Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

20 Top Big Data Masters Degrees | CES 2013: 7 Standouts

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Tuesday, January 08, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
CES 2013: 7 Standout Technologies
By Michael Endler
What happens at CES 2013 doesn't stay in Vegas. From giant tablets to $20,000 televisions, take a peek at a few early standouts for gadget lovers.

RELATED
Sprint Finally Commits To Windows Phone 8
CES 2013: Smaller Smartphone Players Shine

Big Data Analytics Masters Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

Amazon's Cloud Revenues, Examined
Two analyst firms upgrade Amazon Web Services for broad growth potential; one factor is a growing number of large customers.

Windows RT Hacked To Run Desktop Apps
Microsoft's tablet OS can be fooled into running full-blown Windows 8 and legacy applications, hacker reveals.

RAND: Health IT No Bargain Yet
Problems in design and implementation of EHRs, lack of interoperability, and provider resistance hamper productivity gains and cost savings, says RAND report.

Intel Hedges Bets, Gets Cozy With Android
At CES 2013, Intel shows it won't let longstanding partnership with Microsoft stand in the way of growth.

Analytics Vendors Must Make Prediction Easier, Forrester Says
Forrester Wave report urges SAP, IBM and eight other vendors to come up with advanced analytics software that's less daunting to business users.

QUOTE OF THE DAY
"If everything seems under control, you’re just not going fast enough." -- Mario Andretti

ALSO SEE

Intel Hedges Bets, Gets Cozy With Android
Analytics Vendors Must Make Prediction Easier, Forrester Says
Fundamentals: Cloud ID Management
WebSphere Application Server V8.5 Concepts, Planning and Design Guide
10 Best Android Apps Of 2012
Is Your Network Ready for BYOD?
2013 InformationWeek 500: Nominations Now Accepted

Download our iPad App

JOIN THE CONVERSATION
Posted By resrpt:
"The problem is definition of IT. Authors are conveniently assuming IT to be "infrastructure and security" manager. We should not forget application developers who create all cool applications, are also IT."
In reply to: "How IT Can Keep Its Strategic Role In 2013"
View Entire Response | Post Your Own Reply


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Fundamentals: Cloud ID Management
Worried about controlling access to all the cloud applications your employees use? IT has a variety of options to help manage cloud-based identities, including Active Directory synchronization, federation and purpose-built cloud services that provide single sign-on for online applications.
Download Now (Registration Required)

Featured Report
Research: 2012 Application Security Survey
Tried-and-true methods like defense in depth can provide breathing room while you get a secure SDLC in place-a job still facing 56% of our 475 respondents. And they'd better get moving, because 51% of those with secure SDLC programs on their radar have developed and/or assumed responsibility for securing 11 or more Web apps.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
WebSphere Application Server V8.5 Concepts, Planning and Design Guide
Download this report to learn about the concepts, planning, and design of IBM WebSphere Application Server environments. This book is aimed at IT architects and consultants who want more information for the planning and designing of application-serving environments, ranging from small to large, and complex implementations.
Download Now (Registration Required)

Windows 8 and BYOD, Embrace the Trend
Mobile devices that are entering the market and workplace need to strike a balance between security and usability. This white paper reveals how Dell's new Windows 8 devices have been designed from the ground up with BYOD in mind. Find out how they embrace both personal and professional needs of end users and IT needs.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

12 Best iPhone, iPad Apps Of 2012
You already know about Skype, Instagram and Angry Birds. Check out these business-friendly iPhone and iPad apps you may not have tried, plus an amusing diversion or two.

CES 2013: 9 Cool Gadgets
Consumer Electronics Show is a tech smorgasbord. Here are nine products that attest to the show's overwhelming variety.

Military Drones Present And Future: Visual Tour
The Pentagon's growing fleet of unmanned aerial vehicles ranges from hand-launched machines to the Air Force's experimental X-37B space plane.

Hard Truths About Cloud Differences
Every medium- to large-sized company must understand today's different cloud computing approaches -- and pitfalls.

 


SLIDESHOWS
CES 2013: 7 Standout Technologies
What happens at CES 2013 doesn't stay in Vegas. From giant tablets to $20,000 televisions, take a peek at a few early standouts for gadget lovers.   View Now

ALSO SEE
Big Data Analytics Masters Degrees: 20 Top Programs
CES 2013: 9 Cool Gadgets

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
CES Unveiled; Call of the Weird
What do hemp headphones, singing toothbrushes, quadcopter cameras and 3-D printed iPhone cases all have in common? Why, CES Unveiled of course!   Watch

ALSO WATCH
Kaggle Crowdsources The Data Scientist Problem
ClearStory: The Convergence of Big Data Analytics

MORE VIDEOS

spacer
 


WEBCASTS
Is Your Network Ready for BYOD?
Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy. More Information & Registration

Click here to visit: Channelweb

 


RESOURCES AND EVENTS
2013 InformationWeek 500: Nominations Now Accepted
Nominate your company for the 2013 InformationWeek 500 -- our 25th annual ranking of the country's most innovative users of business technology. Organizations with $250 million or more in revenue may pre-register now to receive more information.
Deadline is April 12

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.