Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security ROI: 5 Practices Judged | Tablet Business Use Cases Multiply

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Wednesday, June 19, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist The Good And Bad Of Tablets At Work
By Michael Endler
From stakeouts to burger orders, tablets are taking charge. And Windows 8 could add even more use cases.

RELATED
Tablet Buying Demystified: 10 Tips
Apple iOS 7's Dramatic Design: Visual Tour

Security ROI: 5 Practices Analyzed
Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.

HTC Butterfly S Boasts Big Screen, Big Battery
Butterfly S smartphone steals features from the popular HTC One.

VMware Fights Rival Amazon With 'Cloud Credits'
VMware says pre-paying for hybrid cloud services gives customers more control over "rogue IT spend," hopes it will keep them in the VMware fold.

Mobile Boom Means More Work For IT
IT will become more active in mobile development and management as the number of mobile device users doubles in the next five years.

In-Q-Tel Bets On 3 Hot Technologies
Intelligence community's investment arm taps artificial intelligence company to turn data into narratives, also invests in flash storage.

Teambox Adds Free Video Chat
Social collaboration platform steps into WebEx and GoTo Meeting's turf with affordable video chat option.

How Office 365 Pays Off For Two SMBs
Microsoft Office faces more competitors than ever, but Office 365 gives it a leg up with the SMB market seeking to cut costs and improve collaboration.

With Online Connections, Appearances Can Deceive
Are we visually biased when dealing with LinkedIn invitations from strangers? I'm selective, but I had a recent reminder to watch for red flags.


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Research: Data Center Decision Time
Does managing your own data center help or hinder? We'll explore this question while analyzing results of our State of the Data Center Survey of 216 business technology professionals involved with management or decision-making at organizations with data centers 1,000 sq. ft. or larger.
Download Now (Registration Required)

Featured Report
Building And Enforcing An Endpoint Security Strategy
In this report, we examine the challenges of endpoint security and recommend the steps organizations should take toward developing a security strategy that is both effective and practical.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Cloud Storage: Lower Cost and Increase Uptime
Download this white paper to learn how your peers are benefiting from cloud storage with decreased downtime, lower costs and more.
Download Now (Registration Required)

BYOD: Focus on the User Experience Not the Device
The evolution of devices, integration of technology into personal lives, availability of cloud-based services and wireless evolution has moved bring-your-own-device (BYOD) from vision to reality. This report examines these risks and the benefits of BYOD.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
Boston Bombers Can't Elude City's Tech Infrastructure
Video surveillance played a key role in identifying the suspects in the tragic Boston Marathon bombing, setting a precedent for increasing use of sophisticated security IT systems nationwide.

Windows 8.1: 10 Surprise Benefits
Windows 8.1 does a lot more than bring back the Start button. These 10 features may give it a much-needed popularity boost with enterprise users.

10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

Big Data Analytics Master's Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

4 Reasons PC Market Won't Rebound
PCs aren't dead, but laptops and desktops have seen their best days.

 


SLIDESHOWS
10 Tools To Beat Email Overload
New tools and services promise to help you put more love into your love-hate relationship with email. We check out the contenders.   View Now

ALSO SEE
Windows 8.1: 10 Surprise Benefits
Apple iOS 7's Dramatic Design: Visual Tour

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
Bob Metcalfe Plans Ethernet's 40th
The 'Father of Ethernet' comes back to PARC, the scene of the crime, to talk about Ethernet's future -- including a 40th birthday bash in May.   Watch

ALSO WATCH
CES 2013: It's A Wrap!
CES; the car show

MORE VIDEOS

spacer
 


WEBCASTS
Accelerate Agility Now: WebSphere Application Server v8.5.5 Overview
Learn more about the benefits of WebSphere Application Server v8.5 and v8.5.5 (WAS) and the impressive set of features and functions available, including what's new in the latest release by attending this June 24th webinar. More Information & Registration

Click here

 


RESOURCES AND EVENTS
Take Our Cloud Security And Risk Survey
InformationWeek is conducting a survey to gauge IT's concerns about public cloud security and reliability. Eligible participants will be entered into a drawing to win a 32GB Nexus 7 tablet.
Survey ends June 21

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.