RefBan

Referral Banners

Monday, June 13, 2011

IBM's Top Acquisitions Target Analytics, Cloud Domination; Google Wallet Security Solid Until It's Hacked

Don't miss a single issue of eWEEK Finance Update. Add newsletters@response.eweek.com to your address book. View newsletter in a browser
eWEEK.com Finance Update Finance Update
HOME NEWS REVIEWS OPINIONS BLOGS VIDEOS PODCASTS SUBSCRIBE
Storage | Security | Channel | Infrastructure | CIO | ALL TOPICS
TOP STORIES - June 13, 2011
IBM's Top Acquisitions Target Analytics, Cloud Domination
Google Wallet Security Solid Until It's Hacked
Amazon Web Services Hosting Banking Malware: Kaspersky
Fake LinkedIn Messages Install Zeus Malware on Victims' Computers
$1 Trillion in Revenue for Mobile May Not Be Enough
SPOTLIGHT
9 Summer Smartphones Worth the Wait
Expect to see dual-core processors, near-field communications tech, 4G connectivity and HD video streaming.
READ MORE >>
BEST OF eWEEK
Galaxy Tab Poses Major Threat to iPad
Google Wallet: Easy Mobile Payments
Android, Chromebook Questions Linger
Michael Eisner-Style Smarter Management
FEATURED VIDEO
BI Goes to Head of the Class
Colleges are now offering business intelligence and analytics courses, degrees.
WATCH NOW >>
MOST READ STORIES
IBM at 100: Biggest Hits and Misses
New Additions to Sprint's Android Arsenal
Intel Labs Offers a Glimpse at IT's Future
Mac OS X 'Lion,' iOS 5 Converge in iCloud
IN THIS ISSUE
IBM's Top Acquisitions Target Analytics, Cloud Domination
IBM has had a history of making strategic acquisitions over the years, but big software buys did not start until former IBM CEO Lou Gerstner set out to get Lotus in 1995 and then Tivoli in 1996. And under the leadership of Samuel Palmisano since 2002, IBM launched a series of acquisitions, which the company says will remain a part of the company's growth strategy through 2015.
READ MORE >>

Google Wallet Security Solid Until It's Hacked
Google has taken great pains to secure its Google Wallet mobile payment service, employing a secure NFC chip to store credit card information. Security experts discuss ways malicious apps might attack Wallet.
READ MORE >>

Sponsored by IBM


If you love your HP Itanium system but want to get off Oracle DB, try IBM DB2 on HP instead.
Click here to learn more
ADVERTISEMENT
Amazon Web Services Hosting Banking Malware: Kaspersky
Security researchers have long warned that cloud services were providing cyber-criminals with extensive computing resources. And now a Kaspersky researcher uncovered an example of how Amazon's cloud services are being used to spread malware.
READ MORE >>

Fake LinkedIn Messages Install Zeus Malware on Victims' Computers
Social networking site LinkedIn is being used to find victims and then to send maliciously crafted emails to compromise enterprise workstations.
READ MORE >>

$1 Trillion in Revenue for Mobile May Not Be Enough
Mobile network operators are creating a huge market, the size of which is matched by only a few other mega-industries. With revenue on track for $1 trillion within the next five years, analysts nevertheless predict it will not be enough for these companies to make a profit.
READ MORE >>

Featured White Papers
How to Get Started with Cloud Computing
View this panel discussion with IBM cloud computing leaders on how enterprises can get started with cloud computing -- reviewing which workloads make sense to move first and the right type of cloud for workloads.
DOWNLOAD NOW >>

Oracle Databases on VMware vSphere 4: A Guide
This document will also show that the same best practices, tuning tips and tricks, and skill sets necessary to deploy Oracle databases in physical environments can be leveraged when deploying Oracle databases in virtual environments.
DOWNLOAD NOW >>


Featured Webcasts
Best Practices for Virtual Machine Backups to the Cloud
Jun 16, 2011 at 2:00 p.m. Eastern / 11:00 a.m. Pacific (60 minutes)
To resolve this conflict some businesses have embraced legacy agent and tape-based approaches that over time become too costly to manage and can fail to meet service level requirements. For many organizations new approaches such as backup and archive to cloud storage solves the dilemma.
REGISTER >>

What Can Identity Management Do for You?
Jun 15, 2011 at 1:00 p.m. Eastern / 10:00 a.m. Pacific (60 minutes)
Register today for this online event to hear industry experts compare and contrast different architectures such as synchronization-based and event-based models. Executives will discuss the common problems most enterprises face when they address identity management, and give you valuable insight into how identity management can become the center of most, if not all, of your IT-management policies.
REGISTER >>


Sign up for complimentary digital subscriptions to eWEEK, CIO Insight and Baseline magazines and receive a 360 view of today's technology arena. eWEEK gives you expert products reviews that help you choose the best technologies for your organization. CIO Insight provides a high-level look at technologies and processes, that enable you to design IT strategies that support your entire enterprise. And Baseline takes you to the front lines, with in-depth case studies of how your peers in other companies integrate technology with business and bring real value to their organizations. Sign Up Today.

eWEEK Newsletter Information
You are currently subscribed to the eWEEK.com Finance Update newsletter as: dwyld.kwu.wyldside@blogger.com
If you no longer wish to receiveeWEEK.com Finance Update, unsubscribe here

Ziff Davis Enterprise
28 East 28th Street
New York, New York 10016
Privacy Policy

No comments: