Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

HP's Direction Still Unclear | Apple After Steve: 10 Hits And Misses

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  Thursday, October 04, 2012
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Apple After Steve Jobs: 10 Hits And Misses
By Jeff Bertolucci
Oct. 5 marks the one-year anniversary of Steve Jobs' death. During that time, Apple has had some amazing successes and some spectacular failures.
Between The Lines Columnist

RELATED
iPad Mini Won't Have Retina Display
Apple iPhone 5 Teardown: Visual Tour

HP's Decline: Customers Get Fresh Helping of Uncertainty
HP CEO Meg Whitman cites 'bloat' as barrier to turnaround, plans layoffs and slimmer product lines. One reality: customer trust runs low, even as cloud services gain traction.

Windows 8, RT Confusion: Can Microsoft Beat It?
Windows 8, paired with ultra-thin laptops, could add sorely-needed excitement to the PC market this holiday season. But Microsoft has a marketing problem.

Oracle Open World: 6 Rants and Raves
Oracle's cloud vision and announcements on key features deserve praise, but we need to see more substance behind the promises and more reality in the claims.

Facebook's Promoted Posts For Individuals: A Bad Idea
Are you willing to pay to have your Facebook posts read by more people?

SHA-3 Secure Hash Algorithm: New Face Of Crypto
Secure hash algorithm beats 63 contenders to become NIST's next-generation cryptographic standard.

Fake Antivirus Ringleader Must Pay $163 Million
Federal court imposes $163 million judgment on a woman who FTC says helped run scareware ring that tricked more than one million consumers across six countries into purchasing fake security software.

HP Details Software Defined Networks Strategy
HP announces new switch support for OpenFlow, a forthcoming SDN controller, and set of SDN-related applications.

QUOTE OF THE DAY
"A fanatic is one who can't change his mind and won't change the subject." ~ Winston Churchill

ALSO SEE

Fake Antivirus Ringleader Must Pay $163 Million
HP Details Software Defined Networks Strategy
Windows 8 Survival Guide: Server 2012
Best Practices for Secure Enterprise Content Mobility
Fake Antivirus Ringleader Must Pay $163 Million
Strategies for Achieving Application Availability in the Cloud
Take Our Application Performance Management Survey

Download our iPad App

JOIN THE CONVERSATION
Posted By Tom Petrocelli:
"Promoting individual posts is likely to annoy friends and get you unfriended. It a corporate tool masquerading as a consumer feature."
In reply to: "Facebook's Promoted Posts For Individuals: A Bad Idea"
View Entire Response | Post Your Own Reply

Posted By GAProgrammer:
Google is riding the tech media wave of 'Microsoft will be obsolete in 2 years' which is complete BS."
In reply to: Original Story Headline
View Entire Response | Post Your Own Reply


 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Windows 8 Survival Guide: Server 2012
With all the hoopla surrounding Windows 8, the recent release of Server 2012 is flying way under the radar. And that's a shame, because it has a lot to offer. Here are five features that could tempt you to jump sooner rather than later-and five that shouldn't sway you.
Download Now (Registration Required)

Featured Report
IT Pro's Guide to iPhone 5 and iOS 6
Apple's latest smartphone ushers in a new hardware package paired with an updated OS. Here's what enterprise IT teams charged with supporting employee mobility need to know about Maps, security, Passport vs. NFC, networking and more.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Best Practices for Secure Enterprise Content Mobility
The proliferation of mobile devices and the popularity of Bring Your Own Device (BYOD) are creating new security challenges for enterprises. Employees are using devices such as smartphones to access and store business data. Read this whitepaper to learn best practices for secure mobile content management and how you can enable your road warriors to be as productive as possible on any device anywhere, anytime.
Download Now (Registration Required)

Protect Your POS Systems from Targeted Attacks
This is truly the time of the advanced persistent threat (APT) and surviving it requires cutting-edge measures that can effectively identify and eliminate these dangers before they do irreparable damage to business and brand reputation. Download this case study to see how one restaurant giant ensured that only trusted applications and devices were able to run on its POS systems and corporate computers.
Download Now (Registration Required)

MORE WHITEPAPERS
 
MOST POPULAR NEWS
Fake Antivirus Ringleader Must Pay $163 Million
Federal court imposes $163 million judgment on a woman who FTC says helped run scareware ring that tricked more than one million consumers across six countries into purchasing fake security software.

Windows 8 Vs. Windows RT: 8 Key Differences
With the introduction of Windows 8 and Windows RT, Microsoft splits its flagship OS into two distinct flavors. Examine the most important contrasts.

T-Mobile To Merge With MetroPCS
Update: The merger of T-Mobile and MetroPCS is set to happen. The business models and network technologies don't match, but the problems are fixable and the end-result could be good for both T-Mobile and MetroPCS, definitely for Deutsche Telekom and even for Sprint.

Cloud Security Investment, Part 2: Whac-a-Mole Funding and Going on the Offensive
Most enterprises don't seem to have any semblance of a cohesive, security strategy.

RIM Improves PlayBook With OS 2.1
Updated PlayBook OS lets users send text messages, secure personal data with government-grade encryption.

 


SLIDESHOWS
12 Top Health Apps From Uncle Sam
Choosing a mobile app that tracks health or offers help in emergency situations can prove challenging. The U.S. government's recent digital initiative has prompted federal agencies to create free apps for clinicians and patients.   View Now

ALSO SEE
6 Ways iPhone 5, iOS 6 Amp Up Social Opportunities
14 Amazing DARPA Technologies On Tap

MORE SLIDESHOWS

spacer spacer spacer
VIDEOS
5 Elevator Pitches, NetSuite CEO Hit Valley View
Five companies gave 3 minute elevator pitches, and each of them nailed it. We covered mobile security, enterprise security, cloud, data center and enterprise content deliver super fast, and we heard from NetSuite CEO Zach Nelson and a big time CTO.   Watch

ALSO WATCH
Jelly Bean Demo On The Samsung Galaxy Nexus
The Most Interesting IT Guy In The World: Global Warming, Windows Vista, Vint Cerf

MORE VIDEOS

spacer
 


WEBCASTS
Strategies for Achieving Application Availability in the Cloud
Join us as Donna Scott, Gartner VP Distinguished Analyst, presents best practices in achieving multi-site application availability, while offering guidance on data center and hosting strategies in the age of cloud computing. It happens Tuesday, October 9, 2012. More Information & Registration

Click here

 


RESOURCES AND EVENTS
Take Our Application Performance Management Survey
We are conducting a survey on the adoption of application performance management tools in the enterprise, how they are being used, and IT's level of satisfaction with these products. One lucky participant will win an iPod!
Survey ends Oct. 5

This e-mail was sent to EmailAddress
InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030

To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.

Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.