Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Nate Silver's IT Lessons | Twitter Password Reset: 5 Facts

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Friday, November 09, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist Twitter Password Security: 5 Things To Know
By Debra Donston-Miller
Twitter's response to compromised accounts teaches us lessons in social (networking) security.

RELATED
Google Chrome Adds 'Do Not Track'
4 Long-Term Hacks That Shocked In 2012

Nate Silver's Big Data Lessons For The Enterprise
Big data analytics have proven their mettle in predicting baseball and election success. How can you make them work for your business?

Project Management Offices: A Waste Of Money?
The risks of starting a PMO have never been greater, new research shows. After years of observing project management, I agree.

VMware Does Complicated Dance With Open Source
Now that VMware owns Nicira, how will Nicira continue to lead development of virtual networking in OpenStack? Nicira founder Martin Casado explains.

Health IT: How Not To Get Hired
Brains aren't enough to land that dream job. Humility and a willingness to learn are just as crucial.

Apple, Foxconn Labor Promises Questioned
Report on Foxconn working conditions at Apple facilities is criticized for being overly rosy.

QUOTE OF THE DAY
"If you're going through hell, keep going." -- Winston Churchill

ALSO SEE

Health IT: How Not To Get Hired
Apple, Foxconn Labor Promises Questioned
Research: 2013 Virtualization Management Survey
Smart Devices, Smart Security
8 Cool Windows 8 Tablets
Data-Centric Security In A Mobile World
E2 Innovate Conference & Expo

Download our iPad App

JOIN THE CONVERSATION
Posted By FritzNelson:
"I wonder really how much capacity today's typical corporate wireless LAN is consuming anyway. I'm betting there's still a decent amount of headroom there."
In reply to: "Tablets Cause Wi-Fi Stress: Truth And Fiction"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD NETWORK COMPUTING'S LATEST DIGITAL ISSUE
From SDN to network overlays, emerging technologies promise to reshape the data center for the age of virtualization. Also in the new, all-digital issue of Network Computing: Open Compute rethinks server design.

DOWNLOAD NOW FREE (Registration Required)

 


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Research: 2013 Virtualization Management Survey
The next steps in going virtual up and down the stack, from network to desktop: Automation and finally taking hypervisor security seriously. The two go together, because if you're going to trust production systems to run without human intervention - a must for delivering IT services on demand - you'd better be darn sure attackers can't gain control.
Download Now (Registration Required)

Featured Report
Design on a Dime: 12-Step Plan to Cut Software Costs
Controlling nondiscretionary IT spending is a perennial top priority for CIOs, but the cost of software licensing, operations and maintenance is a particularly sore topic. Two main keys: Spend smart up front, then tightly manage enterprise software licensing and maintenance.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Smart Devices, Smart Security
Once mostly prohibited by IT, smartphones and tablets are now being used by hundreds of millions of employees worldwide. Learn more about the new challenges and complexities for IT in this extended enterprise.
Download Now (Registration Required)

The Reasons CMDBs Don't Work
There is no shortage of reasons why CMDB initiatives fail. A lack of trust in the data, the time consuming nature of these projects, and the inability of end users to see their value are frequently cited. Discover how the features of a revolutionary, cloud approach compare to a traditional CMDB and learn how it can handle complex IT environments and improve change, incident, and asset management.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
8 Cool Windows 8 Tablets
As Microsoft and its hardware partners produce Windows 8 devices in droves, here's a look at some of the more noteworthy launches.

Samsung Galaxy Note II: Visual Tour
Samsung's Galaxy Note II is big for a phone, but small for a tablet. Take a closer look at the interesting features that set it apart.

Microsoft Office For Android, iOS In The Works
Microsoft may bring limited Office functionality to Android and iOS smartphones and tablets in 2013.

Windows 8 Vs. Windows RT: 8 Key Differences
With the introduction of Windows 8 and Windows RT, Microsoft splits its flagship OS into two distinct flavors. Examine the most important contrasts.

10 Best Apps For Samsung Galaxy Notes
Check out these 10 great apps that take advantage of the Samsung phablet's S Pen stylus.



 


SLIDESHOWS
6 Healthcare Revenue Cycle Management Systems To Watch
Healthcare professionals look to the latest RCM platforms to help them process patients efficiently while satisfying new regulations. We compare choices in this critical category.   View Now

ALSO SEE
5 Healthcare Tools To Boost Patient Involvement
Samsung Galaxy Note II: Visual Tour

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
Taptera's Enterprise Mobile Application Suite
Taptera CEO and Co-Founder Chris O'Connor gives the Valley View judges his elevator pitch, talking about how his company is creating useful applications for employees, and a secure infrastructure that CIOs will like.   Watch

ALSO WATCH
Cisco CEO John Chambers Ready For Battle
Alteryx: Big Data Analytics For Mere Mortals

MORE VIDEOS

spacer
 


WEBCASTS
Data-Centric Security In A Mobile World
In this Webcast, consultant Michael Davis will discuss the results of our InformationWeek 2012 Mobile Security Survey and outline the steps necessary to protect data on mobile devices: a unified policy; enforcement of the rules through use of technology such as encryption of sensitive assets; and education of end users and IT pros. It happens Tuesday, November 13, 2012. More Information & Registration

Click here

 


RESOURCES AND EVENTS
E2 Innovate Conference & Expo
The business world is changing. Is your company ready? E2 Innovate, formerly Enterprise 2.0, is the only event of its kind, bringing strategic business professionals together with industry influencers and next-gen enterprise technologies. Register today and save $200 on current pricing or get a free expo pass. Nov. 12-15, 2012, at the Santa Clara Convention Center, Silicon Valley.
Get more details and register

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.