Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

5 Facebook Privacy Mistakes | Samsung Galaxy S III: Pros, Cons

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Friday, May 4, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist Samsung Galaxy S III: Pros And Cons
By Eric Zeman
Samsung's Galaxy S III smartphone will compete in the U.S. with the Apple iPhone, HTC One X, and Nokia Lumia 900. How does it stack up?

RELATED
Samsung Galaxy S III: Key Features
10 Ways To Get More From Android Devices

Facebook Privacy: 5 Most Ignored Mistakes
A Consumer Reports survey of Facebook users reveals many people still ignore privacy controls and sharing risks. Do you understand the common mistakes that could bite back?

Citrix Defends CloudStack's Value Vs. OpenStack
CloudStack will be another choice for building private clouds, says Citrix exec Peder Ulander. Can these two similar open source projects survive?

Has Anonymous Ruined Online Anonymity?
Anonymous, the hacktivist collective, has given anonymity a bad name. Yes, anonymous online services may be used to send bomb threats or abusive messages, but anonymity also does some good online.

Dell/Compellent Wins InformationWeek Storage Evaluation
IT pros want reliability, performance, and low cost--and they say they’re getting it best from Dell’s recent storage acquisition, Compellent.

Interop Preview: Big Data, Cloud, Mobility In Spotlight
Cisco CTO Padmasree Warrior and Zynga CTO Allan Leinwand will be among the keynote speakers tackling cloud and big data challenges for enterprise IT, as Interop 2012 kicks off on May 6.

AHA Fights Meaningful Use Stage 2 Timing, Scope
American Hospital Association asks the Centers for Medicare and Medicaid Services to soften requirements, push back start date, and change timeframe for penalties.

QUOTE OF THE DAY
Adopt the pace of nature: her secret is patience. -- Ralph Waldo Emerson

ALSO SEE

Interop Preview: Big Data, Cloud, Mobility In Spotlight
AHA Fights Meaningful Use Stage 2 Timing, Scope
Research: 2012 IT Salary Survey: Executives
Business Continuity and Resiliency Services
Microsoft Kills 'Confusing' Windows Live Brand
B2B Integration on the Cloud
InformationWeek IPv6 Survey

Download our iPad App

JOIN THE CONVERSATION
Posted By Sandman366:
"This is the end result of carriers taking forever to futz with Android. Nobody gets it anytime soon unless they get custom ROMs."
In reply to: "Android 4.0 Installed On Just 4.9% Of Devices"
View Entire Response | Post Your Own Reply

Posted By HornbackisCIA:
"For all we know, a FBI or NSA agent made those threats, simply to justify destroying people's methods of being secure, and speaking freely and securely."
In reply to: "FBI Seizes Anonymizing Email Service Server"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD INFORMATIONWEEK SMB'S DIGITAL ISSUE
SMBs have saved big buying software on a subscription model. Our new, all-digital issue of InformationWeek SMB shows how to determine if infrastructure services can pay off, too.

ALSO THIS ISSUE: One startup's experience with infrastructure-as- a-service shows how the numbers stack up for IaaS vs. internal IT.

DOWNLOAD NOW FREE (Registration Required)

 


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Research: 2012 IT Salary Survey: Executives
Salaries for most of the 1,097 IT executives we surveyed are lower than they were in the previous two years: Median total compensation for CTOs fell to $129,000 from $140,000 in 2011. The exception? Those holding the chief information officer title got a $4,000 bump.
Download Now (Registration Required)

Featured Report
Strategy: Storage Virtualization Guide
Virtualized pools of storage can increase disk utilization, give storage administrators more flexibility, and improve disasterrecovery and business continuity. From thin provisioning to replication to federation, virtualization options can make your storage more supple and responsive-and free you from vendor lock-in. Our guide tells you how.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Business Continuity and Resiliency Services
With greater supply chain interdependencies, increasing regulatory requirements and a rapidly changing, geographically dispersed business environment that can include everything from traditional storefronts to online operations, organizations are facing intense pressures to improve performance, maintain continuous availability and ensure data integrity.
Download Now (Registration Required)

Protecting Against Advanced Malware and Targeted APT Attacks
Today, more than 95 percent of businesses unknowingly host compromised endpoints. Download this white paper to discover what every security professional should know about stopping today's advanced threats, such as zero-day and targeted APT attacks, before they compromise your network.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
Microsoft Kills 'Confusing' Windows Live Brand
With the arrival of Windows 8, Microsoft will simplify its cloud services nomenclature.

VMware's New Bid To Simplify Desktop Virtualization
VMware Wednesday launched VMware View 5.1, desktop virtualization technology designed to ease storage requirements and management chores; new vCenter management tools speed desktop provisioning.

How To Lose Your Best IT Employees
Ignore what motivates people in their jobs and they'll eventually leave. Our IT Salary Survey provides data you can use to cultivate your top performers.

10 Massive Security Breaches
They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.

 


SLIDESHOWS
Amazon's 7 Cloud Promises: Hype Vs. Reality
Amazon says cloud computing is an indispensable enabler of seven important computing transformations. We hype-test the promises with a few reality checks.   View Now

ALSO SEE
Google Drive: 10 Alternatives To See
Oracle Vs. Google: Tour The Evidence

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
Sponsored Content: E2 Interview: Simplifying IT Architecture
Steve Felice, president and chief commercial officer of Dell, tells us about customers' main priorities, which include creating a simpler, more agile, more scalable architecture.   Watch

ALSO WATCH
M2M: Wireless Technology is Revolutionizing Transportation
Sponsored Content: E2 Interview: Datacenters Enabling Business Transformation

MORE VIDEOS

spacer
 


WEBCASTS
B2B Integration on the Cloud
Watch this webcast to learn about the rapidly advancing capabilities and strategic direction for B2B Integration on Cloud. It happens Tuesday, May 15, 2012. More Information & Registration

-----------------------------------------------------------------
This issue sponsored by Gartner Supply Chain Executive Conference
-----------------------------------------------------------------
You're invited to join us May 21 -- 23, 2012, in Palm Desert, CA to experience 50+ sessions and real-world insights for every member of your supply chain team. Network with Gartner analysts, solution providers and 1,000+ senior supply chain executives.

 


RESOURCES AND EVENTS
InformationWeek IPv6 Survey
InformationWeek is conducting a survey to get a baseline look at where enterprises stand on their IPv6 deployments, with a focus on problem areas, including security, training, budget, and readiness. Upon completion of our survey, you will be eligible to enter a drawing to receive an 16-GB Apple iPad.
Take our Survey now through May 11

Virtual Event: Enterprise Mobility: New Devices, Applications, Platforms, And Priorities
At this interactive event, experts and solution providers will offer detailed insight into how to bring some order to the mobile industry innovation chaos. When you register, you will gain access to live webcast presentations and virtual booths packed with free resources.
It happens May 17

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.