from HP have hit the 'net.

Backup Deduplication 2.0 - Density

By George Crump


As we continue our requirements for the next era of backup deduplication, the next important area for improvement is in the denseness of systems. This means more raw capacity in less physical space. While getting sufficient power to the data center is a problem for some data centers, the lack of available data center floor space is becoming a problem for even more of them. Backup deduplication systems need to help address that pain by increasing density.

Epson Brings Out Double-Sided SMB Inkjet

By Lamont Wood


The new MFP is touted as being the world's fastest double-sided printing solution for small offices. There is also a non-MFP version.

Designing And Delivering Customer-Centric IT Services

By


I have been designing, delivering and supporting IT services for most of my 27 years as an IT professional. Time and time again I've encountered IT organizations which didn't keep the customer or their business top of mind when designing and delivering services. Instead, they delivered 'cool' technologies or strategies that met IT's expectation and requirements, but didn't directly benefit business customers.


WEBCASTS

The Security Threat Report: A look at the latest malware and attack vectors


Join Graham Cluley, senior technology consultant at Sophos, for a live Webcast to learn about the latest security threats and trends in malware. Armed with the latest threat data, Graham will discuss the tactics the bad guys are using to infect your systems and steal your data.

Thursday, January 27, 2011 -- 9 AM PT/12:00 PM ET

More Information & Registration

--------------------------------------------------
This issue is sponsored by LinkTek:
--------------------------------------------------
Automatically fix broken links when you move or rename files!
Patented LinkFixerPlus is the first application that automatically fixes broken links in Excel, Word, PowerPoint, Access, Acrobat, AutoCAD, MicroStation, PageMaker, InDesign, HTML and other files when performing data migrations due to: server consolidation, server name changes, path name changes or folder reorganizations.
Click for your free trial now!


RESOURCES AND EVENTS


Be Part Of The 2011 InformationWeek 500


Nominate your company for the 2011 InformationWeek 500 -- our 23rd annual ranking of the nation's very best business technology innovators. Deadline is April 29. Organizations with $250 million or more in revenue may apply now.


Don't Miss Out!

We'll See You At Interop Las Vegas


Get up to speed on IT innovations in cloud computing, virtualization, security, and more at Interop Las Vegas, May 8-12.


Register Today



This e-mail was sent to %%email%%


InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here


Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
[email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.


GET MORE OUT OF INFORMATIONWEEK


Keep up with the latest news, insights and trends as InformationWeek reports them:
newsletters
Facebook
Twitter