Thursday, January 10, 2013
|
|
MUST READ Intel Outlines Smartphones, Ultrabooks Vision At CES By Michael Endler Intel unveils a variety of new chips at CES 2013 to gain ground as market shifts increasingly toward mobile devices.
RELATED • CES 2013: PaperTab Tablet Boasts Flexible Display • CES 2013: Apple Shadow Looms Large
Is SharePoint Trustworthy For Business-Critical Processes? With workflow improvements in SharePoint 2013, more companies may consider it. Here's what else to consider in Microsoft's latest version.
InformationWeek Education: Your New Guide To Higher Education IT Even if higher education is an industry and calling like no other, it must grow and evolve with its tech-literate clientele. Or it will whither.
How A Boutique Law Firm Handles Big Data Like other small and midsize businesses, boutique law firm Thomas Horstemeyer capitalizes on its agility to stay ahead of rapidly growing data requirements.
Apple Targets App Store Bait And Switch Scammers Apple will lock down app screenshots after approval to stem a spate of sellers hawking fake apps.
London's 'Silicon Roundabout' Off To Uncertain Start Is there enough "there" there to bootstrap a new Web-based startup culture in London? Sir James Dyson, he of the eponymous vacuum cleaner and venerable U.K. business figure, isn't sure.
OpenStack Brain Trust Gains $10M In New Funding Mirantis, one of the only OpenStack brain trusts outside of Rackspace, lines up backers including Dell and Intel to elevate its prominence in the cloud systems integration business.
10 Social Networks For Special Interests Vertical, or specialized, social networks connect you with people and and business opportunities around specific industries or affinities -- whether you're a doctor, or a cat lover.
|
|
QUOTE OF THE DAY "A man must be big enough to admit his mistakes, smart enough to profit from them, and strong enough to correct them." - John C. Maxwell
ALSO SEE
JOIN THE CONVERSATION Posted By moarsauce123: "New systems are inherently insecure, and know that by forcing implementation, especially considering most IT people are not well educated and are trying to do that work with minimal effort, you can be destroying your enterprise." In reply to: "A Proposal For IT: Set Just One Goal For 2013" View Entire Response | Post Your Own Reply
|
|
REPORTS & WHITEPAPERS
FEATURED REPORTS Fundamentals: Cloud ID Management Worried about controlling access to all the cloud applications your employees use? IT has a variety of options to help manage cloud-based identities, including Active Directory synchronization, federation and purpose-built cloud services that provide single sign-on for online applications. Download Now (Registration Required)
|
|
Research: 2012 Application Security Survey Tried-and-true methods like defense in depth can provide breathing room while you get a secure SDLC in place-a job still facing 56% of our 475 respondents. And they'd better get moving, because 51% of those with secure SDLC programs on their radar have developed and/or assumed responsibility for securing 11 or more Web apps. Download Now (Registration Required) |
|
|
|
|
|
|
MOST POPULAR NEWS
Is Your Network Ready for BYOD? Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy. More Information & Registration
|
|
|
RESOURCES AND EVENTS
This e-mail was sent to EmailAddress
|
InformationWeek Daily -- Published By InformationWeek 600 Community Drive Manhasset, NY 11030
To update your profile, change your e-mail address, or unsubscribe, click here.
Thoughts about this newsletter? Give us feedback.
|
|
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.
|
|
|
|