Google's Mobile Algorithm Change: 5 Things To Know
Microsoft Offers Azure Service Fabric For Distributed Apps
Google Maps Lets Users Search For Loch Ness Monster
Comic: Machine Learning
10 IT Hiring Trends Confounding Private, Public-Sector CIOs
News & Commentary
10 Trailblazing Companies For Women In IT
Kelly Sheridan, Associate Editor, InformationWeek
News
On the following pages, we'll take you beyond the tech sector to highlight companies across all industries that provide strong, supportive, and flexible work environments for female employees.
By Kelly Sheridan Associate Editor, InformationWeek, 4/21/2015
Comment0 comments  |  Read  |  Post a Comment
RSA: Follow Keynote Sessions on Dark Reading
Sara Peters, Senior Editor at Dark Reading
News
From the Cryptographer's Panel to the RSA CEO's advice for the security industry, here's how the conference kicked off in San Francisco this morning.
By Sara Peters Senior Editor at Dark Reading, 4/21/2015
Comment2 comments  |  Read  |  Post a Comment
Comic: Machine Learning
Brian Moore, Cartoonist & Illustrator
Commentary
Machines can beat us at our own games. How long before they don't need us anymore?
By Brian Moore Cartoonist & Illustrator, 4/21/2015
Comment0 comments  |  Read  |  Post a Comment
Google's Mobile Algorithm Change: 5 Things To Know
Eric Zeman,
Commentary
If your website isn't optimized for mobile devices, there's a good chance your Google search rankings will plummet. Here are five key facts that you and your business need to know.
By Eric Zeman , 4/21/2015
Comment0 comments  |  Read  |  Post a Comment
Google Maps Lets Users Search For Loch Ness Monster
Nathan Eddy, Freelance Writer
Commentary
The Loch Ness Monster probably doesn't exist, but Google Maps is putting a new level of fun back into the hunt for Nessie.
By Nathan Eddy Freelance Writer, 4/21/2015
Comment2 comments  |  Read  |  Post a Comment
Microsoft Offers Azure Service Fabric For Distributed Apps
Charles Babcock, Editor at Large, Cloud
News
Microsoft will show off Azure Service Fabric at its Build Conference next week. It will help developers build microservice-based applications.
By Charles Babcock Editor at Large, Cloud, 4/21/2015
Comment1 Comment  |  Read  |  Post a Comment
IT Certifications Guaranteed To Boost Your Career
Network Computing Editors,
News
Certifications can help advance your IT career and get you a raise. These certifications in specialties like cloud, virtualization, and systems engineering from AWS, Cisco, VMware, Microsoft and others are among the highest in demand.
By Network Computing Editors , 4/21/2015
Comment2 comments  |  Read  |  Post a Comment
Health Insurers’ Digital Footprint Widening Attack Surface
Peter Zavlaris, Analyst, RiskIQ
Commentary
Insurers are ripe targets for attackers since they’re efficient concentrators of every kind of data needed for identity theft, credit card and insurance fraud. Here’s proof.
By Peter Zavlaris Analyst, RiskIQ, 4/21/2015
Comment1 Comment  |  Read  |  Post a Comment
Ethernet Roadmap: A Raft Of New Speeds
Jim O'Reilly, Consultant
Commentary
The Ethernet Alliance's new roadmap charts out an ambitious path for the networking technology to meet increasing data center demands.
By Jim O'Reilly Consultant, 4/21/2015
Comment2 comments  |  Read  |  Post a Comment
Bypassing The Password, Part 2: Trusted Identities
Joe Stanganelli, Attorney, Beacon Hill Law
Commentary
The federal government's collaborative efforts with the private sector to "mov[e] beyond the password" are difficult to trust when there are potentially ulterior motives at play.
By Joe Stanganelli Attorney, Beacon Hill Law, 4/21/2015
Comment1 Comment  |  Read  |  Post a Comment
Evaluating Cloud UC Costs
Network Computing Editors,
Commentary
Cost savings may not occur with cloud UC, but there are other hidden benefits, research shows.
By Robin Gareiss, Executive VP/Senior Founding Partner of Nemertes Research , 4/21/2015
Comment0 comments  |  Read  |  Post a Comment
Plan X: DARPA's Revolutionary Cyber Security Platform
Joe Stanganelli, Attorney, Beacon Hill Law
News
DARPA's Plan X aims to make active cyber defense more accessible to the masses through agility, training, and intuitive interfaces.
By Joe Stanganelli Attorney, Beacon Hill Law, 4/21/2015
Comment1 Comment  |  Read  |  Post a Comment
Waratek Wins RSA Innovation Sandbox
Sara Peters, Senior Editor at Dark Reading
News
RSA: 10th annual event honors runtime application self protection solution for solving Java security problems.
By Sara Peters Senior Editor at Dark Reading, 4/20/2015
Comment0 comments  |  Read  |  Post a Comment
White House's Daniel 'Intrigued' By UL-Type Model For IoT Security
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Michael Daniel, the national cybersecurity coordinator and assistant to the President, talks Internet of Things security and recent Executive Orders on intel-sharing and sanctions.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/20/2015
Comment1 Comment  |  Read  |  Post a Comment
VMware Rides Container Wave With Open Source Projects
Charles Babcock, Editor at Large, Cloud
News
VMware's launching two projects: Lightwave focuses on container security, and Photon creates a lightweight Linux version for containers.
By Charles Babcock Editor at Large, Cloud, 4/20/2015
Comment3 comments  |  Read  |  Post a Comment
Android Wear Promises Less Phone Dependence
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The latest update to Android for wearable devices allows connections with phones on distant networks.
By Thomas Claburn Editor at Large, Enterprise Mobility, 4/20/2015
Comment6 comments  |  Read  |  Post a Comment
Windows 10: Landing In July?
Kelly Sheridan, Associate Editor, InformationWeek
News
In a conference call, AMD's CEO let it slip that Microsoft will release Windows 10 at the end of July 2015.
By Kelly Sheridan Associate Editor, InformationWeek, 4/20/2015
Comment3 comments  |  Read  |  Post a Comment
Nokia Eyeing Return To Consumer Phone Market, Report Claims
Eric Zeman,
Commentary
Nokia is reportedly looking to rejoin the consumer cell phone market, but not in the way you might expect. There are reports that its Nokia Technologies division is developing a new phone design that the company will license.
By Eric Zeman , 4/20/2015
Comment4 comments  |  Read  |  Post a Comment
Moore's Law At 50: In The News
Rick Merritt, SiliconValley Bureau Chief, EE Times
Commentary
Here's a sampler of some of the best of the reports that marked the official anniversary of Moore's Law on Sunday, April 19.
By Rick Merritt SiliconValley Bureau Chief, EE Times, 4/20/2015
Comment1 Comment  |  Read  |  Post a Comment
DHS: Most Organizations Need Improvement In Managing Security Risk
Rutrell Yasin, Business Technology Writer, Tech Writers Bureau
Commentary
At a Department of Homeland Security Summit, government and corporate security teams are taken to task for failing to address critical issues of software assurance, testing and lifecycle support.
By Rutrell Yasin Business Technology Writer, Tech Writers Bureau, 4/20/2015
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
10 Astonishing Email Habits
David Wagner, Executive Editor, Community & IT Life,  4/14/2015
Space X, Hubble, Coffee: The Cost Of Doing Business In Space
David Wagner, Executive Editor, Community & IT Life,  4/17/2015
Surface 3 Vs. Surface Pro 3: Picking The Right Tablet
Kelly Sheridan, Associate Editor, InformationWeek,  4/17/2015
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
Hacking Vulnerable Medical Equipment Puts Millions at Risk
Hospitals and medical device manufacturers need to start doing more to detect and thwart incoming attacks on networks and devices. Read >>
White Papers
Current Issue
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio