Wednesday, March 6, 2013

Registration is Open! Early Bird Savings

Keynotes from Google, SF Giants Announced
Having trouble viewing this email? View the web version.

Don't miss E2's news and updates - please add e2@techwebliveevents.com to your contact list or address book.

Registration is Open! Save with Early Bird Pricing

Join us for this year's E2 Conference – formerly Enterprise 2.0 – in Boston! E2 is the only event that highlights the new choices and challenges organizations face as a result of the shifts in the enterprise applications landscape.

Check out our brand new website and join us for three full days of deep-dive workshops, industry-leading keynotes, conference sessions, networking receptions and more.

Keynotes & Tracks Announced

The 2013 conference program will be headlined by some exciting keynotes, including:

Bill Schlough

Bill Schlough

Chief Information Officer
San Francisco Giants

Stefan Groschupf

Stefan Groschupf

Chief Executive Officer
Datameer

Amit Singh

Amit Singh

President of Enterprise
Google

James Markarian

James Markarian

EVP & Chief Technology Officer
Informatica


Conference tracks covering the latest in enterprise innovation and case studies in:

  • Big Data & Analytics
  • Cloud, SaaS & APIs
  • Social & Collaboration
  • Mobility
  • User Experience & Design
  • Consumerization of IT
  • CXO Leadership
  • People, Process & Engagement

Register Today and Save with Early Bird Pricing!*

 

ON-SITE RATE

EARLY BIRD: YOUR PRICE

Full Event

$2,099

$1,499

Conference

$1,499

$1,099


Register

Sponsors & Exhibitors

Free Webcast On-Demand: Deepen Customer Satisfaction and Brand Affinity with Impactful Web Content and Microsites

Brought to you by:

Hear about the challenges of effectively creating, managing, and deploying impactful content across many web properties and audiences in our webcast on-demand. View Now »

*Current Early Bird Pricing: Full Event: $1,499.00. Conference: $1,099.00.

© UBM Tech 2013. All Rights Reserved. E2 c/o UBM Tech, 303 Second St., Suite 900 South Tower, San Francisco, CA 94107. UBM Tech, E2, and associated design marks and logos are trademarks owned or used under license by UBM LLC, and may be registered in the United States and other countries. Other names mentioned may be the trademark or service mark of their respective owners.

E2 respects your privacy. This message is sent to qualified recipients who recently attended, or requested or downloaded information about either E2 or a related UBM LLC event or publication or requested information about our events, publications and products.

Unsubscribe from E2 Conference Boston.

This email was sent to sojo.blo@gmail.com. If this email was forwarded to you and you would like to begin receiving a copy of your own, please visit our site to receive E2 news and special offers directly. Please do not reply to this email as replies are not being read.

Privacy Policy

UBM Tech

IT Helps Doc-Patient Relations | Health CIOs: Progress On Meaningful Use

If you have trouble viewing this email, read the online version.

InformationWeek Healthcare
Join the community
Facebook Twitter LinkedIn
  Wednesday, March 06, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
InformationWeek Healthcare Columnist IT Changes Doctor-Patient Relationship For Better: Topol
By Ken Terry
Famed doctor Eric Topol says in HIMSS keynote that personalized medicine, mobile health, genomics will decrease doctors' importance -- and that's good.

HIMSS: Hospitals Making Progress On Meaningful Use
Survey of healthcare CIOs reveals good progress toward fully functional EHRs, but questions about ACOs, staffing, interoperability loom.

HIMSS: Should Healthcare Be More Like Airline Industry?
Such a comparison says not only that the healthcare industry must change, but also that those changes will be dramatic and gut wrenching.

EHRA Guides Vendors On Data Transport Mechanism
Association says methods for exchanging data could lead to greater interoperability among EHRs.

EHR Vendors Form Alliance On Data Sharing
CommonWell Health Alliance founders want industry-wide coalition to make it easier to move data among disparate EHR systems.

4 Health IT Themes To Watch At HIMSS13
Interoperability challenges, patient experience, mobile technology will be in spotlight at annual health IT conference.

AirStrip Combines EHR, Medical Device Feeds For Mobile
Dignity Health will be first to try application that lets doctors view on their mobile devices a snapshot of clinical data across different vendors' electronic health record systems.

ALSO SEE
Strategy: Heading Off Advanced Social Engineering Attacks
Strategy Guide to Business Protection for Hospitals
Office 2013: 10 Questions To Ask
Data Protection Management for Enterprises and Service Providers
Don't Miss Enterprise Connect 2013

Download our iPad App

JOIN THE CONVERSATION
Posted By Andrew Hornback:
"If you want to reduce the cost of healthcare by 15-20%, I think the first place to look would be the mitigation and limitation of risk. Once you reduce risks and get the patient more involved in their own health care, you'll start to see results."
In reply to: HIMSS: Should Healthcare Be More Like Airline Industry?
View Entire Response | Post Your Own Reply
  Digital Issue  
INSIDE THIS WEEK'S ISSUE OF DARK READING:
Protect the most fragile part of your IT infrastructure -- the endpoints and the unpredictable users who control them.

Also in this special issue: Some say the focus should be on education to deal with the endpoint security conundrum; some say technology. But it's not a binary choice.


DOWNLOAD NOW FREE (Registration Required)

 

Click here
 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Strategy: Heading Off Advanced Social Engineering Attacks
Social engineering attacks are getting increasingly sophisticated, but there's only so much the law and technology can do to protect your organization. In this Dark Reading report, we detail how a social engineering attack is developed and what IT professionals can do to prevent their users from being targets and victims.
Download Now (Registration Required)

Strategy: Securing The Mobile User
Despite the growing popularity and acceptance of the bring-your-own-device movement, there are a number of things working against IT. Fortunately, there are also a number of tools, some of them free, that security professionals can use along with strong policy and best practices to close the enterprise mobile security gap.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Strategy Guide to Business Protection for Hospitals
Learn more about HP Business Protection, which offers select, preconfigured disaster recovery solutions, helps hospitals manage risk and keep critical IT infrastructure up and running. Learn how to gain high availability, data protection, network security and off-site disaster recovery services.
Download Now (Registration Required)


Selecting the Right EHR for the Life of Your Practice and Your Patients
Download this whitepaper to learn about foundational criteria for selecting the right EHR solution.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
Office 2013: 10 Questions To Ask
Is Microsoft Office 2013 right for you? Here are the right questions for small and midsize businesses and enterprises to ask.

Evernote: We're Adding Two-Factor Authentication
After data breach and wide password reset, Evernote accelerates plans to offer additional security to users.

10 Helpful Apps From Uncle Sam
Mobile apps created by federal agencies will help you track NASA missions, travel smoothly and even get tax advice. Check out our latest guide to apps from Uncle Sam.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Collision Course: SDN And Server Virtualization
With every data center resource -- compute, storage and networks -- now virtualized, the push is on to consolidate operational control.





MORE NEWS
 
WEBCASTS
Data Protection Management for Enterprises and Service Providers
In this Webcast (Tuesday, March 12, 2013) we will explore the many challenges associated with multi-platform data protection environments and discuss how enterprise IT and service providers can gain the visibility and insight needed to reduce operational expenses and improve protection confidence. More Information & Registration

Click here
 
RESOURCES AND EVENTS
Don't Miss Enterprise Connect 2013
The Enterprise Connect conference program covers the full range of platforms, services and applications that comprise modern communications and collaboration systems. Hear case studies from senior enterprise executives, as well as from the leaders of major industry players like Cisco, Microsoft, Avaya, Google and more. Register today with code IWKPREM to save $200 off a conference pass or get a free Expo Pass.
It happens March 12-21 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Healthcare
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek's Healthcare go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Bank Hacktivists At It Again | Java Patch Fends Off McRAT

If you have trouble viewing this email, read the online version.

TechWeb
SECURITY UPDATE 
  Wednesday, March 06, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   TechCenters   |   Events   |   RSS Feeds  
TOP STORY
CIO Columnist Bank Attackers Restart Operation Ababil DDoS Disruptions
By Mathew J. Schwartz
Some customers report difficulty accessing banking sites, but officials said DDoS defenses and service provider blocks may be partly to blame.

MUST READ
Java Emergency Patch Slaps McRAT Infections
Oracle patches two more zero-day bugs in Java 6 and Java 7. But security researcher spots new vulnerabilities in Java 7.

EU Fines Microsoft $732 Million In Browser Brawl
Microsoft stopped offering browser-choice screen to European Windows consumers, in violation of 2009 agreement with antitrust regulators.

Government Google Data Requests: Scope Unclear
Google has begun disclosing limited information about U.S. government investigations that demand consumer data and, usually, silence from those cooperating.

Evernote: We're Adding Two-Factor Authentication
After data breach and wide password reset, Evernote accelerates plans to offer additional security to users.

What Unlocked Phones Mean For Businesses
U.S. lawmakers pledge to change regulations that make it illegal to unlock cell phones. Is there an upside for the enterprise?

Kim Dotcom Plans Mega IPO
MegaUpload founder, still sought for extradition by the U.S. government, hires CFO to help float his new cloud storage service.

ALSO IN THIS EDITION
What Unlocked Phones Mean For Businesses
Kim Dotcom Plans Mega IPO
Strategy: Heading Off Advanced Social Engineering Attacks
Five Critical Components of an Information Security Program
Office 2013: 10 Questions To Ask
Data Protection Management for Enterprises and Service Providers
It's Your Last Chance To Attend Black Hat Europe

Download our iPad App

JOIN THE CONVERSATION
Posted By pcbackup:
"Email addresses are nearly as valuable as account passwords, since they enable future attack opportunities, so why not apply the same level of protection to email addresses as for the passwords themselves?"
In reply to: Evernote Breach: 7 Security Lessons
View Entire Response | Post Your Own Reply
  Digital Issue  
INSIDE THIS WEEK'S ISSUE OF DARK READING:
Protect the most fragile part of your IT infrastructure -- the endpoints and the unpredictable users who control them.

Also in this special issue: Some say the focus should be on education to deal with the endpoint security conundrum; some say technology. But it's not a binary choice.


DOWNLOAD NOW FREE (Registration Required)

 

 

REPORTS & WHITEPAPERS:
FEATURED REPORT
Strategy: Heading Off Advanced Social Engineering Attacks
Social engineering attacks are getting increasingly sophisticated, but there's only so much the law and technology can do to protect your organization. In this Dark Reading report, we detail how a social engineering attack is developed and what IT professionals can do to prevent their users from being targets and victims.
DOWNLOAD NOW (REGISTRATION REQUIRED)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Five Critical Components of an Information Security Program
Current market solutions are built to protect the enterprise and are too resource intensive for most organizations to manage. Learn about five key components that any risk-based information security solution must include to cost effectively and efficiently protect information and meet regulatory requirements - regardless of industry, organization size or security skill set.
DOWNLOAD NOW (REGISTRATION REQUIRED)

MORE WHITEPAPERS
 

MOST POPULAR STORIES

Office 2013: 10 Questions To Ask
Is Microsoft Office 2013 right for you? Here are the right questions for small and midsize businesses and enterprises to ask.

Evernote: We're Adding Two-Factor Authentication
After data breach and wide password reset, Evernote accelerates plans to offer additional security to users.

10 Helpful Apps From Uncle Sam
Mobile apps created by federal agencies will help you track NASA missions, travel smoothly and even get tax advice. Check out our latest guide to apps from Uncle Sam.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Collision Course: SDN And Server Virtualization
With every data center resource -- compute, storage and networks -- now virtualized, the push is on to consolidate operational control.
 

WEBCASTS:

Data Protection Management for Enterprises and Service Providers
In this Webcast (Tuesday, March 12, 2013) we will explore the many challenges associated with multi-platform data protection environments and discuss how enterprise IT and service providers can gain the visibility and insight needed to reduce operational expenses and improve protection confidence.
More Information & Registration

MORE WEBCASTS
Click here
 

RESOURCES AND EVENTS:
It's Your Last Chance To Attend Black Hat Europe
Rick Falkvinge, the founder of the Swedish Pirate Party and a campaigner for sensible information policy, will present the keynote address at Black Hat Europe 2013. Black Hat Europe takes place March 12-15 at The Grand Hotel Krasnapolsky in Amsterdam.
It happens March 25-29 in Orlando, Fla.



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Security Update
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Security Update go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

FB: Facebook Worth $35

Facebook Worth $35
by Ryan Perlowin

Facebook (FB) is worth $35 per share, and the stock price will reflect that by midyear.
In one of the most talked-about stock stories of the past 20 years, FB has taken us investors on a wild ride during its first nine and a half months of public trading. First it was the outlandish valuation at the time of the IPO. Then it was the Nasdaq computer glitches on the first day of trading, followed by a sizable one-day spike and a precipitous downfall. The shorts were reveling in success on September 4, 2012, when the stock closed at $17.73, a 61% discount to the highs the stock reached just four months before. But bulls took charge and shares rallied handsomely since reaching those lows - after touching highs close to $33 earlier this year, the stock is currently trading at $27.77, a 57% premium to the September lows. Even after the rally, though, FB is still trading at a 27% discount to the IPO price. read more »

Get Seeking Alpha notifications with our iPhone App | Android App

More on FB

It Will Be A Good Year To Watch Facebook by John Mylant

Facebook And Zynga: Partners In Gambling? by BuySellShort

Facebook's Graph Search Revolution by Ryan Perlowin

Other articles that mention FB

Facebook, Google And Yahoo: Take The Road Less Traveled by Timing Best Buy

Significant Short Interest Increases (Mid-February Update) by Bill Maurer

How ETF Flow Impacts Stock Trading Volume by Minyi Chen


Why are you receiving this? You subscribed to real-time article alerts at Seeking Alpha.
If this email was forwarded to you and you wish to subscribe to this email, click here.

Manage your emails:
Get alerts on additional tickers and manage all your email alert choices here
I'm getting too many emails: manage your email alert choices
I'm no longer following FB: unsubscribe from all FB email alerts
This type of alert isn't helpful to me: unsubscribe from article alerts on FB

To ensure you receive these emails in the future, please add account@seekingalpha.com to your address book, contacts or list of safe senders.

Sent by Seeking Alpha, 345 7th Ave. Suite 1400 New York, NY 10001