Social media data is not just for marketing anymore. Learn how companies are using these insights in novel ways to turn that data into dollars and cents.By Lisa Morgan Freelance Writer, 7/28/20150 comments | Read | Post a Comment
There are multiple reasons why Cisco's Whiptail acquisition failed, leading the company to discontinue its flash storage products. By Howard Marks Network Computing Blogger, 7/28/20150 comments | Read | Post a Comment
Tonia Williams, CIO of the Housing Authority of the Cherokee Nation, recounts how she was invited to imagine a data center where there was none, and then set out to build it. By Thomas Claburn Editor at Large, Enterprise Mobility, 7/28/20150 comments | Read | Post a Comment
As optimized platforms for the virtualization era, hyperconverged systems are poised to radically transform the data center.By Azmi Jafarey Network Computing Author, 7/28/20150 comments | Read | Post a Comment
In this era of digitization, multimedia and cloud, the network needs to evolve from connectivity to business continuity.By Zeus Kerravala Founder & Principal Analyst, ZK Research, 7/28/20150 comments | Read | Post a Comment
ShenZhen, China-based startup OnePlus shook the high-end smartphone market last year when it produced a well-designed smartphone with the same (or better) specs than premium models -- such as the Apple iPhone and Samsung Galaxy S6 -- and sold it for half the price. Now, version 2 is hitting the market with a new Android OS.By Pablo Valerio International Business & IT Consultant, 7/27/20154 comments | Read | Post a Comment
Critical vulnerability in Android's multimedia playback engine is easy to exploit, requires no user interaction, and affects 95 percent of Android devices. By Sara Peters Senior Editor at Dark Reading, 7/27/20150 comments | Read | Post a Comment
There is a direct correlation between how quickly an organization can identify and contain a data breach and the financial consequences that may result.By Stephen Treglia JD, HCISPP, Legal Counsel & HIPAA Compliance Officer- Investigations, Absolute Software, 7/27/20150 comments | Read | Post a Comment
A new report shows that the iPhone kill switch may not be as effective as first thought. What does this mean for other smartphone kill switches? By Eric Zeman , 7/27/20156 comments | Read | Post a Comment
Amazon's second-quarter earnings showed a small but unexpected profit. Some say the company is now worth more than the world's biggest brick-and-mortar retailer.By Charles Babcock Editor at Large, Cloud, 7/27/20153 comments | Read | Post a Comment
Google researchers have compared the security practices of experts to non-experts, and identified several ways that typical Internet users can improve their online security.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/27/20154 comments | Read | Post a Comment
The highly anticipated launch of Windows 10 finally arrives on July 29. Here are 10 things you should know about the impending release.By Nathan Eddy Freelance Writer, 7/27/20154 comments | Read | Post a Comment
Sussex County, NJ, built a cloud-based virtual desktop infrastructure for a mobile workforce. The project earned the organization a spot in the 2015 InformationWeek Elite 100.By Curtis Franklin Jr. Executive Editor, Technical Content, 7/27/20151 Comment | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.