Summer is a time to disconnect, but that doesn't mean you have to put all gadgets aside. Here are 10 gizmos to help you beat the heat and have fun.By Kelly Sheridan Associate Editor, InformationWeek, 5/29/20161 Comment | Read | Post a Comment
LinkedIn contributes Kafka Monitor to open source and Apple prepares to open Siri to third-party developers. We have all this, plus news about Confluent and Tinkerpop, in our Big Data Roundup for the week ending May 29, 2016. By Jessica Davis Senior Editor, Enterprise Apps, 5/29/20161 Comment | Read | Post a Comment
Oracle's long and contentious court battle with Google over Java copyright issues ends in defeat. But the open source community can breathe a sigh of relief -- for now.By Dawn Kawamoto Freelance Writer and Editor, 5/28/20161 Comment | Read | Post a Comment
Microsoft severed all remaining ties to Nokia, awarded funding to startups to improve global connectivity, and partnered with Facebook to build a cross-Atlantic cable.
By Kelly Sheridan Associate Editor, InformationWeek, 5/28/20160 comments | Read | Post a Comment
Measures come amid news that up to 12 banks may have fallen victim to attacks attempting to steal millions via the SWIFT network.By Jai Vijayan Freelance writer, 5/27/20161 Comment | Read | Post a Comment
Rather than build a brand new device to compete with the Amazon Echo, Apple is working to improve the capabilities of its Apple TV product, according to a new report. By Eric Zeman , 5/27/20162 comments | Read | Post a Comment
Intel, which recently announced that it would focus more on the Internet of Things and cloud computing, is acquiring Itseez, which specializes in IoT and self-driving vehicle technology.By Nathan Eddy Freelance Writer, 5/27/20162 comments | Read | Post a Comment
In the first of a two-part series, we examine the impact DDoS attacks have on business continuity Ė and why it is so much more than a network security problem. By Vincent Berk CEO, FlowTraq, 5/27/20162 comments | Read | Post a Comment
Hewlett Packard Enterprise's plan to spin off its IT Outsourcing and services group and merge that group with CSC will make the remaining HPE a leaner, more focused company. It's a strategy other tech giants have pursued as well. But what about the downsides?By Jessica Davis Senior Editor, Enterprise Apps, 5/27/20160 comments | Read | Post a Comment
Hottest crimes reported to IC3 last year include ransomware and email scams via business email compromise and all account compromise attacks. By Ericka Chickowski Contributing Writer, Dark Reading, 5/27/20160 comments | Read | Post a Comment
Microsoft and Facebook are joining forces to construct the "MAREA" undersea cable, which will deliver high-speed connectivity across the Atlantic.By Kelly Sheridan Associate Editor, InformationWeek, 5/27/20160 comments | Read | Post a Comment
Reversing a reversal of its initial victory, Google once again has prevailed against Oracle's claim that Android infringes its Java copyrights.By Thomas Claburn Editor at Large, Enterprise Mobility, 5/27/20162 comments | Read | Post a Comment
CIOs are expected to be experts in tech as well as business while leading diverse and complicated intiatives and teams. But they don't have to go it alone. Here are 11 books to help CIOs -- and aspiring CIOs -- get better at many of the critical facets of their complex jobs. By Curtis Franklin Jr. Executive Editor, Technical Content, 5/27/20162 comments | Read | Post a Comment
The partnership with Amazon Web Services is expected to give Salesforce the ability to offer its core services as part of its international infrastructure expansion for the first time.By Dawn Kawamoto Freelance Writer and Editor, 5/26/20160 comments | Read | Post a Comment
Employee satisfaction and hundreds of billions in revenue when CISOs don't look for creative ways to secure innovative change.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/26/20161 Comment | Read | Post a Comment
PayPal will end support for its popular online payment app at the end of June, dealing another blow to BlackBerry and Windows Phone. The update also eliminates support for Amazon.By Nathan Eddy Freelance Writer, 5/26/20161 Comment | Read | Post a Comment
All the world may be a stage, but in the theater of cybersecurity, we need a more relevant dialogue of fresh ideas, novel approaches, and new ways of thinking.
By Joshua Goldfarb VP & CTO - Emerging Technologies, FireEye, 5/26/20160 comments | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.