An average of eight severe security flaws from open-source and third-party code can be found in each web application, according to new findings from Veracode.By Kelly Jackson Higgins Executive Editor at Dark Reading, 10/22/20141 Comment | Read | Post a Comment
Jive's Fall cloud releases include connectors for Google Docs and Outlook Online, plus collaboration tools for mobile devices and new features for community managers.By Kristin Burnham Senior Editor, InformationWeek.com, 10/22/20140 comments | Read | Post a Comment
The competition between Cisco, VMware, and EMC on the networking, cloud, and storage fronts heats up, with the joint venture VCE becoming an EMC business.By Susan Fogarty Editor in Chief, 10/22/20144 comments | Read | Post a Comment
Cyber threat intelligence or CTI is touted to be the next big thing in InfoSec. But does it narrow the security problem or compound it?By Matt Hartley VP Product Management, iSIGHT Partners, 10/22/20141 Comment | Read | Post a Comment
Security startup Illumio has launched a granular scheme based on individual workloads, not firewalls or network monitoring.By Charles Babcock Editor At Large, InformationWeek , 10/22/20142 comments | Read | Post a Comment
Working remotely requires special discipline and unique habits. Learn them to really contribute to the project.By Stephane Kasriel SVP Product & Engineering, Elance-oDesk, 10/22/20141 Comment | Read | Post a Comment
Bolstering Google Cloud Platform, Firebase service helps developers create mobile and web apps that store and sync data in real-time.By Thomas Claburn Editor-at-Large, 10/22/20142 comments | Read | Post a Comment
The Internet of Things in healthcare -- a profusion of IP-connected sensors on hospital equipment and patients -- has the power to drastically cut waste and save lives, says panel.By Ellis Booker Technology Journalist, 10/22/20146 comments | Read | Post a Comment
Yahoo is committed to Apache Storm, the open event-processing platform, because it's easy to manage and scale and use for personalization as a service, among other uses, says Yahoo executive Sumeet Singh in a Q&A.By Doug Henschen Executive Editor, InformationWeek, 10/22/20141 Comment | Read | Post a Comment
Nearly half of all security breaches occur in healthcare, and outdated medical records systems make data more vulnerable. An up-to-date EHR system can help solve security concerns, save money, and improve patient care.By Michael A.M. Davies Founder & Chairman, Endeavour Partners, 10/22/20140 comments | Read | Post a Comment
From solar-powered refrigerators that store vaccines to handheld diagnostic devices -- these technologies were originally developed for NASA missions and were later commercialized to make life better on Earth.By Elena Malykhina Technology Journalist, 10/22/20142 comments | Read | Post a Comment
Putting data encryption solely into the hands of government employees won't prevent bad things from happening -- and it might encourage wrongdoing.By Jonathan Feldman CIO, City of Asheville, NC, 10/22/20146 comments | Read | Post a Comment
Unified communications and collaboration projects fall flat when companies don't understand needs or consult with their employees. Get the facts and figures from Softchoice's UC study.By Erika Van Noort Director Consulting, North America, Softchoice, 10/22/20144 comments | Read | Post a Comment
InformationWeek Must Reads Oct. 21, 2014InformationWeek's new Must Reads is a compendium of our best recent coverage of digital strategy. Learn why you should learn to embrace DevOps, how to avoid roadblocks for digital projects, what the five steps to API management are, and more.
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
IT Salary Survey 2014: GovernmentFederal government IT professionals saw modest bumps in compensation. But that doesn't mean all is well: 29% of staffers had fewer training opportunities, and 21% of managers had their benefits cut. Half are looking for new jobs.