Wednesday, September 26, 2012
|
|
MUST READ Big Data Squeezes Legacy IT Spending: IDC By Kevin Fogarty Along with cloud computing, mobile, and social networking, big data will account for a growing percentage of IT spending, leaving little to maintain older systems, says IDC study.
RELATED • Tibco Spotfire Revamp Supports Big Data Analytics • Big Data Talent War: 10 Analytics Job Trends
RIM Hints BB10 Debuts In January: Too Late? Research In Motion CEO gives away a clue that the earliest possible sale date for BlackBerry 10 devices is mid-January. Can RIM hold on that long?
Samsung Addresses Galaxy Exploit Exploit that triggers certain Samsung Galaxy smartphones to reset poses fewer risks than initially reported.
Windows Server 2008 Support Lives On, XP Won't Microsoft gives Windows Server 2012's predecessor a longer lease on life, while reminding users that XP's days are numbered.
Java Vulnerability Affects 1 Billion Plug-ins Another week, another Java vulnerability--only this one affects all versions of Java released in the past eight years.
FTC Wrist Slaps PC Rental Firms For Spying Seven rent-to-own businesses secretly captured webcam images and personal information of late-paying customers, but face no fines or criminal charges.
Google Play Store Downloads Surpass 25 Billion Google has nearly caught up with its Apple iTunes rival, plans to put apps on sale to celebrate.
Is IT Innovation Driving Physicians Out The Door? Recent health IT initiatives are forcing many frustrated clinicians to take early retirement. IT leaders need to realize that our national treasure is becoming an endangered species.
|
|
|
|
|
|
HERE COMES WINDOWS 8! Upgrading isn't the easy decision that Win 7 was. We take a close look at Server 2012, changes to mobility and security, and more in the new digital issue of InformationWeek.
Also in this issue: Why you should have the difficult conversations about the value of OS and PC upgrades before discussing Windows 8.
DOWNLOAD NOW FREE (Registration Required)
|
|
VALLEY VIEW IS BACK -- SEPTEMBER 26!
Join us on September 26 for Valley View, our exciting live video show. Join us on September 26 for Valley View, our exciting live video show. In addition to an exclusive chat with NetSuite CEO Zach Nelson, and an in-studio interview with CitiGroup CTO Yobie Benjamin, we'll feature our new Elevator Pitch session, a rapid-fire deluge of information about new technology approaches.
One company's elevator pitch we'll be highlighting: Fusion-io.
Gary Orenstein, Fusion-io's senior VP of Product says his company's purpose is to make the world's data go faster. Data is everywhere -- the cloud, the web -- but it's on disk, which is too slow for many of today's demanding data needs. With Fusion-io's IoDrives and Ion Data Accelerator software, data center managers can build solid-state, flash-based storage arrays across physical and virtual servers more cost effectively. Orenstein says Fusion-io is doing lots of work in organizations using Oracle, Microsoft and MySQL databases, and is also starting to see some big data deployments using MongoDB. We'll hear Orenstein boil all of this down into his 3-minute elevator pitch on Valley View.
Other Elevator Pitches featured: Appthority (Mobile Security), Crowdstrike (Enterprise Security), Cliqr (Cloud Management), Kontiki (Enterprise Video).
Don't Forget To Register To Win An Amazon Kindle Fire!
REPORTS & WHITEPAPERS
FEATURED REPORTS 6 Most Evil Phishing Scams of 2012 As email-borne exploits grow increasingly sophisticated, all the time and money spent shoring up back-end network access channels could be for naught. Here's how to defend against attacks that prey on your end users. The first step: Know what you're up against. Download Now (Registration Required)
|
|
A Guide to Security and Enterprise Directories Security isn't necessarily the first thing people think of when they consider enterprise directories. But directories can be used in a number of ways to tighten and extend your organization's security. In this report, we examine enterprise directories-through the lens of Microsoft Active Directory-and their potential as a solution for a wide array of security initiatives. Download Now (Registration Required) |
|
|
|
|
|
FEATURED WHITEPAPERS Shifting Performance Strategies and Solutions for Mobile & Web Delivery As users flock to a growing universe of mobile devices, optimizing browsing experiences across platforms has become increasingly costly and challenging. Forrester has identified the questions IT leaders should be asking themselves as they refine mobile strategies for 2013 and beyond. Read the study now and see how you can do more with less cost and complexity. Download Now (Registration Required)
Why Build a Private IaaS Cloud Cloud computing is the convergence of a variety of trends, including network-centric application access, the consumerization of IT, greatly increased scale and complexity, open source, and virtualization. Learn how infrastructure-as-a-service (IaaS) cloud can be used to operationalize governance and automation of an IT infrastructure. Download Now (Registration Required)
|
MOST POPULAR NEWS
Selecting the Right Database for the Right Problem Columnar, NoSQL, NewSQL and Hadoop are the hot new technologies that are helping companies manage their big data challenges. This webinar will demystify this world, outlining the analytics challenges posed by machine-generated data and giving an overview of the best use cases for these new technologies. It happens Thursday, September 27, 2012. More Information & Registration
|
|
|
RESOURCES AND EVENTS
This e-mail was sent to EmailAddress
|
InformationWeek Daily -- Published By InformationWeek 600 Community Drive Manhasset, NY 11030
To update your profile, change your e-mail address, or unsubscribe, click here.
Thoughts about this newsletter? Give us feedback.
|
|
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: [email protected]
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.
|
|
|
|