Tuesday, January 08, 2013
|
|
MUST READ CES 2013: 7 Standout Technologies By Michael Endler What happens at CES 2013 doesn't stay in Vegas. From giant tablets to $20,000 televisions, take a peek at a few early standouts for gadget lovers. |
|
RELATED • Sprint Finally Commits To Windows Phone 8 • CES 2013: Smaller Smartphone Players Shine
Big Data Analytics Masters Degrees: 20 Top Programs These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.
Amazon's Cloud Revenues, Examined Two analyst firms upgrade Amazon Web Services for broad growth potential; one factor is a growing number of large customers.
Windows RT Hacked To Run Desktop Apps Microsoft's tablet OS can be fooled into running full-blown Windows 8 and legacy applications, hacker reveals.
RAND: Health IT No Bargain Yet Problems in design and implementation of EHRs, lack of interoperability, and provider resistance hamper productivity gains and cost savings, says RAND report.
Intel Hedges Bets, Gets Cozy With Android At CES 2013, Intel shows it won't let longstanding partnership with Microsoft stand in the way of growth.
Analytics Vendors Must Make Prediction Easier, Forrester Says Forrester Wave report urges SAP, IBM and eight other vendors to come up with advanced analytics software that's less daunting to business users.
|
|
QUOTE OF THE DAY "If everything seems under control, you’re just not going fast enough." -- Mario Andretti
ALSO SEE
JOIN THE CONVERSATION Posted By resrpt: "The problem is definition of IT. Authors are conveniently assuming IT to be "infrastructure and security" manager. We should not forget application developers who create all cool applications, are also IT." In reply to: "How IT Can Keep Its Strategic Role In 2013" View Entire Response | Post Your Own Reply
|
|
REPORTS & WHITEPAPERS
FEATURED REPORTS Fundamentals: Cloud ID Management Worried about controlling access to all the cloud applications your employees use? IT has a variety of options to help manage cloud-based identities, including Active Directory synchronization, federation and purpose-built cloud services that provide single sign-on for online applications. Download Now (Registration Required)
|
|
Research: 2012 Application Security Survey Tried-and-true methods like defense in depth can provide breathing room while you get a secure SDLC in place-a job still facing 56% of our 475 respondents. And they'd better get moving, because 51% of those with secure SDLC programs on their radar have developed and/or assumed responsibility for securing 11 or more Web apps. Download Now (Registration Required) |
|
|
|
|
|
|
MOST POPULAR NEWS
Is Your Network Ready for BYOD? Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy. More Information & Registration
|
|
|
RESOURCES AND EVENTS
This e-mail was sent to EmailAddress
|
InformationWeek Daily -- Published By InformationWeek 600 Community Drive Manhasset, NY 11030
To update your profile, change your e-mail address, or unsubscribe, click here.
Thoughts about this newsletter? Give us feedback.
|
|
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.
|
|
|
|