10 Highest Paying Computer Science Programs
Apple Watch Debuts At No. 2 In Wearables Market
Weaponized Drones Approved For North Dakota Police
Velostrata Hybrid Offers Public Cloud Compute, On-Premises Data
OpenStack Now Offers 3 Ways To Deploy Containers
News & Commentary
OpenStack Now Offers 3 Ways To Deploy Containers
Charles Babcock, Editor at Large, Cloud
News
OpenStack's Magnum Project will give cloud users the ability to deploy Docker containers in virtual machines, on bare metal, or in other containers.
By Charles Babcock Editor at Large, Cloud, 8/28/2015
Comment0 comments  |  Read  |  Post a Comment
Apple Watch Debuts At No. 2 In Wearables Market
Eric Zeman,
Commentary
Apple sells 3.6 million smartwatches in its opening quarter, blasting past competitors Samsung, Garmin, and Xiaomi to consume 20% of the overall wearables market.
By Eric Zeman , 8/28/2015
Comment0 comments  |  Read  |  Post a Comment
Velostrata Hybrid Offers Public Cloud Compute, On-Premises Data
Charles Babcock, Editor at Large, Cloud
News
Velostrata emerges from stealth to showcase its hybrid cloud that keeps enterprise data behind the firewall while leveraging the public cloud's power for compute.
By Charles Babcock Editor at Large, Cloud, 8/28/2015
Comment0 comments  |  Read  |  Post a Comment
Amazon Underground Makes In-App Goods Free
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Android developers now have the option to be paid by the minute rather than by fees for in-app items.
By Thomas Claburn Editor at Large, Enterprise Mobility, 8/28/2015
Comment0 comments  |  Read  |  Post a Comment
Weaponized Drones Approved For North Dakota Police
David Wagner, Executive Editor, Community & IT Life
News
A bill in North Dakota will allow non-lethal weapons on police drones. Nothing to fear here, move along.
By David Wagner Executive Editor, Community & IT Life, 8/28/2015
Comment0 comments  |  Read  |  Post a Comment
Google: Your Searches Could Land You A Job Here
David Wagner, Executive Editor, Community & IT Life
News
Google is targeting people for job offers based on their search activity. It's certainly a way to attract people with an inborn curiosity and willingness to investigate unusual things (and no fear of malware).
By David Wagner Executive Editor, Community & IT Life, 8/28/2015
Comment0 comments  |  Read  |  Post a Comment
10 Fantastic iPhone, Android Apps For Museum Visits
Nathan Eddy, Freelance Writer
News
Expand your horizons with interactive iPhone and Android apps from the Louvre, the Prado, the Met, and other great museums.
By Nathan Eddy Freelance Writer, 8/28/2015
Comment0 comments  |  Read  |  Post a Comment
Beyond Redundancy: Improving IT Availability
Shirish Nilekar, Director of Product Management, Opengear
Commentary
IT leaders must look at redundancy and availability in a more comprehensive way to develop a strategy for true IT resilience.
By Shirish Nilekar Director of Product Management, Opengear, 8/28/2015
Comment0 comments  |  Read  |  Post a Comment
Managing Collaboration In The Extended Enterprise
John Newton, CTO, founder and chairman, Alfresco
Commentary
Organizations need to develop a balanced strategy to meet the demands of today's highly mobile workforce where collaboration extends beyond the office walls.
By John Newton CTO, founder and chairman, Alfresco, 8/28/2015
Comment0 comments  |  Read  |  Post a Comment
Former Apple CEO Unveils 2 Low-Cost Obi Smartphones
Nathan Eddy, Freelance Writer
News
The Obi SF1 and SJ1.5 are two more low-cost smartphones geared toward emerging markets. The phones run Android and offer sophisticated cameras.
By Nathan Eddy Freelance Writer, 8/27/2015
Comment1 Comment  |  Read  |  Post a Comment
Facebook M Digital Assistant Blends AI, Human Knowledge
Larry Loeb, Blogger, Informationweek
Commentary
Digital assistants are all the rage and Facebook's M is the latest in a market that includes Siri, Cortana, Google Now, and Amazon's Echo. However, Facebook is teaming up AI and humans.
By Larry Loeb Blogger, Informationweek, 8/27/2015
Comment4 comments  |  Read  |  Post a Comment
Cybersecurity Under FTC Authority: What Does it Mean?
Tom Kellermann, Chief Cybersecurity Office, Trend Micro
Commentary
Consumers can now expect the same level of security and privacy in the digital realm as they do in the physical.
By Tom Kellermann Chief Cybersecurity Office, Trend Micro, 8/27/2015
Comment1 Comment  |  Read  |  Post a Comment
Google Unleashes Container Engine For Docker Workloads
Charles Babcock, Editor at Large, Cloud
News
The Google Compute Cloud has gained a service for launching Docker containers and managing their lifecycles.
By Charles Babcock Editor at Large, Cloud, 8/27/2015
Comment1 Comment  |  Read  |  Post a Comment
Podcasts, Presentations: Help Your Users Improve Quality
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
Our hands-on demo of the iRig Mic Studio shows a tool that can help your users make better podcasts and video presentations. It's a toolset that will allow trainers, executives, sales, and marketing professionals to put a studio in their backpacks and create good recordings from almost anywhere they happen to be.
By Curtis Franklin Jr. Executive Editor, Technical Content, 8/27/2015
Comment0 comments  |  Read  |  Post a Comment
3D Printers: IT's Next Great Data Challenge
Pam Baker, Author and freelance writer
Commentary
Many tech professionals think of 3D printing as little more than a toy, even though it's in full production swing in manufacturing operations. Gartner and other researchers predict major growth for 3D printing in the enterprise, raising a host of data protection issues for IT professionals. Here's what you need to know.
By Pam Baker Author and freelance writer, 8/27/2015
Comment2 comments  |  Read  |  Post a Comment
WiFi Pioneer Cees Links: IoT Is Like A Butler
David Wagner, Executive Editor, Community & IT Life
News
A WiFi pioneer says we need to rethink how the Internet of Things is being marketed and sold. For starters, how about finding a better name?
By David Wagner Executive Editor, Community & IT Life, 8/27/2015
Comment0 comments  |  Read  |  Post a Comment
Consumers Want Password Alternatives
Ericka Chickowski, Contributing Writer, Dark Reading
News
Consumer confidence in online passwords wanes and their password hygiene remains as sketchy as ever, study finds.
By Ericka Chickowski Contributing Writer, Dark Reading, 8/27/2015
Comment0 comments  |  Read  |  Post a Comment
SD-WAN Vendors Making A Splash
Network Computing and Interop, Author
News
Software-defined WAN has suddenly become the hottest topic in networking, due to its potential to save money while improving network performance. Check out the vendors leading the way.
By Crystal Bedell , 8/27/2015
Comment3 comments  |  Read  |  Post a Comment
10 Highest Paying Computer Science Programs
David Wagner, Executive Editor, Community & IT Life
News
Computer science majors from these 10 schools can expect to earn the most by the time they reach the middle of their careers, according to data from Payscale.com. See how your salary stacks up.
By David Wagner Executive Editor, Community & IT Life, 8/27/2015
Comment1 Comment  |  Read  |  Post a Comment
Storage & Virtual Containers: Where Does The Data Go?
Chris M Evans,  IT consultant
Commentary
Containerization presents challenges when it comes to data storage. Here's a look at the current state of container storage.
By Chris M Evans IT consultant, 8/27/2015
Comment7 comments  |  Read  |  Post a Comment
More Stories
PR Newswire
NASA Tells Us Not To Panic Over Asteroids
Nathan Eddy, Freelance Writer,  8/21/2015
Building Apps Without Code: 7 Options For Your Enterprise
Curtis Franklin Jr., Executive Editor, Technical Content,  8/23/2015
Ashley Madison Breach Should Spark Security Conversation
Larry Loeb, Blogger, Informationweek,  8/22/2015
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest August 03, 2015
The networking industry agrees that software-defined networking is the way of the future. So where are all the deployments? We take a look at where SDN is being deployed and what's getting in the way of deployments.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Everyone wants a well-educated, successful workforce but just how do you get one? And what, precisely, do you think you can do with it? To answer those and other questions, George Colombo had a conversation with Elliott Masie, head of The MASIE Center, a Saratoga Springs, NY think tank focused on how organizations can support learning and knowledge within the workforce.