InformationWeek News Connects The Business Technology Community
IoT
IoT
Software Is Eating the World? Don't Be Lunch
Get Ready for the Analytics Bot Invasion
Avoid the Telecommuting Reboot
Now You're the Manager, Time to Offer Guidance
Seven Essential Steps for Transitioning to Enterprise DevOps
News & Commentary
The New Shadow IT: Custom Data Center Applications
Kaushik Narayan, CTO, Skyhigh Networks
Commentary
If you think you’ve finally gotten control of unsanctioned user apps, think again. The next wave of rogue apps is on its way from your data center to the cloud.
By Kaushik Narayan CTO, Skyhigh Networks, 4/7/2017
Comment0 comments  |  Read  |  Post a Comment
Cloud and Virtualization Enable 'Active/Active'
Charles Babcock, Editor at Large, Cloud
Commentary
At the heart of disaster recovery is database system recovery, and ScaleArc urges users to think active/active, not DR.
By Charles Babcock Editor at Large, Cloud, 4/7/2017
Comment1 Comment  |  Read  |  Post a Comment
How to Crack Cybersecurity’s Glass Ceiling
Shimrit Tzur-David, CTO & Co-founder, Secret Double Octopus
Commentary
Sage career advice to young women from the female CTO of a security startup: Get a pair of earplugs, and put them in when you hear words like 'can't' or 'don't.'
By Shimrit Tzur-David CTO & Co-founder, Secret Double Octopus, 4/6/2017
Comment1 Comment  |  Read  |  Post a Comment
All Together Now: DevOps, UC & Collaboration
John Edwards, Technology Journalist & Author
Satire
An Interop ITX speaker believes that DevOps can help unified communication (UC) teams work together more efficiently and effectively on a wide range of issues and challenges.
By John Edwards Technology Journalist & Author, 4/6/2017
Comment0 comments  |  Read  |  Post a Comment
What New-to-the-Cloud Managers Can Learn from Cloud Pioneers
Guest Commentary, Guest Commentary
Commentary
With cloud computing proving itself in major organizations, those who have managed cloud migrations have learned lessons that they can share with cloud newbies.
By Charlie Li and Jason Hatch, Capgemini , 4/6/2017
Comment0 comments  |  Read  |  Post a Comment
Commodity Ransomware Is Here
Paul Kurtz, CEO & Cofounder, TruSTAR Technology
Commentary
When deploying ransomware is as easy as ordering a pizza, the best defense is through better threat intelligence sharing.
By Paul Kurtz CEO & Cofounder, TruSTAR Technology, 4/6/2017
Comment0 comments  |  Read  |  Post a Comment
Is a "Cloud-First" Approach Right for your Organization?
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
Satire
Enterprise IT needs to rethink the scope of the cloud-first mindset.
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 4/6/2017
Comment0 comments  |  Read  |  Post a Comment
How to Give IT Credibility in the C-suite
Keith Fowlkes,
Commentary
It isn't easy changing the C-suite's view that IT is a "utility" but you can do it over time.
By Keith Fowlkes , 4/6/2017
Comment0 comments  |  Read  |  Post a Comment
DevOps Comes of Age
Lisa Morgan, Freelance Writer
Satire
More organizations have embraced DevOps to deliver higher quality software faster. Meanwhile, DevOps itself has evolved. We explain where DevOps is today and where it's is headed.
By Lisa Morgan Freelance Writer, 4/5/2017
Comment1 Comment  |  Read  |  Post a Comment
Should IT People Be Innovative?
Guest Commentary, Guest Commentary
Commentary
In an era of constant corporate change and innovation, IT leaders are faced with the challenge of knowing how even the slightest change could have a big negative impact.
By Yaniv Valik, VP, Continuity Software , 4/5/2017
Comment1 Comment  |  Read  |  Post a Comment
Battle Intensifies To Become Cloud Hardware Leader
Charles Babcock, Editor at Large, Cloud
News
HPE and Cisco are joined by merged Dell EMC as big three contenders to supply cloud providers. Are white box manufacturers a threat?
By Charles Babcock Editor at Large, Cloud, 4/5/2017
Comment0 comments  |  Read  |  Post a Comment
Digital Disruption is Challenging the Status Quo
Guest Commentary, Guest Commentary
Commentary
Don't think that innovation and digital disruption are just about technology; the people matter even more than the tech.
By Tom Bianculli, CTO of Zebra Technologies , 4/5/2017
Comment0 comments  |  Read  |  Post a Comment
Lessons in Government and the State of Your IT
Guest Commentary, Guest Commentary
Commentary
Have you ever considered how state and local government IT departments differ from yours? The challenges are unique, the solutions creative, and the lessons learned could help the private sector more effectively assess and enhance the state of their own IT.
By Doug Hazelman, vice president, Veeam Software , 4/4/2017
Comment0 comments  |  Read  |  Post a Comment
ADP CISO Offers Tips to Leverage Security to Grow the Business
Dawn Kawamoto, Associate Editor, Dark Reading
News
Savvy CISOs would do their companies a favor by broadly integrating security across the organization, a move that can yield greater revenues, cost savings and an entry into new markets.
By Dawn Kawamoto Associate Editor, Dark Reading, 4/4/2017
Comment0 comments  |  Read  |  Post a Comment
Software Is Eating the World? Don't Be Lunch
Charles Babcock, Editor at Large, Cloud
Satire
Xceligent CIO Joe Emison to talk about how IT must change if Marc Andreesen's 'software is eating the world' proves to be true.
By Charles Babcock Editor at Large, Cloud, 4/4/2017
Comment1 Comment  |  Read  |  Post a Comment
McAfee's Back as an Independent Security Firm
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Security firm is no longer part of Intel Corp.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/4/2017
Comment2 comments  |  Read  |  Post a Comment
The Power of the Crowd: 3 Approaches to Sharing Threat Intel
Adam Vincent,  Chief Executive Officer & Founder, ThreatConnect
Commentary
Crowdsourced intelligence can help you build a stronger, more informed cyberdefense. Here’s how.
By Adam Vincent Chief Executive Officer & Founder, ThreatConnect, 4/4/2017
Comment0 comments  |  Read  |  Post a Comment
Get Ready for the Analytics Bot Invasion
Jen Underwood, Impact Analytix
Satire
Bots are carving out a new role in analytics, utilizing natural language generation to address questions raised by business people and consumers.
By Jen Underwood Impact Analytix, 4/4/2017
Comment0 comments  |  Read  |  Post a Comment
More than Half of Security Pros Rarely Change their Social Network Passwords
Dawn Kawamoto, Associate Editor, Dark Reading
News
Survey finds IT security professionals don't practice what they preach at work when it comes to their social network passwords.
By Dawn Kawamoto , 4/3/2017
Comment4 comments  |  Read  |  Post a Comment
Five Ways to Shine a Light on Shadow IT
Guest Commentary, Guest Commentary
Commentary
Rather than resist shadow IT, CIOs can work as partners with the departments that are running the applications, keeping company data safe and secure.
By Vineet Misra, CIO, Lifesize , 4/3/2017
Comment0 comments  |  Read  |  Post a Comment
More Stories
News
How to Rescue Your Data Analytics Program from Failure
Jessica Davis, Senior Editor, Enterprise Apps,  4/3/2017
News
Managing APIs Is an Increasingly Complex Burden
Charles Babcock, Editor at Large, Cloud,  3/31/2017
Commentary
Five Ways to Shine a Light on Shadow IT
Guest Commentary, Guest Commentary,  4/3/2017
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
The Importance of the Partner Ecosystem in Your Storage Solution
Relying on a vendor that appreciates and fuels the symbiotic relationship between upstream and downstream communities can pay strong dividends to those investing in today's storage solutions. Read >>
Partner Perspectives
What's This?
White Papers
Current Issue
IT Success = Storage & Data Center Performance
Balancing legacy infrastructure with emerging technologies requires laying a solid foundation that delivers flexibility, scalability, and efficiency. Learn what the most pressing issues are, how to incorporate advances like software-defined storage, and strategies for streamlining the data center.
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Flash Poll