Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Twitter Downplays Breach | VMware CTO: Data Center Future

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Wednesday, May 9, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
Between The Lines Columnist VMware CTO: Software-Defined Data Centers Are Future
By Charles Babcock
VMware CTO Steve Herrod predicts that all data center resources will be virtualized and governed by a unified console.

Zynga CTO: How To Win Hybrid Cloud Game
Best of Interop 2012: Award Winners

Twitter Downplays Breach That Exposed Passwords
Nearly 60,000 Twitter usernames and passwords released via Pastebin, but social networking service says half are for blocked spam accounts or duplicates.

Q&A: Google's Jonathan Rochelle Talks Enterprise Strategy
Google Apps group product manager Jonathan Rochelle goes one-on-one with InformationWeek's Paul McDougall at Interop 2012.

Flashback Shows Need For Better Botnet Measurements
The wide ranges of infection estimates on the Flashback botnet for Macs showed that gauging the size of a botnet is less a science than an art. The security community says this must improve.

Health Insurers Proceed On IT Aspects Of 'Obamacare'
Regardless of the Supreme Court's decision on the Affordable Care Act, health plans likely will implement the technology needed to meet its objectives, predicts one prominent IT consultant.

Plantronics Aims To Build A Smarter Headset
If social and mobile are just steps down the road to contextual applications, Plantronics figures intelligence built into headsets can help pave the way.

Army Eyes Monitoring Tools To Stop WikiLeaks Repeat
Keystroke monitoring may be just a start as Army seeks ways to sift through soldiers' website visits, search queries, and other work, watching for abnormal behavior and trying to stop inside attacks.

"The best cure for the body is a quiet mind." -- Napoleon


Plantronics Aims To Build A Smarter Headset
Army Eyes Monitoring Tools To Stop WikiLeaks Repeat
2012 Strategic Security Survey: Pick The Right Battles
How to Build a Private Cloud
Google Copied Java, Jury Says; Fair Use Question Open
Does America's Next "Road to Prosperity" lie in Rural Sourcing?
InformationWeek IPv6 Survey

InformationWeek Special Report: Interop 2012: Show News, Buzz, Videos and More!

Posted By Sensi:
"Java was open source and Google's Android work with it sanctionned by Sun Microsystem, the authors. That you choose to side with the obvious and shameless copyright/patent troll in this case is ludicrous."
In reply to: "Google Copied Java, Jury Says; Fair Use Question Open"
View Entire Response | Post Your Own Reply

  Digital Issue  
From clouds to mobile to software development, threats may be everywhere, but they're not equally dangerous. Our new, all-digital issue of InformationWeek will help you prioritize.

ALSO THIS ISSUE: IT must decide how to deal with consumer cloud storage being used in businesses.

DOWNLOAD NOW FREE (Registration Required)


2012 Strategic Security Survey: Pick The Right Battles
Whether it's cloud computing, mobile devices, or insecure software, some threats are more prevalent than others. Our latest survey delves into where security pros are putting their resources.
Download Now (Registration Required)

Featured Report
Infor Reinvented: Enterprise Software's 'Biggest Startup'
Charles Phillips reintroduces Infor after a 16-month transformation that has yielded a newly aggressive apps vendor some now call 'Inforacle.'
Download Now (Registration Required)
Featured Report


spacer spacer spacer
How to Build a Private Cloud
Senior IT pro and evangelist Chris Henley provides an overview of the private cloud in this video, explains why organizations would want a private cloud and reveals how to build a private cloud.
Download Now (Registration Required)

7 Simple Truths About Tiering Your Data
Dealing with the explosion of extreme data means more than containing it all. It's about determining what data is most useful to your business and where "speed meets need." Learn how you can use data tiering to transform unstructured data into "content" while keeping protection high and costs low.
Download Now (Registration Required)

Google Copied Java, Jury Says; Fair Use Question Open
Judge Alsup rejects Oracle counsel David Boies' claim for "infringer's profits" from nine copied lines of Java code as "bordering on the ridiculous."

Best of Interop 2012: Award Winners
What innovative technology product earned the coveted Best of Interop award for 2012? Get the lowdown on all of this year's winners and why they're compelling for enterprise IT.

Microsoft 'Smoked By Windows Phone': The Real Story
Microsoft says its Smoked By Windows Phone challenge has been taken more than 50,000 times and has a win rate of 98%. Too bad Microsoft is ignoring the bottom line.

10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.

Google+ Hangouts On Air: Broadcasting For All
Users of Google+ can now host live video events for as many viewers as they can attract.


Best of Interop 2012: Award Winners
What innovative technology product earned the coveted Best of Interop award for 2012? Get the lowdown on all of this year's winners and why they're compelling for enterprise IT.   View Now

Interop 2012 Preview: 12 Cool Products
Amazon's 7 Cloud Promises: Hype Vs. Reality


spacer spacer spacer

Does America's Next "Road to Prosperity" lie in Rural Sourcing?
The global economy has driven business out of America with small towns greatly impacted. At the same time, companies are finding that the quality of outsourcing their IT and development to other countries is lacking. A solution has emerged that solves both issues: rural sourcing. We discuss this trend and its benefits. It happens Tuesday, May 22, 2012. More Information & Registration

Click here


InformationWeek IPv6 Survey
InformationWeek is conducting a survey to get a baseline look at where enterprises stand on their IPv6 deployments, with a focus on problem areas, including security, training, budget, and readiness. Upon completion of our survey, you will be eligible to enter a drawing to receive an 16-GB Apple iPad.
Survey Ends May 11

Virtual Event: Enterprise Mobility: New Devices, Applications, Platforms, And Priorities
At this interactive event, experts and solution providers will offer detailed insight into how to bring some order to the mobile industry innovation chaos. When you register, you will gain access to live webcast presentations and virtual booths packed with free resources.
It happens May 17

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.