MUST READ Governance Meets Cloud: Top Misconceptions By Beth Stackpole While cloud computing takes some IT responsibilities off of your plate, governance isn't one of them. Experts say you still need to do the heavy lifting to ensure strong security and access policies.
RELATED • 4 Keys To Hybrid Cloud Planning • 5 Tips For Negotiating Cloud Software SLAs
Dell Delivers Desktop-as-a-Service Dell partners with Desktone to become a direct supplier of virtual desktops. Here's how this twist on desktop virtualization differs from Citrix XenDesktop and VMware View.
If Apple Walls Garden, IT Should Demand Keys Here's how and why IT must influence Apple and its smaller competitors to share a key to the walled garden coming to a desktop near you.
10 Lessons From Leading Government CIOs Under extreme budget pressure, federal IT leaders adopt shared services and build mobile app stores as they shift dollars where most needed.
Huawei Gunning For Cisco, HP, Dell, And Friends Chinese networking giant introduces new products, partnership at Interop, aiming for a larger piece of the U.S. enterprise infrastructure market.
The Fall Of The Messiah Leader Many CEOs create an illusion of control, but heroic, charismatic leadership in the context of large public companies is mostly a myth.
5 Tips: Get Strong IT Job References What can you do to ensure that references don't sink your IT job search effort? Consider these tips from an insider.
2012 Strategic Security Survey: Pick The Right Battles Whether it's cloud computing, mobile devices, or insecure software, some threats are more prevalent than others. Our latest survey delves into where security pros are putting their resources.
|
|
|
|
|
|
DOWNLOAD INFORMATIONWEEK'S MAY 8th DIGITAL ISSUE From clouds to mobile to software development, threats may be everywhere, but they're not equally dangerous. Our new, all-digital issue of InformationWeek will help you prioritize.
ALSO THIS ISSUE: IT must decide how to deal with consumer cloud storage being used in businesses.
DOWNLOAD NOW FREE (Registration Required)
|
|
REPORTS & WHITEPAPERS
MOST POPULAR NEWS
10 Massive Security Breaches They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
Oracle V. Google Jury Deadlocked? If the jury cannot reach a verdict, the judge might weigh in on the question of whether APIs can be copyrighted.
How To Lose Your Best IT Employees Ignore what motivates people in their jobs and they'll eventually leave. Our IT Salary Survey provides data you can use to cultivate your top performers.
RESOURCES AND EVENTS
InformationWeek IPv6 Survey InformationWeek is conducting a survey to get a baseline look at where enterprises stand on their IPv6 deployments, with a focus on problem areas, including security, training, budget, and readiness. Upon completion of our survey, you will be eligible to enter a drawing to receive an 16-GB Apple iPad. Survey Ends May 11
This e-mail was sent to EmailAddress
|
InformationWeek Daily -- Published By InformationWeek 600 Community Drive Manhasset, NY 11030
To update your profile, change your e-mail address, or unsubscribe, click here.
Thoughts about this newsletter? Give us feedback.
|
|
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.
|
|
|
|