Web Becomes Less Free
Censorship, lack of privacy, and other ills threaten the health of the Web, says World Wide Web Foundation.
InformationWeek 2014 Mobile Security Survey
Securing company data on mobile devices is the top concern when it comes to mobile security. Respondents worry most about data loss due to lost or stolen devices, and less than half of respondents feel confident that data is protected.
4 Worst Government Data Breaches Of 2014
Government agency breaches pale in comparison to private sector companies' problems, but government did get hacked in 2014. Look at the four biggest incidents.
Cloud Storage's Race To Zero
The race to provide free unlimited cloud storage can't end well, not for the vendors -- or the customers who believe they have finally found a free lunch.
Top 5 Big Data Trends Of 2014
As companies move beyond bleeding-edge experiments into production deployments, these trends point to real-world progress in big data analysis.
2014 In Space: 11 Major Achievements
Comets and capsules grabbed top headlines, but robots racked up some firsts, the commercialization of space saw advances and setbacks, and the US prepared to resume manned space launches.
IBM Watson Analytics Goes Public
IBM opens beta use of its cloud-based, freemium data analysis service. Will natural-language interaction simplify number crunching?
Public Safety Communications: Time For Convergence
First responders need a better blend of reliability and multimedia capability. Until a dedicated 4G network is implemented, a blend of networks, devices, and applications should drive future procurements.
5 Companies That Represent IT's Best
Here's a look at the No. 1 company in each of the past five annual InformationWeek IT rankings. Why not yours in 2015? Apply for the InformationWeek Elite 100.
HP Cloud Adds Big Data Options
HP's Haven big data analytics platform, including Autonomy search and HP Vertica database software, will soon be available on demand.
Senate Explores Outsourcing Security Services
The US Senate might outsource core cyber security support to a managed security service. Candidate tasks include network security monitoring, threat analysis, incident reporting, vulnerability analysis, and security engineering and research.
Drones Fitted For Regulatory Collar
Federal Aviation Administration rules reportedly will require pilot certification to fly unmanned aircraft systems for commercial purposes.