Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

The End Of Data Centers? | How To Lose Your Best IT Employees

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Friday, April 20, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist How To Lose Your Best IT Employees
By Chris Murphy
Ignore what motivates people in their jobs and they'll eventually leave. Our IT Salary Survey provides data you can use to cultivate your top performers.

RELATED
2012 IT Salary Survey: 12 Career Insights
IT Salaries 2012: $90,000, 1% Raise Typical

Amazon: Era Of Data Centers Ending
At Amazon Web Service Summit 2012, Amazon's Adam Selipski cites "undeniable signs" of a cloud transition. Within 20 years, most enterprises will run entirely in the cloud, he says.

Oracle, Google Struggle To Explain APIs To Jury
Day four of Oracle's copyright and patent lawsuit against Google's Android OS brings a lesson in API design and programming that even the judge declares 'confusing.'

iPhone 5 May Get New Display, 'Liquidmetal'
Reports that surfaced this week suggest the next iPhone will use brand-new touch screen technology and will be encased in something called "liquidmetal."

FBI Seizes Anonymizing Email Service Server
Privacy activists criticize the FBI's anonymous remailer server takedown that resulted from a bomb threat investigation.

Apple Mac Attack Began With Infected WordPress Sites
Security researchers watch for a possible Flashback comeback by the botnet operators.

OpenStack Is Not A Proprietary Cloud, Kemp Argues
Former NASA CTO and Nebula founder Chris Kemp says private clouds will need to be based on a flexible, general purpose set of open source code that can work with public clouds.

QUOTE OF THE DAY
A smile cures the wounding of a frown. -- William Shakespeare

ALSO SEE

Apple Mac Attack Began With Infected WordPress Sites
OpenStack Is Not A Proprietary Cloud, Kemp Argues
Strategy: Development Labs in the Cloud
Planning Security Budgets: Quantify the Financial Risk of DDoS
Mac Trojan Fallout: Apple Security Glory Days Gone?
Prepare Your Infrastructure For The Cloud Using Open Standards
It's Coming: Interop Las Vegas

Download our iPad App

JOIN THE CONVERSATION
Posted By mwatterud486:
"A big lesson that we can learn from Steve and what everyone at Apple has done, is that you can’t rely just on consumer research."
In reply to: "What You Won't Learn From 12 Greatest Entrepreneurs"
View Entire Response | Post Your Own Reply

Posted By AustinIT:
"Apple never had security glory days, they just were lucky that their desinterest and tardiness in regards to security did not get punished sooner."
In reply to: "Mac Trojan Fallout: Apple Security Glory Days Gone?"
View Entire Response | Post Your Own Reply


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Strategy: Development Labs in the Cloud
The options available for putting a lab in the cloud are increasing. We take a look at the costs, complexities and challenges involved in making a move to either a public or private cloud lab, and help you figure out how to get there.
Download Now (Registration Required)

Featured Report
Informed CIO: Is Your IT Infrastructure Ready for Mobility?
No one likes to think about a large meeting with multiple mobile devices bringing a WLAN to its knees, but we've seen it happen. Here's how to help your wired and wireless networks seamlessly support mobile and/or remote users--and not buckle under pressure.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Planning Security Budgets: Quantify the Financial Risk of DDoS
IT security managers have the difficult task of assessing the threat landscape and allocating limited funds to minimize their exposure to DDoS attacks. This paper offers guidelines and a framework for setting security budget priorities, based on risk and consequences of an attack on your business operations.
Download Now (Registration Required)

Gartner Report on iPaaS: Moving Integration to the Cloud
The explosive growth of cloud computing has fueled the need to integrate Cloud applications with each other and with on-premise applications. Traditional integration approaches are evolving into more functionally complete offerings called integration platform as a service (iPaaS) solutions. Learn more about this technology and what impact Gartner believes it will have on the industry.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
Mac Trojan Fallout: Apple Security Glory Days Gone?
Apple's reputation as an unattractive target for malware writers changed when the Flashback trojan hit more than 600,000 Macs. But Windows security still looks worse.

2012 IT Salary Survey: 12 Career Insights
Nearly 14,000 IT pros took our 2012 salary survey, providing insights into salaries and bonuses. What can you learn to increase your paycheck and career satisfaction?

Windows 8 Enterprise: 6 Key Features For IT
Microsoft has added new enterprise features to Windows 8, while enhancing some holdovers from Windows 7.

10 Essential Android Apps For SMBs
No glitz, no glamour, just results: These 10 budget-friendly Android apps help SMB users simplify everyday tasks and power through to-do lists.

10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.

 


SLIDESHOWS
Oracle Vs. Google: Tour The Evidence
Oracle and Google continue to fight a nasty courtroom battle over patent and copyright claims involving Java and mobile phones. Consider some of the crucial evidence introduced so far.   View Now

ALSO SEE
Get Social: 11 Management Systems That Can Help
2012 IT Salary Survey: 12 Career Insights

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
Client-Side Storage with Pamela Fox
Pamela Fox, founder of EatDifferent, discusses Client-Side Storage and how new APIs let you make use of powerful clients to improve both performance and user experience.   Watch

ALSO WATCH
U3-X: Move Over Segway
India-CIR--PyramidPreview

MORE VIDEOS

spacer
 


WEBCASTS
Prepare Your Infrastructure For The Cloud Using Open Standards
Take part in our Interop Webcast which will look at the new drivers influencing cloud infrastructure. It happens April 18. More Information & Registration

Click here

 


RESOURCES AND EVENTS
It's Coming: Interop Las Vegas
See the future of business technology at Interop Las Vegas, May 6-10. It's the best place to learn how cloud computing, mobile, video, virtualization, and other key technologies work together to drive business. Register today with priority code CPQCNL07 to get a free Expo Pass or to save 25% on Flex and Conference passes.
Don't Miss It -- Register Today!

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.