Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Windows 8 Security Caveats | iPad Mini First Impressions

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Tuesday, November 06, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
iPad Mini: Hands-On First Impressions
By Eric Zeman
Apple's newest tablet boasts superior construction and easy portability, but you will find definite trade-offs with the iPad Mini.

iPad Mini Tablet: Visual Tour
Windows Phone 8: 5 BYOD Considerations

Windows 8 Security Improvements Carry Caveats
Many new Windows 8 security features were previously available standalone, or require businesses to buy in to Microsoft's server and cloud vision.

Hackers Hit Symantec, ImageShack, But Not PayPal
Despite threats, Anonymous did not take down Facebook or Zynga on Monday. But other hackers detailed their own exploits, releasing employee credentials and source code.

MobileIron Brings VPN-Like Tunnels To Mobile Security
AppConnect and AppTunnel aim to help IT secure business apps while keeping them separate from personal content in a BYOD environment.

LinkedIn: How To Take Advantage of Recent Changes
LinkedIn understands the value of a business conversation. Consider these tips to make sure you're part of it.

Social Business Leader Cemex Keeps Ideas Flowing
Under pressure to operate more efficiently after the housing bust, Cemex used social collaboration to connect its worldwide employees. One result: Products get to market faster.

OpenStack Fights Cloud Lock-In Worries
Jonathan Bryce, new OpenStack Foundation executive director, explains how the cloud project takes a democratic approach to win support for its open source work.

M2M In The Enterprise: Still 'The First Inning'
Enterprises are interested in machine-to-machine data with CRM/ERP systems, but not yet ready to implement, survey says.

"Always vote for principle, though you may vote alone, and you may cherish the sweetest reflection that your vote is never lost." -- John Quincy Adams


OpenStack Fights Cloud Lock-In Worries
M2M In The Enterprise: Still 'The First Inning'
Research: 2013 Virtualization Management Survey
BYOD: Policy Template
8 Cool Windows 8 Tablets
Service Virtualization: Real World Challenges, Real World Perspectives
E2 Innovate Conference & Expo

Download our iPad App

Posted By EllisBooker:
"While I'm sure data scientists have skills mortals like me lack, part of this shortage speaks to the relative primitiveness of the end-user tools."
In reply to: "Big Data Talent War: 7 Ways To Win"
View Entire Response | Post Your Own Reply

Posted By scottslc:
I'm obviously not an apple person, but I looked and played and still don't see the appeal. Sum: I liked the mini, if your into apple, buy one. If your not, you will love the n7."
In reply to: "iPad Mini: Hands-On First Impressions"
View Entire Response | Post Your Own Reply

  Digital Issue  
From SDN to network overlays, emerging technologies promise to reshape the data center for the age of virtualization. Also in the new, all-digital issue of Network Computing: Open Compute rethinks server design.

DOWNLOAD NOW FREE (Registration Required)


Research: 2013 Virtualization Management Survey
The next steps in going virtual up and down the stack, from network to desktop: Automation and finally taking hypervisor security seriously. The two go together, because if you're going to trust production systems to run without human intervention - a must for delivering IT services on demand - you'd better be darn sure attackers can't gain control.
Download Now (Registration Required)

Featured Report
Design on a Dime: 12-Step Plan to Cut Software Costs
Controlling nondiscretionary IT spending is a perennial top priority for CIOs, but the cost of software licensing, operations and maintenance is a particularly sore topic. Two main keys: Spend smart up front, then tightly manage enterprise software licensing and maintenance.
Download Now (Registration Required)
Featured Report


spacer spacer spacer
BYOD: Policy Template
BYOD. It doesn't have to be a four-letter word. For many of us, Bring Your Own Device can be both loved and hated. Use this "go-to" policy checklist as a starting point for helping you secure and manage your BYOD environment while enabling your users to be more productive on-the-go.
Download Now (Registration Required)

Security Gateway Buyer's Guide:
This buyer's guide, written by independent industry security expert, Gunnar Peterson, will provide the analysis and decision support that will enable you to make an informed choice. Learn about Security Gateway architectural capabilities and common business use cases where they are deployed.
Download Now (Registration Required)

8 Cool Windows 8 Tablets
As Microsoft and its hardware partners produce Windows 8 devices in droves, here's a look at some of the more noteworthy launches.

10 Wearable Health Tech Devices To Watch
Wearable medical technology is becoming a hot commodity. As these devices come to market, they have the potential to help both patients and clinicians monitor vital signs and symptoms.

Curiosity Rover Maps More Of Mars
Curiosity's rover can cover a larger area over a longer period of time than previous Mars rovers.

Windows 8 Vs. Windows RT: 8 Key Differences
With the introduction of Windows 8 and Windows RT, Microsoft splits its flagship OS into two distinct flavors. Examine the most important contrasts.

11 Cool Tools NASA Curiosity Brought To Mars
NASA's Curiosity Mars rover has a toolbox to make any gadget-lover jealous. Check out our drill-down on the instruments helping determine whether microbial life ever existed on the red planet.


Big Data Talent War: 7 Ways To Win
53% of big data-focused companies say analytics experts will be tough to find for the next two years. Here's how IT leaders plan to train, borrow, or steal talent--and what job seekers should know.   View Now

6 Reasons To Want Windows 8 Ultrabooks
10 Wearable Health Tech Devices To Watch


spacer spacer spacer
Cisco CEO John Chambers Ready For Battle
It's been a tough couple years for Cisco CEO John Chambers, but he has emerged from the struggle just as spry and confident as ever. CRN editor-at-large Chad Berndtson sits down with Chambers to talk about the competition and the future.   Watch

The Tech Industry & The Stimulus Money: Failure?
Taptera's Enterprise Mobile Application Suite



Service Virtualization: Real World Challenges, Real World Perspectives
Many leading companies are turning to Service Virtualization as a way to address application complexity in order to maximize quality, reduce risk, and speed their time to market. Join this interactive panel discussion on Wednesday, December 5, 2012, to hear how industry leaders are employing Service Virtualization as an essential part of their quality management strategy. More Information & Registration

Click here


E2 Innovate Conference & Expo
The business world is changing. Is your company ready? E2 Innovate, formerly Enterprise 2.0, is the only event of its kind, bringing strategic business professionals together with industry influencers and next-gen enterprise technologies. Register today and save $200 on current pricing or get a free expo pass. Nov. 12-15, 2012, at the Santa Clara Convention Center, Silicon Valley.
Get more details and register

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.