Aug 26, 2011 (09:08 AM EDT)
HP's Identity Crisis | 8 Reasons Apple Will Dominate Decade

Read the Original Article at InformationWeek

InformationWeek Daily
InformationWeek Daily 
  Friday, August 26, 2011
REPORTS & WHITEPAPERS   |   MOST POPULAR   |   SLIDESHOWS & VIDEO   |   WEBCASTS   |   RESOURCES  
MUST READ
Between The Lines Columnist Jobs's Legacy: 8 Reasons Apple Will Dominate The Decade
By Tom Claburn
Apple has new leadership, but the company can be expected to continue on the path defined by its departing CEO.

RELATED
10 Key Steve Jobs Moments and Innovations
5 Succession Planning Lessons From Steve Jobs

HP Must Decide What It Wants To Be
CEO Leo Apotheker must articulate a vision that HP's employees can rally around and customers can understand.

Forrester Names 4 Leading Enterprise Social Platforms
Check out the early leaders in the race for best internal social communication tools.

Android Licensing Terms Welcome Crapware
Software that comes preinstalled on computers by the manufacturers, like trial versions of antivirus software, games, photo services, and anything else you can think of, are generally called crapware.

Insulin Pump Hack Controversy Grows
Security researcher--and pump user--who found the flaw takes medical device manufacturer Medtronic to task for its response to the security vulnerability.

Apache Issues Workarounds For 'Killer' Attack
Development team spells out mitigation strategies for DDoS threat in advance of patch release.

Salesforce To Acquire Crypto Provider
SaaS provider's purchase of Navajo Systems could help allay some cloud security skeptics' concerns, experts say.

Earthquake Shows Faults In Traditional Telecom Model
What we need are systems that actually function when traffic scales up rapidly. Yesterday's circuit-based telecom network simply can't do that.

QUOTE OF THE DAY
After a storm comes a calm. -- Matthew Henry

ALSO SEE
Salesforce To Acquire Crypto Provider
Earthquake Shows Faults In Traditional Telecom Model
Virtually Protected: Key Steps To Safeguarding Your VM Disk Files
The Evolving Role of IT Managers and CIOs
10 Key Steve Jobs Moments and Innovations
Leap-Frog The Limitations of SOA
Please Take Our Virtualization Management Survey

JOIN THE CONVERSATION
Posted By Beelzebubba:
"If Microsoft paid more attention to beta tech and user feedback concerning many incompetent and abusive crapware, bloatware, "features" BEFORE they rolled out the "product". But they don't. I mean, who oked a 2-10 minute shutdown for XP? Joe Cretin? Apparently."
In reply to: Windows 8: Four New File Management Features Emerge
View Entire Response | Post Your Own Reply

Posted By gns:
"Apple and Steve Jobs will be forever a part of American business history. A legacy really... something that people launching new firm’s years from now will look at and try to mimic. Most will fail."
In reply to: Jobs's Legacy: 8 Reasons Apple Will Dominate The Decade
View Entire Response | Post Your Own Reply


 
ANALYTICS & WHITEPAPERS
FEATURED REPORTS
Virtually Protected: Key Steps To Safeguarding Your VM Disk Files
We provide best practices for backing up VM disk files and building a resilient infrastructure that can tolerate hardware and software failures.
Download Now (Registration Required)
Featured Report

Very Virtual: Storage For Highly Converged Networks
Enterprises are moving beyond server consolidation, widely implementing server virtualization technologies. But these systems radically alter the storage workloads. Beyond performance, server virtualization demands a new level of connectivity and integration between host and storage.
Download Now (Registration Required)
Featured Report

MORE ANALYTICS

spacerspacerspacer
FEATURED WHITEPAPERS
The Evolving Role of IT Managers and CIOs
Mounting regulatory demands, the growth of 24x7 online business and the constant shadow of an uncertain economy underscore the importance of managing risk in all forms - whether related to business, data or events. Download this white paper to review results from the Global Risk Study. Learn the challenges associated with IT risk, the steps IT managers and CIOs are taking to better understand, confront and resolve this concern.
Download Now (Registration Required)


Security Threat Report 2011 Released
Malware is complex, seemingly everywhere and is often difficult to stop. It knows how to find your data-even on your mobile device and Mac. Targeting high-profile organizations, damaging data loss incidents and web threats - such as fake antivirus and SEO poisoning-continue to make headlines for malware attacks this year. Download the latest report to understand how the latest threats work and how to keep your business safe.
Download Now (Registration Required)


MORE WHITEPAPERS
 
MOST POPULAR NEWS
10 Key Steve Jobs Moments and Innovations
Under the leadership of Steve Jobs, Apple became a technology leader and cultural force. Take a look back at some favorite Jobs moments and ideas.

Jobs's Legacy: 8 Reasons Apple Will Dominate The Decade
Apple has new leadership, but the company can be expected to continue on the path defined by its departing CEO.

Windows 8: Four New File Management Features Emerge
Efficiently corralling and copying files has never been one of Windows' strong suits, but the next version could offer big improvements.

Apple's Past And Future: Analysis Around The Web
As Steve Jobs resigns, we all wonder what the next chapter will be for the technology company like no other. Here's a look at historic moments and pending questions.

Apple's Jobs Resigns: The Speech We Wish He'd Given
During June's Apple WWDC, the thought was unavoidable: Was this the last time we'd see Steve Jobs on stage? Here's how I wish -- selfishly, of course -- he could have constructed his exit, one befitting of this unique man and company.

 

SLIDESHOWS

10 Key Steve Jobs Moments and Innovations
Under the leadership of Steve Jobs, Apple became a technology leader and cultural force. Take a look back at some favorite Jobs moments and ideas.   View Now


ALSO SEE
10 Lessons Learned By Big Data Pioneers
VMware Pricing Controversy: Exclusive User Research

MORE SLIDESHOWS
spacerspacerspacer
VIDEOS

WhisperCore Mitigates Risks Of Android In Businesses
TechWebTV catches up with Whisper Systems' CTO and co-founder Moxie Marllinspike to discuss and demo WhisperCore -- a mobile security solution that brings BlackBerry-like centralized enterprise-grade security to Android devices.   Watch

ALSO WATCH
MANDIANT CSO Talks Threats To His Company and His Clients
Intel Labs Invests in the Future of Cloud and Embedded Computing

MORE VIDEOS
spacer
 
WEBCASTS
Leap-Frog The Limitations of SOA
Discover how your IT organization can infuse new vitality into your SOA -- and keep pace with ever-changing business demands -- when you attend this eye-opening FREE webinar. It happens Tuesday, August 30, 2011 -- Time: 11:00 am PT / 2:00 pm ET More Information & Registration

Click here
 
RESOURCES AND EVENTS
Please Take Our Virtualization Management Survey
InformationWeek Analytics is conducting a survey on the current state of virtualization. Respond to the survey and be eligible to win an iPod Touch.
Take the survey now -- ends Aug. 26

Don't Miss Interop New York
See the latest IT solutions at Interop New York. Learn to leverage business technology innovations--including cloud, virtualization, security, mobility, and data center advances--that cut costs, increase productivity, and drive business value. Save 25% on Flex and Conference Passes or get a Free Expo Pass with code CPFHNY25. It happens in New York City, Oct. 3-7, 2011.
Register Today


This e-mail was sent to %%email%%

INFORMATIONWEEK DAILY
-- Published By InformationWeek
600 Community Drive
Manhasset, NY 11030


Subscribe to our other newsletters.
Change your e-mail address or format (Text/HTML)
or unsubscribe


Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.