MUST READ 9 Ways Hacktivists Shocked The World In 2012 By Mathew J. Schwartz Despite the arrests of alleged LulzSec and Anonymous ringleaders, ongoing attacks -- including Muslim hackers disrupting U.S. banks -- prove hacktivism remains alive and well.
JOIN THE CONVERSATION Posted By Nokuchikushi: "I don't know anyone who craves Windows. Ballmer and Gates think people love Windows. The truth is most people tolerate it because they don't have a choice. They don't leave their mundane job where they have to work on a Windows computer all day and think, 'Boy, I need to get me some more Windows.' It just doesn't happen." In reply to:Microsoft's Big Hits And Misses Of 2012 View Entire Response | Post Your Own Reply
REPORTS & WHITEPAPERS
FEATURED REPORTS Research: 2012 Mobility/BYOD Staffing Survey IT's forging ahead with mobile computing but may not be able to find people with needed skills -- or the budget to pay for them. While 15% of survey respondents plan to increase staff in the area of mobility in the next year, 38% of those who identify it as a top area of staffing increase say a shortage of workers is holding them back from adopting mobile tech, and 19% worry that salary demands will exceed their budgets. Download Now (Registration Required)
FEATURED WHITEPAPERS IDC: Real-Time Compression Advances Storage Optimization It should come as no surprise that storage budgets are constantly under pressure from opposing forces: On one hand, economic forces are pushing budgets to either stay flat or, in many cases, shrink as a percentage of a company's revenue. On the other hand, the infrastructure struggles to keep up with the pace of data growth, pressured by many variables, both social and economic. Businesses have no choice but to acclimate their storage infrastructure to the unprecedented levels at which data is growing. Download Now (Registration Required)
Is Your Network Ready for BYOD? Simply preventing personal devices from accessing your network might not be the best option for your business. A well thought out BYOD policy and the proper wireless security strategy can empower your employees, save costs, and increase productivity while maintaining security and control. Join us January 24 to find out what you need to consider when implementing a BYOD policy. More Information & Registration
Don't Miss Cloud Connect Silicon Valley Cloud Connect returns to Silicon Valley, April 2-5, 2013, for four days of lectures, panels, tutorials and roundtable discussions on a comprehensive selection of cloud topics taught by leading industry experts. Use priority code DIWEEK by Jan. 1 to save up to $700 with Super Early Bird Savings. Register Today!
This e-mail was sent to EmailAddress
InformationWeek Daily -- Published By InformationWeek 600 Community Drive Manhasset, NY 11030
To update your profile, change your e-mail address, or unsubscribe, click here.
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions of InformationWeek Daily go missing. Take a moment to add the newsletter's address to your anti-spam white list: email@example.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.