Jan 26, 2011 (02:01 PM EST)
Will Apple, Google Lead A Mobile Payment Revolution?

Read the Original Article at InformationWeek

InformationWeek Daily: Issue Highlights    Manage Subscription  |  Contact Us

TOP STORY: Will Apple, Google Lead A Mobile Payment Revolution?

MORE NEWS: Cisco Expands SMB Networking, Storage

ANALYTIC REPORT: State Of Enterprise Storage Report

WHITEPAPER: IPv4 Address Pool Will Run Dry: Network Management Whitepaper

SLIDESHOW: Inside Watson, IBM's Jeopardy Computer

VIDEO: Tutorial: 10 Steps To Mobile Worker Support

BLOG: Cloud Computing Inefficient?

WEBCAST: Tips and Tricks on Memory Management in Virtualized Environments

RESOURCES: Nominate Healthcare IT Execs


InformationWeek Daily

InformationWeek Daily

 

Wednesday, January 26, 2011

 

QUOTE OF THE DAY...
"People who have what they want are fond of telling people who haven't what they want that they really don't want it." -- Ogden Nash

INFORMATIONWEEK.COM   |   NEWS   |   ANALYTIC REPORTS & WHITEPAPERS   |   BLOGS   |   WEBCASTS   |   RESOURCES

TODAY'S TOP STORY

Will Apple, Google Lead A Mobile Payment Revolution?
By adding near-field communications to the iPhone and iPad, Apple -- along with Google -- may provide the spark needed to ignite mainstream use of mobile payments. Will plastic credit cards truly become a thing of the past?

RELATED INSIGHTS
Google Prepping Retail Mobile Payment Service
Amazon EC2 Achieves Payment Industry Certification
13 Technology Predictions For 2011

ALSO SEE
Cisco Expands SMB Networking, Storage
In partnership with Mozy, the networking provider is offering online backup to small and midsize businesses as well as introducing a managed switch and network security firewall.

Twitter Worm Unleashes Fake AV Attack
Google's goo.gl link shortening service, as well as code obfuscation with RSA public key cryptography algorithm are spreading malicious links via a bogus antivirus campaign.

Global CIO: Google's Eric Schmidt: Top 10 Reasons Mobile Is Always #1
"The answer should always be mobile first," outgoing Google CEO Eric Schmidt said last year--and his compelling arguments are even more persuasive today.

Amazon Cloud Gets Bulk Email Service

Simple Email Service offers AWS customers a low-cost, hosted option to on-premises or third-party email systems.



Google Voice Enables Number Porting

Now instead of being stuck with some random phone number, Google Voice users can transfer their mobile or home number to the service.



E-Gov Trumps Facebook On Consumer Satisfaction

Most citizens are happy with federal Web sites, and successful e-gov initiatives are fostering trust in the government, reports Foresee study.



Secret Service Training Enhanced By 3D Gaming Tech

The Site Security Planning Tool will use virtual reality to help prepare agents for real-life threats.



Google Apps Marketplace Adds Education Category

Schools using Google Apps will find a set of applications tailored to the needs of education customers.



Health Systems Underestimate EMR Costs

Accenture study finds that IT expenses increased 80% during electronic medical records system implementation, and higher costs are sustained over the long term.



Qwiki Launches Multimedia Search Engine

Facebook co-founder Eduardo Saverin’s startup launches public alpha days after getting an $8 million cash infusion.



Apple Taps NSA Alumnus As Global Security Chief

Geekonomics author David Rice is the latest in a string of high-profile security hires for the company.



  Digital Issue  
DOWNLOAD DARK READING'S FIRST-EVER DIGITAL ISSUE

Cutting-edge attacks like Stuxnet and Zeus will be the everyday exploits of the future. Here's what you need to know. That and more -- including five best practices to improve the budgeting process for security spending -- in the debut all-digital issue of Dark Reading.


DOWNLOAD NOW (Registration Required)

 


ANALYTIC REPORTS & WHITEPAPERS

FEATURED REPORTS

State Of Enterprise Storage Report
Budgets may be stagnant, but the recession has not put a damper the growth of enterprise data and related storage requirements. Too bad, then, that our infrastructures aren't keeping pace, according to our survey respondents. In this report we'll analyze poll results and discuss top technologies that can help storage managers do more with less.
Download Now (Registration Required)

Featured Report

Beating Cloud Lock-In: Our 3 Top Considerations
Whether you're talking about SaaS, IaaS, or storing data in the cloud, companies must consider how they'll unwind relationships -- customizations, metadata, contracts, and depth of integration are all factors.
Download Now (Registration Required)

Featured Report

MORE ANALYTICS

spacer spacer spacer

FEATURED WHITEPAPERS

IPv4 Address Pool Will Run Dry: Network Management Whitepaper
Compliance for compliance's sake is not a best practice in protecting cardholder data. Learn why compliance is the byproduct of a well-executed information security program that focuses on risk managementand minimizes the use of compensating controls. Download Now

The Cloud-based Telework Solution
By combining a cloud-based management platform with user-friendly devices, discover a new approach to remote access with the simplicity, centralized visibility & control, and economies of scale. Download Now

MORE WHITEPAPERS AT


MULTIMEDIA

SLIDESHOWS


Inside Watson, IBM's Jeopardy Computer
IBM has spent four years and untold hundreds of millions of dollars developing Watson, a computer that can play Jeopardy. In fact, Watson answers questions so quickly and accurately that IBM challenged Jeopardy and two of the show's all-time champions to a match. Cynics may call it a publicity stunt, but the project has brought real advances in computer science. Here's a look inside the architecture, hardware, and advanced analytics that make Watson tick.   View Now


ALSO SEE

12 Money Saving Tech Tips For SMBs

Inside Joomla 1.6: Improved Access Control, Categories

MORE SLIDESHOWS

spacer spacer spacer

VIDEOS


Tutorial: 10 Steps To Mobile Worker Support
Find out ways a company can support workers' mobile computing/connectivity requirements, securely and economically.   Watch

ALSO WATCH

Intel Educational Exchage for Parallelism

CES 2011: Cellcontrol Device Sets And Enforces Safe Driving Policies

MORE VIDEOS

spacer


TODAY AT THE BLOG


FEATURED BLOG
Featured Blogger

Cloud Computing Inefficient?
By Paul Korzeniowski
A growing number of businesses are deploying cloud services ' especially private clouds, according to research conducted by Osterman Research and Electric Cloud. However, a majority of companies report that these services are underutilized.

ALSO SEE

Deduplication 2.0 - Recovery Performance
By George Crump
'It's all about recovery', you'll here it in almost every sales presentation by a backup vendor. That advice holds true for backup deduplication devices as well. A common mistake is to assume that because deduplication products, most often disk based, that they also offer the best recovery performance. This is not always the case and as we move into the next dedupe era it has to improve.

First WebOS Tablet Revealed
By Ed Hansberry
The fruits of HP's acquisition of Palm are starting to show up. The HP Topaz tablet has been spotted and not surprisingly, the name "Palm" is nowhere to be seen.


New Age of Mobile Malware On Way
By George Hulme
New types of malware are emerging, designed specifically to exploit the unique features of mobile handsets.

Motorola Xoom To Cost $700. Or $800
By Eric Zeman
Conflicting reports put the price tag of Motorola's unreleased Android 3.0 tablet at either $700 or $800, with a launch of February 17.

WEBCASTS

Tips and Tricks on Memory Management in Virtualized Environments
Join this informative webcast and gain a greater appreciation for the strategies experts use today in managing their virtual environments. Attendees will gain a better understanding of how to recognize where memory constraints are impacting performance. We'll also explore how memory ballooning and swapping may impact the performance of your virtualized applications.

It happens Tuesday, February 8, 2011 More Information & Registration

--------------------------------------------------
This issue is sponsored by LinkTek:
--------------------------------------------------
Don't take unnecessary risks during your data migration! Moving or renaming files and folders can break (corrupt) thousands of links in your users' files. New, patented technology lets you migrate files without creating broken links! Use LinkFixerPlus to eliminate the risk of broken links in Excel, Word, PowerPoint, Access, PDF, AutoCAD, MicroStation, PageMaker, InDesign, HTML and other types of files.
Download your FREE trial version now!


RESOURCES AND EVENTS

Nominate Healthcare IT Execs
We're looking for forward-thinking IT leaders for InformationWeek's Healthcare CIO 25 - people who exemplify the new leadership role that IT plays at healthcare provider organizations.

Send a brief description of your nominee to iwhealthcare@techweb.com

We'll See You At Interop Las Vegas
Get up to speed on IT innovations in cloud computing, virtualization, security, and more at Interop Las Vegas, May 8-12.
Register Today

Plugging The Leaks: Finding And Fixing The Security Holes In Your Enterprise
In this all-day virtual event sponsored by Dark Reading and InformationWeek, you'll find out how criminals target the flaws in your IT environment, and you'll get some insight on the best methods for finding and fixing your vulnerabilities -- before you're hit by malware or unauthorized access.

You'll also get a look at the reasons why insiders may leak data to the outside, and get some recommendations on how to stop those leaks before they happen.
It happens Feb 3. (Free registration required.)


This e-mail was sent to %%email%%

InformationWeek Daily Newsletter
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


To subscribe to our other newsletters, change your e-mail
address or format (Text/HTML) or to unsubscribe, click here

Keep Getting This Newsletter
Don't let future editions of InformationWeek Daily go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

GET MORE OUT OF INFORMATIONWEEK
Keep up with the latest news, insights and trends as InformationWeek reports them:

newsletters
Facebook
Twitter