Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Anonymous Hits Wall Street | Windows Phone Tops BlackBerry

InformationWeek Daily
InformationWeek Daily  
  Wednesday, February 06, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist Windows Phone Tops BlackBerry In U.S.
By Eric Zeman
Windows Phone sales exceeded BlackBerry sales in the U.S. during the fourth quarter of 2012, says Strategy Analytics.

RELATED
BlackBerry 10 Sees Strong U.K. Sales, Launches In Canada
Asus, LG Consider Windows Phones

Anonymous Claims Wall Street Data Dump
Hacktivist group publishes 4,000 passwords as part of Operation Last Resort campaign seeking revenge for the treatment of Internet activist Aaron Swartz.

Your First 100 Days As CIO: Must-Do Items
New CIOs should start preparing during the interview process, say two McKinsey consultants. How good are your listening skills?

SAP Plugs Profit Hole With Support Price Hike
SAP increases Standard Support maintenance contracts by 5.5% to 19% of the software's original cost each year. That could reopen old support price-hike wounds.

Cloud Implementation Costs, Complexity Surprise Companies
Business and IT leaders find integrating cloud with existing IT infrastructure is harder than they expected, says KPMG global survey.

Amazon To Give Away Millions In 'Amazon Coins'
E-commerce giant will launch its own virtual currency for Kindle Fire users in May.

Dell Goes Private: What's Next?
Dell is going private with the help of $2 billion from Microsoft. Going forward, how much will Microsoft influence operations?

Infosys Partners With Device Company In Healthcare Push
Infosys provides cloud-based portal to help NovaSom better manage sleep apnea diagnostics.

White House Seeks Tech Innovation Fellows
Program recruits innovators and entrepreneurs to work on "high impact" federal IT projects during six- to 12-month tours of duty.

Can Social Media Sell Cars?
A car dealer discusses what social media optimization means in the automotive business -- and whether it helps move vehicles off the lot.

Malone Makes U.K. Bid For Virgin Territory
U.S. cable industry veteran plans to take on Murdoch in key triple-play U.K. communications and entertainment market.

U.K. Students Not Lining Up To Study IT
New figures show sharp decline in the number of British teenagers taking up IT as a subject. The government says it has a solution, but will it come too late?

Hacking, Privacy Laws: Time To Reboot
Recent cases highlight serious flaws in current privacy and cyber abuse legislation, allowing prosecutors to wield a hammer when a stick will do.

U.S. And U.K. Show Cloud Adoption Divide
More Brits than Yanks understand cloud concepts, but more cloud projects are getting done in the U.S.

QUOTE OF THE DAY
"We may brave human laws, but we cannot resist natural ones." -- Jules Verne

ALSO SEE

Hacking, Privacy Laws: Time To Reboot
U.S. And U.K. Show Cloud Adoption Divide
IT Pro Ranking: Unified Threat Management
Checklist for Developing and Deploying in the Cloud with Agile ALM
Samsung Galaxy S IV: What To Expect
Mobile Security -- A Holistic Approach
Virtual Event: Hackers Unmasked

Download our iPad App

JOIN THE CONVERSATION
Posted By JimC:
"People I barely know have endorsed me for some skills. This recent stumble by LinkedIn might actually cause problems in that people who freely hand out endorsements feel snubbed when 'one hand doesn't wash the other.'"
In reply to: "Why Soliciting LinkedIn Endorsements Is A Bad Idea"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD DARK READING'S LATEST DIGITAL ISSUE
Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?

Also in the new, all-digital issue of Dark Reading: The shift in hacking requires a new defense mindset.

DOWNLOAD NOW FREE (Registration Required)

 


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
IT Pro Ranking: Unified Threat Management
Unified threat management appliances combine multiple security functions into a single device to provide a streamlined security infrastructure with a compelling operational cost model. IT pros who use or have used or evaluated UTM appliances assess five vendors -- Check Point Software, Cisco Systems, Dell SonicWall, HP and Juniper Networks -- on critical features such as malware detection, intrusion prevention and throughput.
Download Now (Registration Required)

Featured Report
Strategy: One-Click Disaster Recovery
Automation and orchestration are all the rage among IT architects these days. One of the best places to apply the technology is to disaster recovery. Most organizations still want a "go" button, but after that, timely recovery requires automation. Here's what you need to know to make it happen.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Checklist for Developing and Deploying in the Cloud with Agile ALM
Implemented correctly, this blueprint has been documented by organizations to increase time to market 10-70%, increase developer productivity up to 40%, and reduce IT budgets by up to 20 percent.
Download Now (Registration Required)

11 Best Practices for Peer Code Review
It's common sense that peer code review - in which software developers review each other's code before releasing software to QA - identifies bugs, encourages collaboration, and allows you to develop higher quality software. But some code review techniques are inefficient and ineffective. Download this white paper to learn about 11 best practices that will ensure your code reviews improve your code without wasting your developers' time.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
Samsung Galaxy S IV: What To Expect
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.

Anonymous Claims Wall Street Data Dump
Hacktivist group publishes 4,000 passwords as part of Operation Last Resort campaign seeking revenge for the treatment of Internet activist Aaron Swartz.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Dell Goes Private: What's Next?
Dell is going private with the help of $2 billion from Microsoft. Going forward, how much will Microsoft influence operations?

12 Best iPhone, iPad Apps Of 2012
You already know about Skype, Instagram and Angry Birds. Check out these business-friendly iPhone and iPad apps you may not have tried, plus an amusing diversion or two.

 


SLIDESHOWS
Samsung Galaxy S IV: What To Expect
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.   View Now

ALSO SEE
BlackBerry 10: Visual Tour Of Smartphones, OS
7 Portals Powering Patient Engagement

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
CES 2013: It's A Wrap!
While some claim CES has lost its luster and big name headliners over the years, the show refuses to be deemed irrelevant. With trends spanning healthcare, mobile and automotive, there was plenty to see.   Watch

ALSO WATCH
CES; the car show
Intel shows off eye tracking and gesture tech

MORE VIDEOS

spacer
 


WEBCASTS
Mobile Security -- A Holistic Approach
Managing and securing the mobile enterprise requires taking a holistic approach to defending the end-to-end scope of each mobile engagement. Security and management are highly intertwined and prerequisites to one another. Get more details during our webcast on Wednesday, February 6, 2013. More Information & Registration

Click here

 


RESOURCES AND EVENTS
Virtual Event: Hackers Unmasked
In this all-day InformationWeek and Dark Reading Virtual Event, experts and vendors will offer a detailed look at how enterprises can detect the latest malware, analyze the most current cyber attacks, and even identify and take action against the attackers. Attendees will also get a look at how cybercriminals operate, how they are motivated -- and what your business can do to stop them.
It happens Feb. 7 -- Don't Miss It!

Don't Miss Interop Las Vegas
Attend Interop Las Vegas May 6-10, and attend the most thorough training on Apple deployment at the NEW Mac & iOS IT Conference. Use Priority Code DIPR02 by Jan. 26 to save up to $500 off the price of Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies, and the latest technology.
Get More Details and Register Today

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.