MUST READ Intel Ivy Bridge: What Enterprise IT Gains By Art Wittmann ARM will own the smartphone market, Intel will own the desktop and high-end laptop market, and the space in between the two will likely become more confused. RELATED • Intel Ships 13 Ivy Bridge Processors• Intel Makes 3-D Transistors Reality Windows 8 Release Preview Set For June Microsoft announcement sparks speculation that final version of Windows 8 may ship as early as October. Google Challenges Oracle Copyright Claim Judge will decide the issue of API copyrights, a turn of events that improves Google's position. But not everything went Google's way on Monday. Oracle Overhauls JD Edwards ERP Applications Oracle adds productivity, reporting, and compliance updates to a portfolio that has already seen sweeping changes during the past year. Microsoft System Center 2012 Focuses On Private Cloud Microsoft expands its role in the data center with private cloud management tools, new cross-hypervisor management capabilities. iPhone Sales Crush The Competition At AT&T Apple's iPhone outsold other smartphones nearly 4-to-1 during AT&T's first quarter. The company activated a total of 5.5 million smartphones, boosting smartphone subscribership to nearly 60%. U.S. Suspends Controversial Outsourcing Training ProgramFunding stopped for USAID program that trained students in the Philippines to work in offshore, English language call centers serving U.S. companies. How The Enterprise 2.0 Managerial Model Was Born In this first of a three-part series, we explore the evolution of Management For Opportunity. How did "manager" become a dirty word? Hitachi Launches Mid-Range Unified Storage Systems Hitachi Unified System handles files, block- and object-based storage, can scale up to 3 PB, and uses a single namespace to simplify management and provide quick provisioning for virtual machines.
QUOTE OF THE DAYHe knows not his own strength that has not met adversity. -- Ben Jonson ALSO SEE Don't forget to catch today's episode of Valley View, our live Web TV show, at 4 pm PT/7 pm ET. We've got a great line-up:
• Zynga CTO Allan Leinwand
• Hands-on technology demonstrations from DataSift and Proton Media
• A unique look at the latest from ARM at the Valley View Whiteboard
• Prize giveaways and much more!
Register to win prizes and Watch the show live
| || | DOWNLOAD INFORMATIONWEEK GOVERNMENT'S DIGITAL ISSUE Hacktivist and cybercriminal threats concern IT teams most, our first Federal Government Cybersecurity Survey reveals. Here's how they're fighting back.
Also: Why federal efforts to cut IT costs don't go far enough, and how the State Department is enhancing security. DOWNLOAD NOW FREE (Registration Required)
REPORTS & WHITEPAPERS
FEATURED WHITEPAPERS How to Secure Mobility in an Increasingly Remote Workforce In 2010, more than 26 million Americans, or nearly 20 percent of the U.S. workforce, worked from home or remotely for an entire day at least once a month, according to Telework 2011. These statistics make it clear: A good chunk of our workforce has more than one office. Download this white paper to understand the advantages of connecting remotely while maintaining the correct levels of security and governance.
Download Now (Registration Required) DB2 10 for z/OS- Cost Savings Right Out of the Box DB2 10 is the most significant release IBM has shipped in more than a decade. The objective of this book is to give you not only an update on the latest functions, features, and benefits but also to provide you with valuable information from key members of the IBM DB2 for z/OS community.
Download Now (Registration Required)
MOST POPULAR NEWS
10 Essential Android Apps For SMBs
No glitz, no glamour, just results: These 10 budget-friendly Android apps help SMB users simplify everyday tasks and power through to-do lists.
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
Oracle Vs. Google: Tour The Evidence
Oracle and Google continue to fight a nasty courtroom battle over patent and copyright claims involving Java and mobile phones. Consider some of the crucial evidence introduced so far.
Google Continues Product Purge
Google shutters Patent Search, Flu Vaccine Finder, and Google Related in ongoing trimming of services.
Big Data Talent War: 10 Analytics Job Trends
A gap is emerging among data-savvy professionals, with big-data-analysis and predictive skills trumping routine business-intelligence and information-management talents.
Does America's Next "Road to Prosperity" lie in Rural Sourcing? The global economy has driven business out of America. In small towns, this tends to be a matter of life or death for their internal economy. At the same time, companies are finding that the quality of outsourcing their IT and development to other countries is lacking. A solution has emerged that solves both issues, rural sourcing. We discuss this trend and how it benefits the individual, America and businesses. It happens Tuesday, May 22, 2012. More Information & Registration | |
RESOURCES AND EVENTS