IoT
IoT
11 Ways IT Professionals Can Make Sense of IoT Data
VMware Customers Cautious About vCloud Air, Ready For IBM
4 Ways Chief Data Officers Can Win Stakeholder Support
Hidden IT Security Risk: Privileged User Access
One20 Shifts Social Network For Truckers Into Gear
News & Commentary
Malware Markets: Exposing The Hype & Filtering The Noise
Jim Walter, Senior SPEAR Researcher, Cylance
Commentary
There’s a lot of useful infosec information out there, but cutting through clutter is harder than it should be.
By Jim Walter Senior SPEAR Researcher, Cylance, 8/30/2016
Comment0 comments  |  Read  |  Post a Comment
Apple Bites Back At EU's $14.5 Billion Tax Bill 
Eric Zeman,
Commentary
The EU says that Ireland gave Apple illegal tax breaks over a period of 10 years and now wants the tech giant to pay 13 billion euros, or about $14.5 billion, in back taxes.
By Eric Zeman , 8/30/2016
Comment0 comments  |  Read  |  Post a Comment
6 Ways To Hack An Election
Eitan Bremler, Co-founder & VP Marketing and Product Management, Safe-T
Commentary
Threats to our electoral process can come from outside the country or nefarious insiders. Our country needs to be better prepared.
By Eitan Bremler Co-founder & VP Marketing and Product Management, Safe-T, 8/30/2016
Comment0 comments  |  Read  |  Post a Comment
IDC: IT Spending To Hit $2.7 Trillion By 2020
Nathan Eddy, Freelance Writer
News
Companies that invest in third platform services such as cloud, mobility, and big data as part of their digital transformation efforts will drive IT spending growth, according to IDC.
By Nathan Eddy Freelance Writer, 8/30/2016
Comment0 comments  |  Read  |  Post a Comment
VMware Customers Cautious About vCloud Air, Ready For IBM
Charles Babcock, Editor at Large, Cloud
News
As VMworld 2016 opens in Las Vegas, customers already have sharp opinions on VMware's commitment to the public cloud. However, these customers do like the company's alliance with IBM.
By Charles Babcock Editor at Large, Cloud, 8/30/2016
Comment1 Comment  |  Read  |  Post a Comment
Baton Rouge Flood Map: Using IT Know-How In Emergency Situations
Jessica Davis,  Senior Editor, Enterprise Apps
News
The Department of Information Services in Baton Rouge used geographic information systems and data from 911 calls, search-and-rescue efforts, and more to create a map visualization of the impact of recent floods in the region. The story is a prime example of how IT professionals can put their knowledge to work in emergency situations.
By Jessica Davis Senior Editor, Enterprise Apps, 8/30/2016
Comment1 Comment  |  Read  |  Post a Comment
6 Linux Kernel Changes IT Pros Need To Know
Charles Babcock, Editor at Large, Cloud
News
The 4.7 Linux kernel includes enhancements to security, automated testing prior to release, and an average 7.8 additions per hour over 10 weeks of development. Here is a look at what IT pros need to know about the OS that powers everything from mobile devices to servers and supercomputers.
By Charles Babcock Editor at Large, Cloud, 8/30/2016
Comment0 comments  |  Read  |  Post a Comment
Fulton Works Founder: Making The Switch From Music To IT
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
A computer science degree isn't the only path into software development. Brent Sanders used his musicianship to bring programming skills and team leadership to a development group. Here, he tells InformationWeek about his journey from trombone player to software company founder.
By Curtis Franklin Jr. Executive Editor, Technical Content, 8/30/2016
Comment0 comments  |  Read  |  Post a Comment
6 Reasons Hackathons Are Good For IT
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Inviting developers to solve technical challenges can open organizations up to new ways of doing things. Here are 6 IT benefits of hosting a hackathon.
By Thomas Claburn Editor at Large, Enterprise Mobility, 8/30/2016
Comment0 comments  |  Read  |  Post a Comment
DoD Taps DEF CON Hacker Traits For Cybersecurity Training Program
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Famed capture-the-packet contest technology will become part of DoD training as well.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/29/2016
Comment1 Comment  |  Read  |  Post a Comment
One20 Shifts Social Network For Truckers Into Gear
Eric Zeman,
Commentary
One20 is a mobile app, navigation specialist, and social network all rolled into a single service specifically for truck drivers.
By Eric Zeman , 8/29/2016
Comment0 comments  |  Read  |  Post a Comment
Hidden IT Security Risk: Privileged User Access
Nathan Eddy, Freelance Writer
News
A Ponemon report finds the security threats around privileged user access and the resulting insider threat risks appear to be growing. Here's what IT should be keeping an eye on.
By Nathan Eddy Freelance Writer, 8/29/2016
Comment1 Comment  |  Read  |  Post a Comment
4 Ways Chief Data Officers Can Win Stakeholder Support
Dawn Kawamoto, Freelance Writer and Editor
News
The role of a chief data officer increasingly makes its way into companies across the globe. But even as their ranks grow, CDOs often face resistance from colleagues who may feel threatened by data results. Here are four tips on how to become a more effective CDO.
By Dawn Kawamoto Freelance Writer and Editor, 8/29/2016
Comment1 Comment  |  Read  |  Post a Comment
Microsoft, Red Hat Look To Steal VMware Customers
Charles Babcock, Editor at Large, Cloud
News
On the eve of VMworld 2016, VMware's annual user group conference, Microsoft and Red Hat would like to wean some of the company's customers to their offerings.
By Charles Babcock Editor at Large, Cloud, 8/29/2016
Comment1 Comment  |  Read  |  Post a Comment
Dropbox Urges Users To Change Old Passwords
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Data from a 2012 breach has resurfaced, leading to fears that the information could be used to compromise accounts. IT managers using a new Dropbox feature don't need to worry, but they still have to guard against employees' bad password hygiene.
By Thomas Claburn Editor at Large, Enterprise Mobility, 8/29/2016
Comment2 comments  |  Read  |  Post a Comment
Bergen County Sheriff's Office Enters Hyper-Converged Future
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
The Bergen County, NJ, sheriff's office is moving its IT infrastructure to a hyper-converged architecture. The shift has expense and management complexity on the run.
By Curtis Franklin Jr. Executive Editor, Technical Content, 8/29/2016
Comment0 comments  |  Read  |  Post a Comment
11 Ways IT Professionals Can Make Sense of IoT Data
Lisa Morgan, Freelance Writer
News
IoT devices are entering the workplace in all shapes and sizes, from workers wearing smartwatches to industrial sensors such as soil monitors. The data pouring in may be so overwhelming it's unclear what should be done with it, why, and what the risks might be. Here are a few ways to navigate the maze.
By Lisa Morgan Freelance Writer, 8/29/2016
Comment0 comments  |  Read  |  Post a Comment
Managing Gen Z: A Primer For IT Managers
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Having grown up amid crises and technologically accelerated change, the second-wave of Millennials -- or Gen Z -- that's entering the workforce has different expectations and needs than people who came before them. Here are some tips on how IT managers can support and direct this new generation of workers.
By Thomas Claburn Editor at Large, Enterprise Mobility, 8/28/2016
Comment1 Comment  |  Read  |  Post a Comment
iOS 9.3.5 Fixes Massive Security Flaw: What IT Needs To Know 
Eric Zeman,
Commentary
An active threat using critical iOS zero-day vulnerabilities, which were dubbed "Trident," could allow hackers to install spyware on iPhones. IT managers should ensure employee devices are updated as soon as possible.
By Eric Zeman , 8/27/2016
Comment1 Comment  |  Read  |  Post a Comment
5 IT Talent, Staffing Fails To Avoid 
Susan Nunziata, Editorial Director
News
When InformationWeek surveyed 100 IT leaders about their greatest mistakes, talent and staffing were among the many issues we heard about. Here, we focus on five of the biggest mistakes made in this category—and offer some advice on how you can learn from the pain of your peers.
By Susan Nunziata Editorial Director, 8/26/2016
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Slideshows
5 IT Talent, Staffing Fails To Avoid 
Susan Nunziata, Editorial Director,  8/26/2016
News
Simple Networking Tools Ease IT Pains
Thomas Claburn, Editor at Large, Enterprise Mobility,  8/25/2016
News
IT Hiring: How Interns Can Give Companies An Edge
Dawn Kawamoto, Freelance Writer and Editor,  8/24/2016
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of August 21, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."