MUST READ China Denies U.S. Hacking Accusations: 6 Facts By Mathew J. Schwartz Mandiant report says that an elite Chinese military hacking unit is responsible for launching APT attacks against U.S. businesses. Chinese government cries foul.
Strategy: 3 Steps To A Hands-Free Cloud Virtualization let IT automate the entire life cycle of a server, from provisioning and initialization through steady-state and change management to termination. But this is only the first step on the path to fully coordinated, automated and managed systems. The ultimate goal: orchestration, where business needs can be defined and executed without human intervention. We'll examine the essential elements of orchestration, focusing on public and private clouds. Download Now (Registration Required)
Economics Of Scale-Out Storage Scale-out storage technologies have rapidly gained popularity over the past several years, successfully crossing the chasm from niche technology to mainstream enterprise solution. As this shift occurs, an increasing number of enterprises are seeking to understand the advantages of the newer technology when it comes to the storage of exploding amounts of unstructured data. Download Now (Registration Required)
HTC Claims "Best Phone Ever Made" HTC aims high with their claims for their revamped Android smartphone. Like previous HTC phones this one is aimed at consumers with a focus on media consumption and other lifestyle features, like TV remote control. A shame it lacks microSD storage expansion.
Take Our Backup Technologies Survey -- You Could Win A Nexus 7! There's no excuse for a half-hearted business continuity strategy given today's advanced data protection technologies, including disk-to-disk-to cloud, software dedupe and more. Our 2013 InformationWeek Backup Technologies Survey seeks to gauge use of these and other methods to ensure a disaster doesn't put your business down for the count. Take our survey and you could win a 32GB Google Nexus 7 tablet! Survey ends Feb. 22.
This e-mail was sent to EmailAddress
InformationWeek Daily -- Published By InformationWeek 600 Community Drive Manhasset, NY 11030
To update your profile, change your e-mail address, or unsubscribe, click here.
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: firstname.lastname@example.org
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
Currently we allow the following HTML tags in comments:
These tags can be used alone and don't need an ending tag.
<br> Defines a single line break
<hr> Defines a horizontal line
These require an ending tag - e.g. <i>italic text</i>
<a> Defines an anchor
<b> Defines bold text
<big> Defines big text
<blockquote> Defines a long quotation
<caption> Defines a table caption
<cite> Defines a citation
<code> Defines computer code text
<em> Defines emphasized text
<fieldset> Defines a border around elements in a form
<h1> This is heading 1
<h2> This is heading 2
<h3> This is heading 3
<h4> This is heading 4
<h5> This is heading 5
<h6> This is heading 6
<i> Defines italic text
<p> Defines a paragraph
<pre> Defines preformatted text
<q> Defines a short quotation
<samp> Defines sample computer code text
<small> Defines small text
<span> Defines a section in a document
<s> Defines strikethrough text
<strike> Defines strikethrough text
<strong> Defines strong text
<sub> Defines subscripted text
<sup> Defines superscripted text
<u> Defines underlined text
BYTE encourages readers to engage
in spirited, healthy debate, including taking us to task.
However, BYTE moderates all comments posted to our site,
and reserves the right to modify or remove any content that it determines to be derogatory,
offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM.
BYTE further reserves the right to disable the profile of any commenter participating
in said activities.
In this paper you will learn the five trends shaping
the future of enterprise mobility. Learn how the rise of social media as
a business application, the lurring between work and home, the emergence
of new mobile devices, the demand for tech savvy employees and changing
expectations of corporate IT will fundamentally change the workplace.
In a survey of more than 1,700 information workers
(iWorkers) in North America, notebooks, desktops, and smartphones were
found to be “must-have” devices, while tablets, slates, and netbooks
were relegated to “nice-to-have” status, according to a commissioned
study conducted by Forrester Consulting on behalf of Dell and Intel.