IoT
IoT
Managing Gen Z: A Primer For IT Managers
Microsoft, Red Hat Look To Steal VMware Customers
Bergen County Sheriff's Office Enters Hyper-Converged Future
Dropbox Urges Users To Change Old Passwords
5 IT Talent, Staffing Fails To Avoid 
News & Commentary
Baton Rouge Flood Map: Using IT Know-How In Emergency Situations
Jessica Davis,  Senior Editor, Enterprise Apps
News
The Department of Information Services in Baton Rouge used geographic information systems and data from 911 calls, search-and-rescue efforts, and more to create a map visualization of the impact of recent floods in the region. The story is a prime example of how IT professionals can put their knowledge to work in emergency situations.
By Jessica Davis Senior Editor, Enterprise Apps, 8/30/2016
Comment0 comments  |  Read  |  Post a Comment
6 Linux Kernel Changes IT Pros Need To Know
Charles Babcock, Editor at Large, Cloud
News
The 4.7 Linux kernel includes enhancements to security, automated testing prior to release, and an average 7.8 additions per hour over 10 weeks of development. Here is a look at what IT pros need to know about the OS that powers everything from mobile devices to servers and supercomputers.
By Charles Babcock Editor at Large, Cloud, 8/30/2016
Comment0 comments  |  Read  |  Post a Comment
Fulton Works Founder: Making The Switch From Music To IT
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
A computer science degree isn't the only path into software development. Brent Sanders used his musicianship to bring programming skills and team leadership to a development group. Here, he tells InformationWeek about his journey from trombone player to software company founder.
By Curtis Franklin Jr. Executive Editor, Technical Content, 8/30/2016
Comment0 comments  |  Read  |  Post a Comment
6 Reasons Hackathons Are Good For IT
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Inviting developers to solve technical challenges can open organizations up to new ways of doing things. Here are 6 IT benefits of hosting a hackathon.
By Thomas Claburn Editor at Large, Enterprise Mobility, 8/30/2016
Comment0 comments  |  Read  |  Post a Comment
DoD Taps DEF CON Hacker Traits For Cybersecurity Training Program
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Famed capture-the-packet contest technology will become part of DoD training as well.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/29/2016
Comment1 Comment  |  Read  |  Post a Comment
One20 Shifts Social Network For Truckers Into Gear
Eric Zeman,
Commentary
One20 is a mobile app, navigation specialist, and social network all rolled into a single service specifically for truck drivers.
By Eric Zeman , 8/29/2016
Comment0 comments  |  Read  |  Post a Comment
Hidden IT Security Risk: Privileged User Access
Nathan Eddy, Freelance Writer
News
A Ponemon report finds the security threats around privileged user access and the resulting insider threat risks appear to be growing. Here's what IT should be keeping an eye on.
By Nathan Eddy Freelance Writer, 8/29/2016
Comment1 Comment  |  Read  |  Post a Comment
4 Ways Chief Data Officers Can Win Stakeholder Support
Dawn Kawamoto, Freelance Writer and Editor
News
The role of a chief data officer increasingly makes its way into companies across the globe. But even as their ranks grow, CDOs often face resistance from colleagues who may feel threatened by data results. Here are four tips on how to become a more effective CDO.
By Dawn Kawamoto Freelance Writer and Editor, 8/29/2016
Comment0 comments  |  Read  |  Post a Comment
Microsoft, Red Hat Look To Steal VMware Customers
Charles Babcock, Editor at Large, Cloud
News
On the eve of VMworld 2016, VMware's annual user group conference, Microsoft and Red Hat would like to wean some of the company's customers to their offerings.
By Charles Babcock Editor at Large, Cloud, 8/29/2016
Comment0 comments  |  Read  |  Post a Comment
Dropbox Urges Users To Change Old Passwords
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Data from a 2012 breach has resurfaced, leading to fears that the information could be used to compromise accounts. IT managers using a new Dropbox feature don't need to worry, but they still have to guard against employees' bad password hygiene.
By Thomas Claburn Editor at Large, Enterprise Mobility, 8/29/2016
Comment2 comments  |  Read  |  Post a Comment
Bergen County Sheriff's Office Enters Hyper-Converged Future
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
The Bergen County, NJ, sheriff's office is moving its IT infrastructure to a hyper-converged architecture. The shift has expense and management complexity on the run.
By Curtis Franklin Jr. Executive Editor, Technical Content, 8/29/2016
Comment0 comments  |  Read  |  Post a Comment
11 Ways IT Professionals Can Make Sense of IoT Data
Lisa Morgan, Freelance Writer
News
IoT devices are entering the workplace in all shapes and sizes, from workers wearing smartwatches to industrial sensors such as soil monitors. The data pouring in may be so overwhelming it's unclear what should be done with it, why, and what the risks might be. Here are a few ways to navigate the maze.
By Lisa Morgan Freelance Writer, 8/29/2016
Comment0 comments  |  Read  |  Post a Comment
Managing Gen Z: A Primer For IT Managers
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Having grown up amid crises and technologically accelerated change, the second-wave of Millennials -- or Gen Z -- that's entering the workforce has different expectations and needs than people who came before them. Here are some tips on how IT managers can support and direct this new generation of workers.
By Thomas Claburn Editor at Large, Enterprise Mobility, 8/28/2016
Comment1 Comment  |  Read  |  Post a Comment
iOS 9.3.5 Fixes Massive Security Flaw: What IT Needs To Know 
Eric Zeman,
Commentary
An active threat using critical iOS zero-day vulnerabilities, which were dubbed "Trident," could allow hackers to install spyware on iPhones. IT managers should ensure employee devices are updated as soon as possible.
By Eric Zeman , 8/27/2016
Comment0 comments  |  Read  |  Post a Comment
5 IT Talent, Staffing Fails To Avoid 
Susan Nunziata, Editorial Director
News
When InformationWeek surveyed 100 IT leaders about their greatest mistakes, talent and staffing were among the many issues we heard about. Here, we focus on five of the biggest mistakes made in this category—and offer some advice on how you can learn from the pain of your peers.
By Susan Nunziata Editorial Director, 8/26/2016
Comment0 comments  |  Read  |  Post a Comment
The State Of Enterprise Big Data: Podcast
Jessica Davis,  Senior Editor, Enterprise Apps
News
Bill Schmarzo, EMC's CTO of big data services spends much of his time helping enterprises with their big data challenges. We spoke with him about the trends and struggles enterprises are facing.
By Jessica Davis Senior Editor, Enterprise Apps, 8/26/2016
Comment0 comments  |  Read  |  Post a Comment
Why IT Departments Need Social, Digital Communication Strategies
Nathan Eddy, Freelance Writer
News
With social media dominating communications outreach for businesses, IT departments need to focus on how to engage Millennial consumers.
By Nathan Eddy Freelance Writer, 8/26/2016
Comment1 Comment  |  Read  |  Post a Comment
The Hidden Dangers Of 'Bring Your Own Body'
Kon Leong, CEO/Co-founder, ZL Technologies
Commentary
The use of biometric data is on the rise, causing new security risks that must be assessed and addressed.
By Kon Leong CEO/Co-founder, ZL Technologies, 8/26/2016
Comment3 comments  |  Read  |  Post a Comment
US Bank Regulators Tighten Cyber-Security Efforts Around SWIFT
Dawn Kawamoto, Freelance Writer and Editor
News
Following the theft of millions of dollars from Bangladesh Bank via the international financial messaging system SWIFT, US banking regulators have outlined steps to tighten cyber-security at the nation's banks.
By Dawn Kawamoto Freelance Writer and Editor, 8/26/2016
Comment3 comments  |  Read  |  Post a Comment
HP EliteBook Gets Sure View To Block 'Visual Hacking'
Eric Zeman,
Commentary
Privacy screens on the HP EliteBook 1040 and HP EliteBook 840 will keep shoulder-surfers from spying on your machine.
By Eric Zeman , 8/25/2016
Comment4 comments  |  Read  |  Post a Comment
More Stories
Slideshows
5 IT Talent, Staffing Fails To Avoid 
Susan Nunziata, Editorial Director,  8/26/2016
News
Simple Networking Tools Ease IT Pains
Thomas Claburn, Editor at Large, Enterprise Mobility,  8/25/2016
News
IT Hiring: How Interns Can Give Companies An Edge
Dawn Kawamoto, Freelance Writer and Editor,  8/24/2016
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of August 21, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."