Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

UK Police Want BlackBerry Data | Amazon Outage: Lessons Learned

InformationWeek Daily
InformationWeek Daily  
  Tuesday, August 9, 2011
Between The Lines ColumnistAmazon Cloud Outage: What Can Be Learned?
By Charles Babcock
Primary and backup power systems fail when lightning strikes EC2 data center in Dublin. Could customers have braced for this unusual event?

Amazon Web Services Enables Private Cloud Connections
Cloud Computing Services: Feds Get On The Bandwagon

U.K. Police Seek BlackBerry Messages Following Riots
BlackBerry maker Research In Motion has offered to help the police with their investigation, but has not specified what data will be shared.

IBM, NCSA Scrap Petaflop Supercomputer Plans
Contract to build a 1-petaflop system for the Blue Waters project terminated, with IBM citing unexpected costs.

State Department, Auditors Clash On IT Security Monitoring
GAO says the department's iPost risk-scoring program doesn't handle non-Windows systems or sufficiently detail vulnerabilities, and fails to reflect the impact and likelihood of threats.

An SMB Steps Up To Marketing Automation
Omnipress adapts its sales approach to changing business conditions by streamlining how it captures and manages leads on its website.

Expectations Rise For Government Agency CIOs
Steven VanRoekel, in his first blog as U.S. CIO, outlines expanded accountability for agency IT heads in achieving cost savings and reform goals.

21st Century Automation: What's It Mean For IT Staffing?
Companies are operating leaner and hiring less, but IT pros gifted in analytics, workflow re-engineering, and other areas are in greater demand.

SSL Certificates May Offer False Sense Of Trust
Researcher points to fundamental problems in SSL and DNSSEC, and says it's time for users to take control of trust.

There are two ways of spreading light: to be the candle or the mirror that reflects it. -- Edith Wharton


21st Century Automation: What's It Mean For IT Staffing?
SSL Certificates May Offer False Sense Of Trust
Database Breaches: Lessons Learned From Real-World Attacks
Four Steps to Better Application Management and Deployment
Windows Phones Down 38% Since '7' Launch
Building an Enterprisewide Data Archiving Strategy
Virtual Event: SIP Trunking -- Making It Happen

Posted By melgross:
"A couple of companies will attempt to make them for less, and without the expensive machined case that Apple uses, they will save a bit. But we can also be sure that those manufacturers will be making just a sliver of profit."
In reply to: HP TouchPad Starting Tablet Price Wars?
View Entire Response | Post Your Own Reply

Posted By ealmer210:
"Hardware encrypted drives are one option, but one that is again voluntary - if you do not have an endpoint data protection agent in place, anybody can connect a non encrypted drive."
In reply to: How USB Sticks Cause Data Breach, Malware Woes
View Entire Response | Post Your Own Reply

Database Breaches: Lessons Learned From Real-World Attacks
In this Tech Center report, we profile five database breaches--and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk.
Download Now (Registration Required)
Featured Report

State Of Storage 2011 Report: Consolidation And Centralization
Download this report to see how smart CIOs will accelerate this trend by adopting new multipurpose arrays and converged networks.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
Four Steps to Better Application Management and Deployment
Application management and deployment are only getting more difficult. Applications are complex and error prone to deploy because each application makes unique requirements on the underlying IT environment supporting it. Download this white paper to discover four steps to automate application management and deployment and learn how to deploy application operations for your business users whether they are in traditional, virtualized, or cloud environments.
Download Now (Registration Required)

Top Three reasons ITIL is essential to the cloud
Cloud computing and hybrid delivery models promise to help IT seamlessly integrate services. But when services are both in- and out-sourced, the emphasis on service levels, trust, security, and the user experience becomes critical. Discover how, in hybrid environments, ITIL v3 and service lifecycle management help avoid cloud sprawl and chaos, minimize the risk of service disruption, and maximize user satisfaction.
Download Now (Registration Required)


Windows Phones Down 38% Since '7' Launch
Microsoft’s smartphone platform may be irrelevant before Mango update and Nokia devices arrive.

Mobile Malware: Protect Yourself Against Evolving Threats
Android users are now 2 1/2 times more likely to encounter malware than a mere six months ago, a report finds.

Apple iOS 5 Beta Hints At Voice Commands
A beta version of iOS 5 released to developers over the weekend contains mostly bug fixes, but a few new features have been spied.

HP TouchPad Starting Tablet Price Wars?
Two price drops last week on HP's tablet, plus the impending arrival of Amazon's tablet, point to falling price tags. But much more mobile disruption lies ahead in the next few months.

RIM CIO Adds A Huge Job In Management Shakeup
CIO Robin Bienfait gets a critical role in keeping business customers from defecting from the BlackBerry.



11 iPad Apps For Better Collaboration The Apple iPad's inherent mobility makes it an obvious weapon for efficient enterprise collaboration--provided you're armed with the right apps.   View Now

Mozilla's Web-Only Operating System Layer
7 Hottest Features In Windows Phone 7 Mango


spacer spacer spacer
Citrix NetScaler: Working with Intel and Microsoft Solutions
Citrix Systems Engineer, Mark Borrow, demonstrates Citrix NetScaler with Intel at Microsoft TechEd 2011.   Watch

Tutorial: GreenProcurement Guide
Tutorial: Reduce Your Printing Footprint



Building an Enterprisewide Data Archiving Strategy
Join us as we discuss the best practices for controlling expanding data growth through effective data archiving strategy, significantly improving application performance, mitigating the risks associated with growing data volumes, and reducing the cost of servers and storage. It happens Wednesday, August 17, 2011 -- Time: 11:00 am PT / 2:00 pm ET More Information & Registration

Click here


Virtual Event: SIP Trunking -- Making It Happen
In this virtual event from Enterprise Connect, you'll meet the industry's leading experts on carrier service offerings and SIP trunking. Their in-depth analysis will ensure you capture the much-touted benefits that SIP trunking offers while avoiding the pitfalls.
It happens Aug. 17

Take Our VMware vSphere 5 Survey
InformationWeek Analytics is conducting a survey on virtualization and enterprise plans for vSphere.
Survey ends Aug. 12

This e-mail was sent to %%email%%
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.