Google Details Android M, VR, IoT, And Unlimited Photos
iOS 9 Rumor: Proactive Project Will Rival Google Now
Big Data: 6 Real-Life Business Cases
Meeker: Internet Has Only Begun Changing Our Lives
SAP HANA: Not The Only In-Memory Game In Town
News & Commentary
10 Tech Stars: Will They Deliver in 2015?
David Wagner, Executive Editor, Community & IT Life
News
Juniper Research names the top 10 tech leaders and -- as with any good top 10 list -- we quibble with the rankings.
By David Wagner Executive Editor, Community & IT Life, 5/29/2015
Comment0 comments  |  Read  |  Post a Comment
Converged Infrastructure Delivery Via The Cloud
Alex Henthorn-Iwane, QualiSystems Vice President of Marketing
Commentary
Converged infrastructure helps simplify private clouds, but still require time and effort to design and provision. The cloud is helping streamline the converged infrastructure supply chain.
By Alex Henthorn-Iwane QualiSystems Vice President of Marketing, 5/29/2015
Comment0 comments  |  Read  |  Post a Comment
UN Report Warns Encryption Backdoors Violate Human Rights
Sara Peters, Senior Editor at Dark Reading
News
Report says States should be promoting strong encryption and anonymity tools, not restricting them.
By Sara Peters Senior Editor at Dark Reading, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
Google Details Android M, VR, IoT, And Unlimited Photos
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Google used the opening day of its I/O 2015 developer conference to offer details about the next version of Android, what it has planned for virtual reality and the Internet of Things, and free unlimited photos.
By Thomas Claburn Editor at Large, Enterprise Mobility, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
IRS Attack Demonstrates How Breaches Beget More Breaches
Ericka Chickowski, Contributing Writer, Dark Reading
News
Weak authentication validation assumed only taxpayers would know their Social Security Numbers and other information that criminals have been stealing for years.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
Google I/O: Gmail Hits 900M Users, Android Reaches A Billion
Kelly Sheridan, Associate Editor, InformationWeek
News
Key statistics from this year's Google I/O included one billion Android users and 900 million Gmail users, 75% of whom are on mobile.
By Kelly Sheridan Associate Editor, InformationWeek, 5/28/2015
Comment1 Comment  |  Read  |  Post a Comment
Small-to Mid-sized Organizations Targeted By 'Grabit' Cyberspies
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Rare SMB-focused cyber espionage campaign hitting small firms worldwide.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
'Tox' Offers Ransomware As A Service
Jai Vijayan, Freelance writer
News
The ransomware is free to use but site retains 20 percent of any ransom that is collected, McAfee researcher says.
By Jai Vijayan Freelance writer, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
GE's Kate Johnson: How CIOs Can Be Heroes
Chris Murphy, Editor, InformationWeek
Commentary
GE's new software group CEO aims its industrial Internet message at CIOs, as she helps GE up its software selling game.
By Chris Murphy Editor, InformationWeek, 5/28/2015
Comment3 comments  |  Read  |  Post a Comment
Ads Built By Algorithm
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Persado contends its machine learning system can produce better direct response ads than human ad copywriter.
By Thomas Claburn Editor at Large, Enterprise Mobility, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
iOS 9 Rumor: Proactive Project Will Rival Google Now
Eric Zeman,
Commentary
Apple iOS 9 is shaping up to be more than just a performance upgrade. New details emerge pointing to a stronger competitor, called Proactive, which will challenge Google Now and Microsoft's Cortana.
By Eric Zeman , 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
FUD Watch: The Marketing Of Security Vulnerabilities
Bill Brenner, Information Security Blogger
Commentary
I’m all for raising awareness, but making designer vulnerabilities, catchy logos and content part of the disclosure process is a step in the wrong direction.
By Bill Brenner Information Security Blogger, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
Meeker: Internet Has Only Begun Changing Our Lives
Charles Babcock, Editor at Large, Cloud
News
Kleiner Perkins partner Mary Meeker presents her annual take on how the Internet is changing business, as US and China dominate among Web companies.
By Charles Babcock Editor at Large, Cloud, 5/28/2015
Comment4 comments  |  Read  |  Post a Comment
Lenovo Details Dual-Screen Smartwatch, Smart Shoes
Nathan Eddy, Freelance Writer
News
Lenovo is seriously expanding beyond PCs with several new concepts that tap into the Internet of Things trend. For wearables, Lenovo is showing off a dual-screen smartwatch.
By Nathan Eddy Freelance Writer, 5/28/2015
Comment3 comments  |  Read  |  Post a Comment
SAP HANA: Not The Only In-Memory Game In Town
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
SAP HANA is not the only option for those looking for an in-memory database platform. Big rivals such as Microsoft and Oracle offers similar tech.
By Curtis Franklin Jr. Executive Editor, Technical Content, 5/28/2015
Comment1 Comment  |  Read  |  Post a Comment
Data Theft The Goal Of BlackEnergy Attacks On Industrial Control Systems, Researchers Say
Jai Vijayan, Freelance writer
News
CyberX analysis of BlackEnergy module reveals most likely motive behind sophisticated multi-year attack campaign.
By Jai Vijayan Freelance writer, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
Build WiFi To Weather The IoT Onslaught
Dirk Gates, Executive Chairman & Founder, Xirrus
Commentary
The Internet of Things is coming. The four strategies here can help enterprises future-proof their wireless networks to support the looming demands.
By Dirk Gates Executive Chairman & Founder, Xirrus, 5/28/2015
Comment3 comments  |  Read  |  Post a Comment
Campus Switch Upgrades: How To Make The Case
Dan Conde, Analyst, Enterprise Strategy Group
Commentary
Deciding when to upgrade your campus switch involves ROI considerations, figuring out wireless user requirements, and understanding process implications.
By Dan Conde Analyst, Enterprise Strategy Group, 5/28/2015
Comment4 comments  |  Read  |  Post a Comment
New IT Skills: Why Communication, Accountability, Initiative Are Hot Now
Kevin Casey,
News
Using Bureau of Labor Statistics data and information supplied by CompTIA and Burning Glass Technologies Labor Insights, we've identified eight crucial, non-technical skills that companies are looking for in their IT hires.
By Kevin Casey , 5/28/2015
Comment2 comments  |  Read  |  Post a Comment
Oracle PeopleSoft In The Crosshairs
Ericka Chickowski, Contributing Writer, Dark Reading
News
Presenter at Hack In The Box says PeopleSoft is in worse security shape than SAP was five years ago.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/27/2015
Comment2 comments  |  Read  |  Post a Comment
More Stories
PR Newswire
8 Reasons IT Pros Hate The Cloud
Andrew Froehlich, President & Lead Network Architect, West Gate Networks,  5/25/2015
Google: Your Password Security Questions Are Terrible
Nathan Eddy, Freelance Writer,  5/22/2015
KFC's Bluetooth Placemats: 10 Better Ideas
David Wagner, Executive Editor, Community & IT Life,  5/24/2015
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 Digital Issue, April 2015
The 27th annual ranking of the leading US users of business technology
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
. We've got a management crisis right now, and we've also got an engagement crisis. Could the two be linked? Tune in for the next installment of IT Life Radio, Wednesday May 20th at 3PM ET to find out.