Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Dell's Virtual Desktop Twist | Cloud Governance Myths

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Monday, May 7, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist Governance Meets Cloud: Top Misconceptions
By Beth Stackpole
While cloud computing takes some IT responsibilities off of your plate, governance isn't one of them. Experts say you still need to do the heavy lifting to ensure strong security and access policies.

RELATED
4 Keys To Hybrid Cloud Planning
5 Tips For Negotiating Cloud Software SLAs

Dell Delivers Desktop-as-a-Service
Dell partners with Desktone to become a direct supplier of virtual desktops. Here's how this twist on desktop virtualization differs from Citrix XenDesktop and VMware View.

If Apple Walls Garden, IT Should Demand Keys
Here's how and why IT must influence Apple and its smaller competitors to share a key to the walled garden coming to a desktop near you.

10 Lessons From Leading Government CIOs
Under extreme budget pressure, federal IT leaders adopt shared services and build mobile app stores as they shift dollars where most needed.

Huawei Gunning For Cisco, HP, Dell, And Friends
Chinese networking giant introduces new products, partnership at Interop, aiming for a larger piece of the U.S. enterprise infrastructure market.

The Fall Of The Messiah Leader
Many CEOs create an illusion of control, but heroic, charismatic leadership in the context of large public companies is mostly a myth.

5 Tips: Get Strong IT Job References
What can you do to ensure that references don't sink your IT job search effort? Consider these tips from an insider.

2012 Strategic Security Survey: Pick The Right Battles
Whether it's cloud computing, mobile devices, or insecure software, some threats are more prevalent than others. Our latest survey delves into where security pros are putting their resources.

QUOTE OF THE DAY
"Political correctness is tyranny with manners." -- Charlton Heston

ALSO SEE

4 Keys To Hybrid Cloud Planning
5 Tips For Negotiating Cloud Software SLAs
2012 Strategic Security Survey: Pick The Right Battles
China Telecom Introduces Cloud Services Platform in Just Six Months
10 Massive Security Breaches
Does America's Next "Road to Prosperity" lie in Rural Sourcing?
InformationWeek IPv6 Survey

Download our iPad App

JOIN THE CONVERSATION
Posted By jhkjhk:
"I see nothing that makes me look forward to Windows 8."
In reply to: "Windows 8 OS: 8 New Must-Know Facts"
View Entire Response | Post Your Own Reply

Posted By TimBee:
"If they can come up with some app that works 10Xs better on their multitasking OS than on Apple and Android OSes, they can be the product to own again."
In reply to: "RIM Empire Didn't Strike Back At BlackBerry World"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD INFORMATIONWEEK'S MAY 8th DIGITAL ISSUE
From clouds to mobile to software development, threats may be everywhere, but they're not equally dangerous. Our new, all-digital issue of InformationWeek will help you prioritize.

ALSO THIS ISSUE: IT must decide how to deal with consumer cloud storage being used in businesses.

DOWNLOAD NOW FREE (Registration Required)

 


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
2012 Strategic Security Survey: Pick The Right Battles
Whether it's cloud computing, mobile devices, or insecure software, some threats are more prevalent than others. Our latest survey delves into where security pros are putting their resources.
Download Now (Registration Required)

Featured Report
Infor Reinvented: Enterprise Software's 'Biggest Startup'
Charles Phillips reintroduces Infor after a 16-month transformation that has yielded a newly aggressive apps vendor some now call 'Inforacle.'
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
China Telecom Introduces Cloud Services Platform in Just Six Months
The role of telecom operators is evolving and expanding to include voice and data traffic, entertainment channels such as movies and television, and IT services such as hosting business applications. China Telecom has been at the forefront of this transformation. Read this study to find out how to deal with challenges such as expanding IT services and revenues.
Download Now (Registration Required)

Improve Service, Reduce Costs and Manage Risks with a Dynamic Infrastructure
As instrumentation and interconnectivity accelerate, the demand for greater accessibility and availability rises as well. Download this white paper to ensure your agency's infrastructure is up to the task.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.

Oracle V. Google Jury Deadlocked?
If the jury cannot reach a verdict, the judge might weigh in on the question of whether APIs can be copyrighted.

How To Lose Your Best IT Employees
Ignore what motivates people in their jobs and they'll eventually leave. Our IT Salary Survey provides data you can use to cultivate your top performers.



 


SLIDESHOWS
Interop 2012 Preview: 12 Cool Products
Cloud computing, big data, and mobile lead the big themes at the Interop 2012 enterprise IT event. Get a sneak peek at some of the innovative products we expect to see.   View Now

ALSO SEE
Amazon's 7 Cloud Promises: Hype Vs. Reality
Google Drive: 10 Alternatives To See

MORE SLIDESHOWS

spacer spacer spacer
spacer
 


WEBCASTS
Does America's Next "Road to Prosperity" lie in Rural Sourcing?
The global economy has driven business out of America with small towns greatly impacted. At the same time, companies are finding that the quality of outsourcing their IT and development to other countries is lacking. A solution has emerged that solves both issues: rural sourcing. We discuss this trend and its benefits. It happens Tuesday, May 22, 2012. More Information & Registration

Click here

 


RESOURCES AND EVENTS
InformationWeek IPv6 Survey
InformationWeek is conducting a survey to get a baseline look at where enterprises stand on their IPv6 deployments, with a focus on problem areas, including security, training, budget, and readiness. Upon completion of our survey, you will be eligible to enter a drawing to receive an 16-GB Apple iPad.
Survey Ends May 11

Virtual Event: Enterprise Mobility: New Devices, Applications, Platforms, And Priorities
At this interactive event, experts and solution providers will offer detailed insight into how to bring some order to the mobile industry innovation chaos. When you register, you will gain access to live webcast presentations and virtual booths packed with free resources.
It happens May 17

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.