Thursday, February 7, 2013

P&G CEO Talks Analytics | 7 Moves Dell Must Make Now

If you have trouble viewing this email, read the online version.

InformationWeek Daily
InformationWeek Daily  
  Thursday, February 07, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
Between The Lines Columnist 7 Moves Dell Must Make Now
By Michael Endler
Dell's decision to go private was a bold step, but the company must continue making aggressive decisions to succeed.

RELATED
Dell Goes Private: What's Next?
4 Ways Microsoft-Dell Deal Could Benefit IT

P&G CEO Shares 3 Steps To Analytics-Driven Business
CEO Bob McDonald makes the case that analytics needs to move from the periphery of operations to the "center of how business gets done."

BlackBerry Touts 'Record' Z10 Sales
BlackBerry says sales of its Z10 smartphone are off to a strong start in Canada and the U.K., but doesn't offer hard data.

Microsoft, Symantec Torpedo Massive Botnet
Tech companies team up to take down Bamital botnet, which generated over $1 million annually via search engine click fraud.

Gartner Magic Quadrant Spots Data Warehouse Leaders
Gartner's annual report notes a wave of data warehousing newcomers and leading-edge companies taking advantage of big data.

6 Reasons Hackers Would Want Energy Department Data
In Department of Energy breach, what was driving attackers to steal employee data? Stuxnet revenge is one theory.

Size Doesn't Matter In IaaS Game, ElasticHosts Says
Small infrastructure-as-a-service provider cobbles together a global system of leased spaces to compete with Amazon, Rackspace and other major cloud services.

Email Overload: Can Social Really Help?
Social collaboration platforms promise less email in corporate in-boxes, but do they deliver? The small business Brilliant Life Design finds out with a trial of Sendgine.

QUOTE OF THE DAY
"And in the end, the love you take is equal to the love you make." -- The Beatles

ALSO SEE
Size Doesn't Matter In IaaS Game, ElasticHosts Says
Email Overload: Can Social Really Help?
IT Pro Ranking: Unified Threat Management
Hassle Free Backup Set Up in Three Steps
Windows Phone Tops BlackBerry In U.S.
Mobile Security -- A Holistic Approach
Virtual Event: Hackers Unmasked

Download our iPad App

JOIN THE CONVERSATION
Posted By moarsauce123:
"Since when do Dell and Microsoft make good products? What is inevitable is that the WinDell domination will cause products to become worse."
In reply to: "4 Ways Microsoft-Dell Deal Could Benefit IT"
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD DARK READING'S LATEST DIGITAL ISSUE
Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?

Also in the new, all-digital issue of Dark Reading: The shift in hacking requires a new defense mindset.


DOWNLOAD NOW FREE (Registration Required)

 

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
IT Pro Ranking: Unified Threat Management
Unified threat management appliances combine multiple security functions into a single device to provide a streamlined security infrastructure with a compelling operational cost model. IT pros who use or have used or evaluated UTM appliances assess five vendors -- Check Point Software, Cisco Systems, Dell SonicWall, HP and Juniper Networks -- on critical features such as malware detection, intrusion prevention and throughput.
Download Now (Registration Required)

Featured Report
Strategy: One-Click Disaster Recovery
Automation and orchestration are all the rage among IT architects these days. One of the best places to apply the technology is to disaster recovery. Most organizations still want a "go" button, but after that, timely recovery requires automation. Here's what you need to know to make it happen.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Hassle Free Backup Set Up in Three Steps
Incomplete backups can expose businesses to risks such as lost data, lost employee productivity, and lost business, yet many small businesses have incomplete data protection plans. For some, the costs and complexities of backup are just too overwhelming. Others lack the time and resources to consistently manage backup related software and hardware.
Download Now (Registration Required)


The Growing Email Archiving Dilemma
Read this white paper to find out why SaaS email solutions built on the latest grid technology and from the right vendor can satisfy new archiving demands reliably and cost-effectively in ways that an on-premise solution cannot, with pay-as-you-go pricing, robust technology and expertise to help you meet emerging regulatory, legal and other requirements.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
Windows Phone Tops BlackBerry In U.S.
Windows Phone sales exceeded BlackBerry sales in the U.S. during the fourth quarter of 2012, says Strategy Analytics.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Samsung Galaxy S IV: What To Expect
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.

Anonymous Claims Wall Street Data Dump
Hacktivist group publishes 4,000 passwords as part of Operation Last Resort campaign seeking revenge for the treatment of Internet activist Aaron Swartz.

Top 10 Tech Fails Of 2012
Sometimes technology disappoints. Here are some of the products, services and companies that let us down in 2012.





 

SLIDESHOWS
Samsung Galaxy S IV: What To Expect
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.   View Now

ALSO SEE
BlackBerry 10: Visual Tour Of Smartphones, OS
7 Portals Powering Patient Engagement

MORE SLIDESHOWS
spacer spacer spacer
VIDEOS

CES 2013: It's A Wrap!
While some claim CES has lost its luster and big name headliners over the years, the show refuses to be deemed irrelevant. With trends spanning healthcare, mobile and automotive, there was plenty to see.   Watch

ALSO WATCH
CES; the car show
Intel shows off eye tracking and gesture tech

MORE VIDEOS
spacer
 
WEBCASTS
Mobile Security -- A Holistic Approach
Managing and securing the mobile enterprise requires taking a holistic approach to defending the end-to-end scope of each mobile engagement. Security and management are highly intertwined and prerequisites to one another. Get more details during our webcast on Wednesday, February 6, 2013. More Information & Registration

Click here
 
RESOURCES AND EVENTS
Virtual Event: Hackers Unmasked
In this all-day InformationWeek and Dark Reading Virtual Event, experts and vendors will offer a detailed look at how enterprises can detect the latest malware, analyze the most current cyber attacks, and even identify and take action against the attackers. Attendees will also get a look at how cybercriminals operate, how they are motivated -- and what your business can do to stop them.
It happens Feb. 7 -- Don't Miss It!

Don't Miss Interop Las Vegas
Attend Interop Las Vegas May 6-10, and attend the most thorough training on Apple deployment at the NEW Mac & iOS IT Conference. Use Priority Code DIPR02 by Jan. 26 to save up to $500 off the price of Conference Passes. Join us in Las Vegas for access to 125+ workshops and conference classes, 350+ exhibiting companies, and the latest technology.
Get More Details and Register Today


This e-mail was sent to sojo.blo@gmail.com

InformationWeek Daily
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

Energy Dept. Data Breach: 6 Motivations | Hacking, Privacy Laws Need Reboot?

If you have trouble viewing this email, read the online version.

InformationWeek Government
Join the community
Facebook Twitter LinkedIn
  Thursday, February 7, 2013
News   |   Commentary   |   Slideshows   |   Reports   |   Videos   |   Events   |   RSS Feeds  
MUST READ
CIO Columnist 6 Reasons Hackers Would Want Energy Department Data
By Mathew J. Schwartz
In Department of Energy breach, what was driving attackers to steal employee data? Stuxnet revenge is one theory.

Hacking, Privacy Laws: Time To Reboot
Recent cases highlight serious flaws in current privacy and cyber abuse legislation, allowing prosecutors to wield a hammer when a stick will do.

Fed Breach: Attackers Exploited Website Product Vulnerability
Federal Reserve confirms breach of database with banking executive contact information for use in a natural disaster.

DARPA Funds Python Big Data Effort
Department of Defense has dished out $3 million for Python big data analytics libraries from a $100 million fund for big data research and development.

White House Seeks Tech Innovation Fellows
Program recruits innovators and entrepreneurs to work on "high impact" federal IT projects during six- to 12-month tours of duty.

Feds Update Flu Apps
Centers for Disease Control have updated their two flu apps -- FluView and CDC Influenza -- for the busy flu season.

Microsoft, Symantec Torpedo Massive Botnet
Tech companies team up to take down Bamital botnet, which generated over $1 million annually via search engine click fraud.

ALSO SEE
Feds Update Flu Apps
Microsoft, Symantec Torpedo Massive Botnet
Strategy: One-Click Disaster Recovery
Best Practices Guide for IT Governance & Compliance
Windows Phone Tops BlackBerry In U.S.
Big Data Analytics: Is Your Elephant Enterprise Ready?
2013 InformationWeek Government IT Innovators

Download our iPad App

JOIN THE CONVERSATION
Posted By MyW0r1d:
"Looks like the only result was a political one without delving into where our senior military commanders focus is if they can deal with 30000 emails from an obviously well connected socialite."
In reply to: Hacking, Privacy Laws: Time To Reboot
View Entire Response | Post Your Own Reply

  Digital Issue  
DOWNLOAD DARK READING'S LATEST DIGITAL ISSUE
Wily attackers are using shape-shifting malware to fool your defenses. Are you ready?

Also in the new, all-digital issue of Dark Reading: The shift in hacking requires a new defense mindset.


DOWNLOAD NOW FREE (Registration Required)
 

 
REPORTS & WHITEPAPERS
FEATURED REPORTS
Strategy: One-Click Disaster Recovery
Automation and orchestration are all the rage among IT architects these days. One of the best places to apply the technology is to disaster recovery. Most organizations still want a "go" button, but after that, timely recovery requires automation. Here's what you need to know to make it happen.
Download Now (Registration Required)

Featured Report
How to Conduct an Effective IT Security Risk Assessment
Assessing an organization's security risk is an important element of an effective enterprise security strategy. It's also a key way to justify future security spending to upper management. In this Dark Reading report, we recommend how to conduct an IT security risk assessment -- and how to translate the results into terms that make sense in dollars.
Download Now (Registration Required)
Featured Report

MORE REPORTS

spacer spacer spacer
FEATURED WHITEPAPERS
Best Practices Guide for IT Governance & Compliance
Federal regulations and internal policies both require businesses to know exactly what changes are being made to structured and unstructured data in their corporate networks. This white paper explains the key provisions of four important federal regulations (HIPAA, GLBA, SOX and PCI DSS) details the three steps for establishing and maintaining compliance.
Download Now (Registration Required)


Bloomberg BusinessWeek Agility for Differentiation
Organizations are finding that a cloud-based platform for agile software development provides the speed and flexibility they need to respond to opportunities and market changes. But this will not happen overnight. This research report highlights how organizations are implementing and benefiting from cloud-based agile software development.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
Windows Phone Tops BlackBerry In U.S.
Windows Phone sales exceeded BlackBerry sales in the U.S. during the fourth quarter of 2012, says Strategy Analytics.

10 Best Android Apps Of 2012
Check out these 10 gems that stood out from the crowd of 700,000 Android apps.

Samsung Galaxy S IV: What To Expect
Samsung's Galaxy S phones have become the closest thing to the mythical "iPhone killer" of Android fans' dreams. Here's a look at the next version's likely features.

Anonymous Claims Wall Street Data Dump
Hacktivist group publishes 4,000 passwords as part of Operation Last Resort campaign seeking revenge for the treatment of Internet activist Aaron Swartz.

Top 10 Tech Fails Of 2012
Sometimes technology disappoints. Here are some of the products, services and companies that let us down in 2012.





MORE NEWS  
 
WEBCASTS
Big Data Analytics: Is Your Elephant Enterprise Ready?
Hadoop's cost effective scalability and flexibility to analyze all data types is driving organizations everywhere to embrace big data analytics. From proof of concept to deployment across the enterprise, join Datameer and Hortonworks as we answer the 'now what?' when rolling out your Hadoop big data analytics project. More Information & Registration

Click here
 
RESOURCES AND EVENTS
2013 InformationWeek Government IT Innovators
InformationWeek's 2013 Government IT Innovators program will feature the most innovative government IT organizations in the 2013 InformationWeek 500 issue and on InformationWeek.com. Does your organization have what it takes?
Nominate By April 12



This e-mail was sent to sojo.blo@gmail.com

InformationWeek Government
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To update your profile, change your e-mail address, or unsubscribe, click here.

Thoughts about this newsletter? Give us feedback.


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of the InformationWeek Government Newsletter go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.