Mobility, data, the Internet Of Things, cloud computing. These are the terms that IT hears again and again. In fact, there's a term for what all these mean for business and IT: "Digital Transformation." However, what's new about it? At this year's Interop conference, Prashanth Shenoy, Cisco's senior director for enterprise networks and mobility, explained how these technologies are now mature enough to really affect business and begin the transformation that we're heard so much about.By InformationWeek Staff , 6/2/20160 comments | Read | Post a Comment
'IronGate' discovery underlines the risk of industrial attacks yet to come.By Kelly Jackson Higgins Executive Editor at Dark Reading, 6/2/20160 comments | Read | Post a Comment
What does it mean to call your company "data-driven?" Definitions range from simple reporting to viewing data science as a core business strategy. We asked executives from a variety of businesses to help us identify which traits are essential for becoming a truly data-driven company. See what we learned, and tell us how your organization stacks up.By Lisa Morgan Freelance Writer, 6/2/20160 comments | Read | Post a Comment
Anomali says it has found five new pieces of malware tying the two attack groups together.By Jai Vijayan Freelance writer, 6/1/20160 comments | Read | Post a Comment
With its latest acquisition, Salesforce gains an established e-commerce platform to compete in the multi-billion dollar digital commerce industry. By Dawn Kawamoto Freelance Writer and Editor, 6/1/20160 comments | Read | Post a Comment
Microsoft plans to open its Windows Holographic operating system to run on mixed-reality devices designed and built by outside manufacturers.By Kelly Sheridan Associate Editor, InformationWeek, 6/1/20160 comments | Read | Post a Comment
Defenders must worry about their own operations security but can also learn a lot from attackers' OPSEC practices.
By Ericka Chickowski Contributing Writer, Dark Reading, 6/1/20161 Comment | Read | Post a Comment
Amazon CEO Jeff Bezos dishes on the millions of hours of work the company has put into creating the Echo and its AI assistant Alexa, and explains what's to come.By Eric Zeman , 6/1/20160 comments | Read | Post a Comment
Xiaomi, the Chinese consumer electronics company, is looking to broaden its intellectual property portfolio with the purchase of 1,500 Microsoft patents. The company is also preparing for a global expansion that will include bringing its smartphones to the US.By Nathan Eddy Freelance Writer, 6/1/20160 comments | Read | Post a Comment
Microsoft SQL Server 2016 hits general availability on June 1, and the company is looking to win Oracle customers with better pricing, security, hybrid cloud capabilities, and other features.By Jessica Davis Senior Editor, Enterprise Apps, 6/1/20160 comments | Read | Post a Comment
Timing of release of hacked details from different sites may be deliberate, says researcher.By Dark Reading Staff , 6/1/20161 Comment | Read | Post a Comment
Hundreds of millions of people are now blocking ads on mobile devices, mainly in the Asia-Pacific region, according to a new report by PageFair.By Thomas Claburn Editor at Large, Enterprise Mobility, 6/1/20162 comments | Read | Post a Comment
Chief Security Officer Jon Rose shares the whys and wherefores of integrating agile software development methodology into a traditional security environment. By Vincent Liu Partner, Bishop Fox, 6/1/20160 comments | Read | Post a Comment
With 500 petabytes of customer files to manage, Dropbox decided to become a post-cloud company. That meant moving a core operation off AWS. Here's how it was done.By Charles Babcock Editor at Large, Cloud, 6/1/20161 Comment | Read | Post a Comment
Heavy-hitters in the tech industry agree to adhere to the European Commission's hate speech rules and vow to remove infringing postings within 24 hours after notification.By Dawn Kawamoto Freelance Writer and Editor, 6/1/20161 Comment | Read | Post a Comment
Data visualizations can help business users understand analytics insights and actually see the reasons why certain recommendations make the most sense. Traditional business intelligence and analytics vendors, as well as newer market entrants, are offering data visualization technologies and platforms. Here's a collection of 10 data visualization tools worthy of your consideration.By Jessica Davis Senior Editor, Enterprise Apps, 6/1/20162 comments | Read | Post a Comment
Phishing attacks are on the rise, but there are steps you can take to combat the threat.By Steve Zurier Freelance Writer, 6/1/20160 comments | Read | Post a Comment
Laptops from Dell, HP, Asus, Acer and Lenovo all had at least one vulnerability that could result in complete compromise of system, Duo Security report says.By Rutrell Yasin Business Technology Writer, Tech Writers Bureau, 5/31/20161 Comment | Read | Post a Comment
Microsoft has repositioned Microsoft Ventures, its internal startup accelerator, to focus on investments in early-stage businesses.By Kelly Sheridan Associate Editor, InformationWeek, 5/31/20160 comments | Read | Post a Comment
The Dynamics Of The Digital WorkplaceAs companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience.Read >>
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
2014 US Salary Survey: 10 StatsInformationWeek surveyed 11,662 IT pros across 30 industries about their pay, benefits, job satisfaction, outsourcing, and more. Some of the results will surprise you.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
To save this item to your list of favorite InformationWeek content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.