Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

VMware Vs. Microsoft: Next Chapter | Windows 8 Outlook Murky At Best

InformationWeek Daily
InformationWeek Daily  
  Monday, February 04, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
Between The Lines Columnist Windows 8 Outlook: Murky At Best
By Michael Endler
Based on the latest numbers, Microsoft should slash prices on both Surface RT and Windows 8 to motivate sales, some analysts say.

Microsoft Office 2013 Gains Free Bing Apps
MS Office 2013 Upgrade: 4 Points To Consider

VMware Vs. Microsoft: The Next Chapter
Microsoft has already some stolen some VMware customers and there will be more to come. But some watchers missed the early success of software-defined data center buried in VMware's Q4 numbers.

Oracle Issues Emergency Java Security Update
Oracle's Java update addresses 50 bugs, including flaws that can be used to remotely compromise a desktop or server.

Are Big Companies Ready For Cloud ERP?
Any ERP change is high risk, but CIOs will look closely at cloud options.

Why CMO Tech Spending Is Good For IT
As CMOs increase their tech spending, it's up to IT to get wise to marketing's ways.

Ship Ahoy: Inside Blueseed's 'Googleplex Of The Sea'
Blueseed's "Googleplex of the Sea" for international startups and entrepreneurs has a waitlist of more than 350 companies and 1,100 workers who want to come aboard.

BlackBerry, Samsung Super Bowl Ads: Only Semi-Successful
BlackBerry and Samsung both took humorous turns with their Super Bowl commercials, with mixed results.

10 Crucial Questions Agile Developers Should Ask Employers
Find out whether that agile development job you're interviewing for might be a nightmare in the making.

"All great change in America begins at the dinner table." -- Ronald Reagan


BlackBerry, Samsung Super Bowl Ads: Only Semi-Successful
10 Crucial Questions Agile Developers Should Ask Employers
IT Pro Ranking: Unified Threat Management
Advantages Of Wire-Free Power Monitoring
10 Best Android Apps Of 2012
Mobile Security -- A Holistic Approach
Virtual Event: Hackers Unmasked

Download our iPad App

Posted By JamesFaction:
"Far too much FUD out there about Windows 8. The truth is, Microsoft has done a really good job under the hood, and the GUI is actually good too. Get in there and upgrade already."
In reply to: "Windows 8: Why I Won't Upgrade"
View Entire Response | Post Your Own Reply

  Digital Issue  
Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?

Also in the new, all-digital issue of Dark Reading: The shift in hacking requires a new defense mindset.

DOWNLOAD NOW FREE (Registration Required)


IT Pro Ranking: Unified Threat Management
Unified threat management appliances combine multiple security functions into a single device to provide a streamlined security infrastructure with a compelling operational cost model. IT pros who use or have used or evaluated UTM appliances assess five vendors -- Check Point Software, Cisco Systems, Dell SonicWall, HP and Juniper Networks -- on critical features such as malware detection, intrusion prevention and throughput.
Download Now (Registration Required)

Featured Report
Strategy: One-Click Disaster Recovery
Automation and orchestration are all the rage among IT architects these days. One of the best places to apply the technology is to disaster recovery. Most organizations still want a "go" button, but after that, timely recovery requires automation. Here's what you need to know to make it happen.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
Advantages of Wire-Free Power Monitoring
Today's data centers measure power consumption and rack environments to minimize power usage. This white paper describes the use of intelligent rack PDUs with a wire-free sensor solution to monitor, in real time, the power consumption of specific devices and the environmental conditions at the rack.
Download Now (Registration Required)

That Dreaded Day: Active Directory Disasters and Solutions
It's a fact that Active Directory is the source of nearly all authentication and authorization in any Windows network. You'll eventually find every dependency arrow pointing towards AD services. Read this white paper to learn about the five potential Active Directory disaster scenarios that could hit your IT department, and the tools and planning you need to repair them more quickly, or prevent them altogether.
Download Now (Registration Required)

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

8 Key Changes In Microsoft SharePoint 2013
Microsoft's popular collaboration platform gets a significant revamp with SharePoint 2013. Here's what you gain.

The Dreaded Captcha: Beginning Of The End?
Ticketmaster dumps reviled security technology that forces users to decipher distorted words. Will it spark a trend?

10 Great Windows 8 Apps
Transitioning to Windows 8 isn't easy, but these apps can help.

20 Great Ideas To Steal In 2012
Are you playing it too safe, IT leaders? Take these InformationWeek 500 projects along to rev up your next brainstorming session.


BlackBerry 10: Visual Tour Of Smartphones, OS
RIM rebrands itself as BlackBerry and unveils a new operating system and two new smartphones. Take a closer look at the company's last hope of regaining mobile glory.   View Now

7 Portals Powering Patient Engagement
9 Bandwidth Hogs: Reality Vs. Myth


spacer spacer spacer
CES 2013: It's A Wrap!
While some claim CES has lost its luster and big name headliners over the years, the show refuses to be deemed irrelevant. With trends spanning healthcare, mobile and automotive, there was plenty to see.   Watch

CES; the car show
Intel shows off eye tracking and gesture tech



Mobile Security -- A Holistic Approach
Managing and securing the mobile enterprise requires taking a holistic approach to defending the end-to-end scope of each mobile engagement. Security and management are highly intertwined and prerequisites to one another. Get more details during our webcast on Wednesday, February 6, 2013. More Information & Registration

Click here


Virtual Event: Hackers Unmasked
In this all-day InformationWeek and Dark Reading Virtual Event, experts and vendors will offer a detailed look at how enterprises can detect the latest malware, analyze the most current cyber attacks, and even identify and take action against the attackers. Attendees will also get a look at how cybercriminals operate, how they are motivated -- and what your business can do to stop them.
It happens Feb. 7 -- Don't Miss It!

Don't Miss Interop Las Vegas
Attend Interop Las Vegas May 6-10, and attend the most thorough training on Apple deployment at the NEW Mac & iOS IT Conference. Use Priority Code DIPR02 by Jan. 26 to save up to $500 off the price of Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies, and the latest technology.
Get More Details and Register Today

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.