Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

5 Ways To Fail Fast, Save Big | Amazon Big Data Service

InformationWeek Daily
InformationWeek Daily  
  Thursday, Jan 19, 2012
REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  
MUST READ
Between The Lines ColumnistAmazon Dynamo DB: Big Data's Big Cloud Moment
By Doug Henschen
Amazon's DynamoDB promises a database service fit even for Internet-scale companies with huge data sets. Whether big data players will give up servers comes down to economics and flexibility.

RELATED
Amazon Launches Big Data Service
Amazon Unveils Windows Server Free Trial

5 Strategies To Fail Fast On IT Projects
Failing fast can can save your organization millions of dollars, but it isn't easy to do.

TD Bank's Social Strategy: Start Small, Think Big
The bank's ambitious enterprise social networking plans started with a simple initiative that has already boosted productivity dramatically.

Oracle Scorned For Paltry Database Patches
With only two of many reported vulnerabilities fixed in Oracle's latest update, the database security community questions Oracle's patch bottleneck.

10 Questions Before Choosing An Internal Social Network Platform
What's the best internal social technology for your business? Consider these points as you evaluate enterprise social media vendors.

Facebook Users Hit By Money-Grubbing Malware
Carberp Trojan malware attempts to steal money by duping the user into divulging an e-cash voucher.

Google's Growth Path: 6 Challenges
As Google prepares to report its fourth-quarter 2011 earnings, some industry-watchers see obstacles ahead. Consider these six hurdles.

10 Government Ideas To Spur Innovation
More investment in basic research, STEM education, and entrepreneurship "clusters" are among the proposals in a 160-page Commerce Department report.

QUOTE OF THE DAY
A cause may be inconvenient, but it's magnificent. It's like champagne or high heels, and one must be prepared to suffer for it. -- Arnold Bennett

ALSO SEE

Google's Growth Path: 6 Challenges
10 Government Ideas To Spur Innovation
IT Pro Impact: Windows Developer Road Map
Choosing the Right Authentication Strategy
iPhone Wins Back Android Losses
Maximize ROI with Database Consolidation onto Private Clouds
We're Accepting Nominations For The InformationWeek 500

JOIN THE CONVERSATION
Posted By HoldenMonaro:
"It appears to me that instead of taking market share from android, apple is instead picking up the scraps left over from RIM & others."
In reply to: "iPhone Wins Back Android Losses"
View Entire Response | Post Your Own Reply

Posted By cxf:
"Content authors already have the civil and criminal remedies they need through existing piracy laws. I'm reminded by this with every copyrighted DVD I watch."
In reply to: "SOPA: 10 Key Facts About Piracy Bill"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD OUR JANUARY 16th DIGITAL SUPPLEMENT
THIS EDITION: Secure Mobile Apps
More than 700 IT pros gave us an earful on database licensing, performance, NoSQL, and more. That story and more--including a look at transitioning to Win 8--in our latest all-digital issue of InformationWeek.

DOWNLOAD NOW (Registration Required)

 


 
ANALYTICS & WHITEPAPERS
FEATURED REPORTS
IT Pro Impact: Windows Developer Road Map
Ready to catch the Metro? Windows 8 is a major shift, with features borrowed from desktop gadgets and mobile devices, and it brings a slew of new paradigms for developers. Here's what you need to know.
Download Now (Registration Required)

Featured Report
Research: Physical and Logical Security Convergence
As employees become more dispersed, physical security measures need to evolve and merge with logical controls. But our trending shows a stunning dearth of innovation and investment in technologies, as well as a lack of integration with SEIM systems. In this report, we'll shed light on this often overlooked but important part of any security posture.
Download Now (Registration Required)
Featured Report

MORE ANALYTICS

spacer spacer spacer
FEATURED WHITEPAPERS
Choosing the Right Authentication Strategy
A complex maze of heterogeneous IT systems are being exposed to a world of sophisticated and aggressive criminal attacks. Today, passwords may not be enough to protect your critical services and sensitive data, or your customers' privacy and credentials. In this Dark Reading Tech Center report, we explain how to choose the right authentication technologies based on risk management, overhead and cost.
Download Now (Registration Required)

How to Make the Case for Strong Authentication
With today's threat landscape and the increased value placed on the information created and stored, systems that rely on static passwords for security are left vulnerable and at high risk of being breached. This paper examines the need for strong authentication and explores the return on investment in order to help organizations make an informed decision when contemplating their strategic move toward more effective security.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
iPhone Wins Back Android Losses
Newest figures from Nielsen show that Apple's iPhone 4S, which launched in October, grabbed back marketshare during the fourth quarter of 2011.

Microsoft Makes Cloud Management Move On VMware
New System Center suite, due in first half of 2012, centrally manages Windows Server in the data center plus future workloads in private clouds and Windows Azure public cloud. Can features, licensing tweaks lure VMware users?

Iran Hacked GPS Signals To Capture U.S. Drone
Exploit of well-known bug in drone's software made it think it was landing at an American airfield, not 140 miles inside Iran.

Supercomputer Cools Off Using Groundwater
Novel cooling system turns normal groundwater into big savings for Pacific Northwest National Laboratory, which is running a new 162 teraflop supercomputer, Olympus.

Can Anonymous Cripple Critical U.S. Infrastructure?
Homeland Security says Anonymous can cause DDoS attacks, but says chance of attack on scale of Stuxnet is slim.

 


SLIDESHOWS
8 Cool Smartphones At CES
Among the smartphone twists at this year's CES, we saw sleeker designs, added durability, 3D capability--and even phones that go underwater.   View Now

ALSO SEE
12 Enterprise IT Resolutions For 2012
10 Innovative Clinical Decision Support Programs

MORE SLIDESHOWS

spacer spacer spacer
spacer
 


WEBCASTS
Maximize ROI with Database Consolidation onto Private Clouds
Join Oracle experts Willie Hardie and Mark Townsend as they explain the business case for a private database cloud and describe the architectures that best suit your business and IT requirements. It happens Thursday, January 26, 2012 -- Time: 10:00 AM PT / 1:00 PM ET More Information & Registration

Click here

 


RESOURCES AND EVENTS
We're Accepting Nominations For The InformationWeek 500
Nominate your company for the 2012 InformationWeek 500 -- our 24rd annual ranking of the nation's very best business technology innovators. Organizations with $250 million or more in revenue may apply now!
Deadline is April 27 -- Don't Miss It!

State of Enterprise Storage Survey
InformationWeek is conducting our third annual State of Enterprise Storage survey on data management technologies and strategies. Upon completion, you will be eligible to enter a drawing to receive an Apple 32-GB iPod Touch.
Survey ends Jan. 13


This e-mail was sent to EmailAddress
INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.