Wednesday, August 28, 2013

Microsoft Transition: Ballmer's Legacy Incomplete

If you have trouble viewing this email, read the online version.

InformationWeek's Enterprise Software
 
Join the community
Facebook Twitter LinkedIn
  August 28, 2013
Michael Endler Ballmer's Legacy Still Incomplete
Clearly, Ballmer had to go. But will Microsoft's "device and services" plan seem any more viable once a new CEO takes over?

READ THE ENTIRE ARTICLE AND POST YOUR THOUGHTS
COMMENTARY
Why Ballmer's Departure Isn't On My Worry List
Yes, our organization is heavily invested in Microsoft products, but here's why the CEO's exit won't keep me up at night.

Ballmer Is Off The Matrix
Microsoft's outgoing CEO couldn't see the desktop for the tiles.


NEWS & ANALYSIS
Social Business Demands Working Out Loud
Encourage employees to narrate their work as part of doing their work.

Is Yammer-SharePoint Integration Right For You?
Yammer is poised to address some of Microsoft SharePoint's shortcomings. Will the combination work for your enterprise?

Hadoop According To Hortonworks: An Insider's View
Shaun Connolly, Hortonworks VP of corporate strategy, dishes on Hadoop 2.0., competition with Cloudera and the threat of big data commoditization.

New York State Chooses Office 365
Microsoft's Windows 8 might be struggling, but Office 365 is a cloud juggernaut. Its latest customer: New York State, which will move 120,000 employees to the popular cloud office suite by the end of the year.

SugarCRM Goal: Better Sales Tools
SugarCRM says competitors have fallen short in helping salespeople sell, but new Sugar 7 features will fill that gap.

Windows 8.1 Released To Manufacturers
Microsoft puts Windows 8.1 in PC and tablet makers' hands. But according to Forrester analyst, there might not be many customers waiting.


 
FEATURED REPORTS and FEATURED WHITEPAPERS
  • Strategy: How Cybercriminals Operate

    Knowing your enemy is the first step in guarding against him. In this Dark Reading report, we examine the world of cybercriminals — including their motives, resources and processes — and recommend what enterprises should do to keep their data and computing ...

  • Social Stacks: The New Business Imperative

    As compelling as social business is, many organizations have not adopted social products or processes. In this report, we examine why social business cannot be ignored and recommend how companies can pave the way for success.

MORE REPORTS
spacer spacer spacer
  • The Future of Email and Applications Is Social

    This white paper examines the state of collaboration in today's enterprise and provides an IBM point of view on how collaboration will evolve, along with how Notes and Domino software will fit into the new collaboration equation.

  • Top 10 Financial Industry Cybersecurity Myths Busted

    In the financial industry, an organization's reputation and its ability to maintain the security of personal or payment information are crucial to customers. Download the following list of top security myths for financial institutions to avoid as they strive to ...

MORE WHITEPAPERS
 

WEBCASTS
  • Vulnerability Management Challenges and Best Practices Revealed

    During this webinar, IBM Security Systems will discuss the issues and obstacles many encounter as they attempt to identify and prioritize security risks and exploitable vulnerabilities. They will also share details on the newest member of the QRadar Security Intelligence ...

 
RESOURCES AND EVENTS


This e-mail was sent to sojo.blo@gmail.com

InformationWeek Enterprise Software
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Windows 8.1 Moves Forward | Wall Streeters Charged With Code Theft

If you have trouble viewing this email, read the online version.

InformationWeek Daily
InformationWeek Daily  
Join the community
Facebook Twitter LinkedIn
  August 28, 2013
MUST READ
Mathew Schwartz Feds Charge Wall Street Traders With Code Theft
Three men accused of stealing Flow Traders' proprietary high-frequency trading information and algorithms.



Windows 8.1 Released To Manufacturers
Microsoft puts Windows 8.1 in PC and tablet makers' hands. But according to Forrester analyst, there might not be many customers waiting.

NY Times Caught In Syrian Hacker Attack
Hacks amount to "warning shots," threatening more widespread cyberattacks should the U.S. and allies launch military campaign against Syria, warns security expert.

Why Ballmer's Departure Isn't On My Worry List
Yes, our organization is heavily invested in Microsoft products, but here's why the CEO's exit won't keep me up at night.

Nokia, Microsoft Plan New Windows RT Tablets
Both Nokia and Microsoft prep new Windows RT tablets with formidable features -- and in Nokia's case, formidable prices.

Where Do Data Scientists Come From?
Data experts aren't uniformly distributed around the globe. Prepare to be surprised at some of the best countries and cities for data expertise.

Facebook Reveals Government Requests For User Data
Facebook says the U.S. topped the list, making about half the total requests.


QUOTE OF THE DAY
"A genuine leader is not a searcher for consensus but a molder of consensus." -- Martin Luther King, Jr.


 
FEATURED REPORTS and FEATURED WHITEPAPERS
  • 5 Most Common Security Pitfalls in Software Development

    When it comes to software development, security is often a second or even third thought—behind time to deployment and availability. In this Dark Reading report we recommend five best practices that will provide the biggest bang for the buck ...

  • Strategy: How Cybercriminals Operate

    Knowing your enemy is the first step in guarding against him. In this Dark Reading report, we examine the world of cybercriminals — including their motives, resources and processes — and recommend what enterprises should do to keep their data and computing ...

MORE REPORTS
spacer spacer spacer
MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Top Password Managers
Tired of being stuck in password hell? Consider these password managers that balance security with convenience.

Samsung Confirms Galaxy Gear Smartwatch
Samsung will debut wearable computer Sept. 4, says exec, but it may not yet be ready for consumers.

Hackers Target Java 6 With Security Exploits
Security experts spot code that attacks vulnerability in Java 6, urge users to upgrade to Java 7 immediately.

Big Data Analytics Master's Degrees: 20 Top Programs
These one-year and two-year graduate programs are just what's needed to close the big-data talent gap. Read on to find a school that fits your ambitions and background.

Facebook Addiction: A Shocking Cure
When self-control doesn't work, try electricity, say MIT inventors.

 

SLIDESHOWS
13 Favorite iOS, Android Apps
Avoid password hell, simplify smartphone typing and win back battery life with this baker's dozen of Android and iOS mobile apps.   View Now

ALSO SEE
10 Cool Back-To-School Tech Tools
Hubble Telescope's New Images: Galaxies Through Time

MORE SLIDESHOWS
spacer spacer spacer
VIDEOS
NSA Director Speaks Out About Agency's Newly Revealed Surveillance Programs
Gen. Keith Alexander told Black Hat USA attendees how leaked surveillance programs helped derail specific terror plots   Watch

ALSO WATCH
Huawei's Role in Bringing 4G LTE to Market
Huawei's BYOD Solution Promotes Enterprise Mobile Revolution

MORE VIDEOS
spacer
 
WEBCASTS
  • Vulnerability Management Challenges and Best Practices Revealed

    During this webinar, IBM Security Systems will discuss the issues and obstacles many encounter as they attempt to identify and prioritize security risks and exploitable vulnerabilities. They will also share details on the newest member of the QRadar Security Intelligence ...

 


This e-mail was sent to sojo.blo@gmail.com

InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.