Surface 3 Vs. Surface Pro 3: Picking The Right Tablet
Space X, Hubble, Coffee: The Cost Of Doing Business In Space
Android For Work Reports For Office Duty
Robot Villains: What They Teach Us
5 Cyberwar Threats Worth Watching
News & Commentary
What We Learned From The Second Star Wars Trailer
David Wagner, Executive Editor, Community & IT Life
Commentary
The second Star Wars trailer is out. And it revealed much more than the first. Here's what we know so far.
By David Wagner Executive Editor, Community & IT Life, 4/19/2015
Comment0 comments  |  Read  |  Post a Comment
Windows 10: Your PC Is Headed For The Cloud
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
News
Windows 10 could well be the trigger that will drive the growth of cloud-based virtual desktop integration. Here's why.
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 4/19/2015
Comment0 comments  |  Read  |  Post a Comment
Apple Watch: 5 Things We Learned This Week
Kelly Sheridan, Associate Editor, InformationWeek
News
Apple Watch preorders have made the wearable a star in the past week. Here's a look at what you missed.
By Kelly Sheridan Associate Editor, InformationWeek, 4/19/2015
Comment0 comments  |  Read  |  Post a Comment
Windows 10 Universal Apps Update Coming To Phones
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft announces Office Universal apps preview for Windows 10 on Windows Phone and details of Office 2016.
By Kelly Sheridan Associate Editor, InformationWeek, 4/18/2015
Comment1 Comment  |  Read  |  Post a Comment
Skype For Business, Windows Security Flaws: Microsoft Roundup
Kelly Sheridan, Associate Editor, InformationWeek
News
Security and collaboration were key themes this week as Microsoft announced news surrounding bug fixes, Office Delve, Skype, and partnerships.
By Kelly Sheridan Associate Editor, InformationWeek, 4/18/2015
Comment0 comments  |  Read  |  Post a Comment
HIMSS15: The 'Year Of Execution' For Data Sharing
Mark Braunstein, Professor of the Practice, Georgia Institute of Technology
Commentary
The industry is focusing less on electronic record features and more on sharing the data held in them.
By Mark Braunstein Professor of the Practice, Georgia Institute of Technology, 4/17/2015
Comment0 comments  |  Read  |  Post a Comment
L.A. District Seeks Refund From Apple Amid Investigations
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The Los Angeles Unified School District's ambitious plan to provide an iPad for every student has been derailed by questions about the contract bidding process and dissatisfaction with the software.
By Thomas Claburn Editor at Large, Enterprise Mobility, 4/17/2015
Comment3 comments  |  Read  |  Post a Comment
APT Group 'Pawn Storm' Ratchets Up Attacks
Jai Vijayan, Freelance writer
News
Threat actors have set up several new C&C servers and dozens of new malicious URLs -- and now targeting White House staffers, Trend Micro says.
By Jai Vijayan Freelance writer, 4/17/2015
Comment0 comments  |  Read  |  Post a Comment
Android For Work Reports For Office Duty
Eric Zeman,
Commentary
Through Android For Work, Google has made its mobile device management tool for Android smartphones available to businesses, offering IT teams the control they want and the security they need.
By Eric Zeman , 4/17/2015
Comment4 comments  |  Read  |  Post a Comment
Inside the 4 Most Common Threat Actor Tools
 Dr. Chase Cunningham, Head of Threat Intelligence, FireHost
Commentary
How do you prevent your environment from becoming the next target? Turn the tables on your attackers.
By Dr. Chase Cunningham Head of Threat Intelligence, FireHost, 4/17/2015
Comment0 comments  |  Read  |  Post a Comment
Docker 1.6 Emerges As A Platform
Charles Babcock, Editor at Large, Cloud
News
Several components of Docker, including Engine, Registry, and orchestration tools, have been upgraded together as a platform.
By Charles Babcock Editor at Large, Cloud, 4/17/2015
Comment2 comments  |  Read  |  Post a Comment
Space X, Hubble, Coffee: The Cost Of Doing Business In Space
David Wagner, Executive Editor, Community & IT Life
Commentary
Space is expensive, dangerous, and easy to get wrong. This week, news about Space X, the upcoming Hubble anniversary, and the price of astronaut coffee shows why we should think hard about future projects.
By David Wagner Executive Editor, Community & IT Life, 4/17/2015
Comment12 comments  |  Read  |  Post a Comment
Moore's Law Hits Middle Age
Rick Merritt, SiliconValley Bureau Chief, EE Times
News
Tales from engineers who drove Moore's Law forward.
By Rick Merritt SiliconValley Bureau Chief, EE Times, 4/17/2015
Comment1 Comment  |  Read  |  Post a Comment
3D NAND Goes Mainstream
Howard Marks, Network Computing Blogger
Commentary
Joint flash memory ventures Intel-Micron and Toshiba-SanDisk are overcoming the limitations of conventional planar flash memory by going 3D.
By Howard Marks Network Computing Blogger, 4/17/2015
Comment1 Comment  |  Read  |  Post a Comment
Surface 3 Vs. Surface Pro 3: Picking The Right Tablet
Kelly Sheridan, Associate Editor, InformationWeek
News
The Surface 3, the newest hybrid from Microsoft, packs the hallmarks of Surface Pro 3 into a thinner and lighter device.
By Kelly Sheridan Associate Editor, InformationWeek, 4/17/2015
Comment10 comments  |  Read  |  Post a Comment
Cyanogen Partners With Microsoft To Challenge Google
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Cyanogen's version of Android will include Microsoft apps and services.
By Thomas Claburn Editor at Large, Enterprise Mobility, 4/16/2015
Comment2 comments  |  Read  |  Post a Comment
Popular Home Automation System Backdoored Via Unpatched Flaw
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Malicious firmware update could lead to device, full home network 0wnage, researcher will show next week at the RSA Conference.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/16/2015
Comment2 comments  |  Read  |  Post a Comment
Microsoft, Yahoo: The Search Party Continues
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft and Yahoo renew their 2009 partnership to enhance the search experience across platforms and boost value for advertisers.
By Kelly Sheridan Associate Editor, InformationWeek, 4/16/2015
Comment3 comments  |  Read  |  Post a Comment
7 Deadly Sins That Get Users Hacked
Ericka Chickowski, Contributing Writer, Dark Reading
News
How users and their endpoints are leveraged by the bad guys to eventually find their way to critical data
By Ericka Chickowski Contributing Writer, Dark Reading, 4/16/2015
Comment7 comments  |  Read  |  Post a Comment
Apple Watch Won't Be Sold In Stores Anytime Soon
Eric Zeman,
Commentary
Angela Ahrendts, Apple's retail chief, said the company will sell its high-end Apple Watch online exclusively until June as preorders continue unabated. The latest estimates have preorder sales topping 2 million.
By Eric Zeman , 4/16/2015
Comment4 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
10 Reasons Robots Should Rule The World
David Wagner, Executive Editor, Community & IT Life,  4/12/2015
10 Astonishing Email Habits
David Wagner, Executive Editor, Community & IT Life,  4/14/2015
Space X, Hubble, Coffee: The Cost Of Doing Business In Space
David Wagner, Executive Editor, Community & IT Life,  4/17/2015
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
Hacking Vulnerable Medical Equipment Puts Millions at Risk
Hospitals and medical device manufacturers need to start doing more to detect and thwart incoming attacks on networks and devices. Read >>
White Papers
Current Issue
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio