VMware's Stealth Strategy: Gain Public Cloud Revenues
Google Apps Refines Collaboration Tools
Acer Convertible Chromebook, Smartphones Debut At IFA
Microsoft, Google, Mozilla Abandon RC4 Cryptographic Standard
10 Apple Slip-Ups That Bruised Its Reputation
News & Commentary
Data, Analytics Help Fight Forest Fires
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
Cameron Tongier of the US Fish and Wildlife Service Fire Management Branch spoke with InformationWeek from his temporary office near a fire line in Idaho. He's one of several front line wildfire managers we spoke with about the long arc of data analysis that leads up to daily situation reports for wildfire managers.
By Curtis Franklin Jr. Executive Editor, Technical Content, 9/3/2015
Comment0 comments  |  Read  |  Post a Comment
Sony Xperia Z5 Smartphone Stuns With 4K Screen
Eric Zeman,
Commentary
The Sony Xperia Z5 features an incredible Ultra HD display, a 23-megapixel camera, a waterproof chassis, and a two-day battery life. Yet its 4K display is the real stunner.
By Eric Zeman , 9/2/2015
Comment1 Comment  |  Read  |  Post a Comment
Asus Water-Cooled Gaming Laptop Arrives At IFA
David Wagner, Executive Editor, Community & IT Life
News
ASUS announces the world's first water-cooled laptop and it is cool but hard to pin down.
By David Wagner Executive Editor, Community & IT Life, 9/2/2015
Comment0 comments  |  Read  |  Post a Comment
Malware Author Stamped Code 'For Targeted Attacks Only'
Sara Peters, Senior Editor at Dark Reading
News
When the Microsoft Word Intruder Office malware creation kit got too high-profile, the developer changed terms of service, Sophos report says.
By Sara Peters Senior Editor at Dark Reading, 9/2/2015
Comment0 comments  |  Read  |  Post a Comment
Google Apps Refines Collaboration Tools
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Updates to Google Apps offer a way to track recent document changes and content creation assistance driven by machine learning.
By Thomas Claburn Editor at Large, Enterprise Mobility, 9/2/2015
Comment3 comments  |  Read  |  Post a Comment
Microsoft, Google, Mozilla Abandon RC4 Cryptographic Standard
Larry Loeb, Blogger, Informationweek
Commentary
With Microsoft, Google, and Mozilla turning against the RC4 cryptographic suite, the standard will likely die in 2016.
By Larry Loeb Blogger, Informationweek, 9/2/2015
Comment0 comments  |  Read  |  Post a Comment
Acer Convertible Chromebook, Smartphones Debut At IFA
Nathan Eddy, Freelance Writer
News
In addition to its new convertible Chromebook and numerous smartphones, Acer updated its Aspire notebooks and released a tablet targeted at gamers at the 2015 IFA show in Berlin.
By Nathan Eddy Freelance Writer, 9/2/2015
Comment1 Comment  |  Read  |  Post a Comment
VMware's Stealth Strategy: Gain Public Cloud Revenues
Charles Babcock, Editor at Large, Cloud
News
VMware thinks it's gained more ground in the public cloud market than analysts realize; it won't be pushed out by Amazon.
By Charles Babcock Editor at Large, Cloud, 9/2/2015
Comment1 Comment  |  Read  |  Post a Comment
Microsoft's Remarkable Pivot: Windows 10 Abandons Privacy
Mark Weinstein, CEO, MeWe.com
Commentary
You can read all you want about Windows 10 powerful new privacy features, but that doesn’t mean you have them.
By Mark Weinstein CEO, MeWe.com, 9/2/2015
Comment2 comments  |  Read  |  Post a Comment
iPhone 6s: Will Sales Fall Short Of Expectations?
Nathan Eddy, Freelance Writer
News
A Bloomberg Intelligence report indicates Apple faces an uphill sales battle as the expected iPhone 6s and iPhone 6s Plus may underwhelm.
By Nathan Eddy Freelance Writer, 9/2/2015
Comment2 comments  |  Read  |  Post a Comment
Containers 101: 10 Terms To Know
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
News
Application containers have been around for a while in the Linux world, but now Microsoft is moving them into the mainstream. Here's what you need to know about this evolution of server virtualization.
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 9/2/2015
Comment0 comments  |  Read  |  Post a Comment
Baby Monitors Expose Home -- And Business -- Networks
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Researchers find major security flaws in popular networked video baby monitor products that could allow attackers to snoop on babies and businesses.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/2/2015
Comment2 comments  |  Read  |  Post a Comment
Comic: White Hat Car Hacks
Brian Moore, Cartoonist & Illustrator
Commentary
If only most car hacks were this harmless.
By Brian Moore Cartoonist & Illustrator, 9/2/2015
Comment2 comments  |  Read  |  Post a Comment
Google Logo Gets Mobile Makeover
Kelly Sheridan, Associate Editor, InformationWeek
News
Google has swapped out its old logo in favor of a simpler design optimized for a broader range of devices.
By Kelly Sheridan Associate Editor, InformationWeek, 9/2/2015
Comment1 Comment  |  Read  |  Post a Comment
Open Standards Vs. Open Source
Russ White, Principal Engineer, IPOS, Ericsson
Commentary
The process for creating new networking standards, as exemplified by the IETF, is more complex and challenging than open source projects.
By Russ White Principal Engineer, IPOS, Ericsson, 9/2/2015
Comment0 comments  |  Read  |  Post a Comment
Microsoft Insider: 2 Days On Redmond Campus
Kelly Sheridan, Associate Editor, InformationWeek
News
Ever wonder what life is like in Redmond? Here's what I saw during a two-day experience on Microsoft's massive campus.
By Kelly Sheridan Associate Editor, InformationWeek, 9/2/2015
Comment0 comments  |  Read  |  Post a Comment
Cyberspies Impersonate Security Researcher
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
'Rocket Kitten' pro-Iranian regime hackers focusing more on targeting individuals for geopolitical espionage.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/1/2015
Comment1 Comment  |  Read  |  Post a Comment
Google's Nest Thermostat Gets Redesign
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The updated Google Nest thermostat can now sense your presence from across the room.
By Thomas Claburn Editor at Large, Enterprise Mobility, 9/1/2015
Comment3 comments  |  Read  |  Post a Comment
Samsung Gear S2 Watch Skips Android For Tizen
Eric Zeman,
Commentary
Samsung's Gear S2 smartwatch may have a pleasing design and the ability to make calls, but it is handicapped by the Tizen operating system.
By Eric Zeman , 9/1/2015
Comment2 comments  |  Read  |  Post a Comment
Report: Ransomware Jumped 58 Percent in Q2
Sara Peters, Senior Editor at Dark Reading
News
McAfee Threat Labs Report also zooms in on GPU malware and looks back on the first five years of the Intel-McAfee marriage.
By Sara Peters Senior Editor at Dark Reading, 9/1/2015
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Facebook Claims 1 Billion Users In 1 Day
Larry Loeb, Blogger, Informationweek,  8/29/2015
Google Chrome Support For Flash Ads Ends Sept. 1
Larry Loeb, Blogger, Informationweek,  8/31/2015
10 Highest Paying Computer Science Programs
David Wagner, Executive Editor, Community & IT Life,  8/27/2015
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest August 03, 2015
The networking industry agrees that software-defined networking is the way of the future. So where are all the deployments? We take a look at where SDN is being deployed and what's getting in the way of deployments.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio