April Fools' 2015: Google Maps Pac-Man Game, Microsoft Code, More
Amazon Bulks Up Cloud Instances For Big Data
Oracle ID Graph Helps Marketers Target Customers Anywhere
Microsoft Streamlines Visual Studio Pricing, Structure
Microsoft 'Project Spartan': Hands-On Demo
News & Commentary
Google Drive For Work Gets Limits
Thomas Claburn, Editor at Large, Enterprise Mobility
News
IT administrators have been telling Google that they want to be able to limit how Google Drive files can be used. Now, Google is obliging.
By Thomas Claburn Editor at Large, Enterprise Mobility, 4/1/2015
Comment0 comments  |  Read  |  Post a Comment
Cisco To Buy SDN Startup Embrane
Marcia Savage, Managing Editor, Network Computing
News
Networking giant announces plan to acquire network services specialist to bolster its ACI platform.
By Marcia Savage Managing Editor, Network Computing, 4/1/2015
Comment0 comments  |  Read  |  Post a Comment
Amazon Bulks Up Cloud Instances For Big Data
Charles Babcock, Editor at Large, Cloud
News
Amazon Web Services' larger virtual servers show the company is pursuing an enterprise-scale data warehouse and big data tasks.
By Charles Babcock Editor at Large, Cloud, 4/1/2015
Comment0 comments  |  Read  |  Post a Comment
Oracle ID Graph Helps Marketers Target Customers Anywhere
Doug Henschen, Executive Editor, Enterprise Apps
News
Oracle adapts BlueKai ID technology so Oracle Marketing Cloud users can reach customers in mobile, social, and advertising interactions.
By Doug Henschen Executive Editor, Enterprise Apps, 4/1/2015
Comment0 comments  |  Read  |  Post a Comment
April Fools' 2015: Google Maps Pac-Man Game, Microsoft Code, More
Eric Zeman,
Commentary
Beware the Web today, as many stories posted on April 1 are pranks. Here are some of the best, including Google Maps Pac-Man game, code from Microsoft, and more.
By Eric Zeman , 4/1/2015
Comment3 comments  |  Read  |  Post a Comment
Dance Of The 'Next-Gen' CISO
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Security Pro File: Classical ballerina-turned hacker-turned CISO Justine Bone talks old-school hacking, biometric authentication, coding in stilettos, Kristin Wiig -- and finishing her kids' leftover mac and cheese.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/1/2015
Comment0 comments  |  Read  |  Post a Comment
Microsoft Streamlines Visual Studio Pricing, Structure
Nathan Eddy, Freelance Writer
News
In looking to make life a little easier for developers, Microsoft is streamlining its Visual Studio offerings, and detailing a new pricing structure.
By Nathan Eddy Freelance Writer, 4/1/2015
Comment1 Comment  |  Read  |  Post a Comment
Spring Cleaning In The SOC: Focus On the Inside Threat
Jason Straight, Senior VP & Chief Privacy Officer, UnitedLex
Commentary
Along with warmer weather and melting snow, spring brings the perfect opportunity for user engagement. Here’s how to transform insiders into your most sophisticated security device.
By Jason Straight Senior VP & Chief Privacy Officer, UnitedLex, 4/1/2015
Comment0 comments  |  Read  |  Post a Comment
6 Steps To Survive A DevOps Transformation
Jez Humble, VP at Chef, a lecturer at U.C. Berkeley
Commentary
From measurable goals to targeting quick wins and sharing lessons learned, here are the steps that can lead to DevOps success.
By Jez Humble VP at Chef, a lecturer at U.C. Berkeley, 4/1/2015
Comment0 comments  |  Read  |  Post a Comment
Why Pinterest Updates Its Mobile App Every 3 Weeks
Chris Murphy, Editor, InformationWeek
Commentary
As established companies embrace mobile apps, they'll need to think more like Internet companies such as Pinterest.
By Chris Murphy Editor, InformationWeek, 4/1/2015
Comment3 comments  |  Read  |  Post a Comment
Google Chrome OS On A Stick
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The latest Chrome devices are more affordable than ever, and more varied in their form factors.
By Thomas Claburn Editor at Large, Enterprise Mobility, 4/1/2015
Comment2 comments  |  Read  |  Post a Comment
IT Life Radio: Working With Millennials
David Wagner, Executive Editor, Community & IT Life
Commentary
Join us for the first-ever IT Life Radio show April 1 at 3:00 PM ET.
By David Wagner Executive Editor, Community & IT Life, 4/1/2015
Comment0 comments  |  Read  |  Post a Comment
10 Apple Acquisitions: What Do They Mean?
Kelly Sheridan, Associate Editor, InformationWeek
News
Apple has a habit of buying tech companies. Let's look at its most recent acquisitions and in what ways each might enhance the company's future.
By Kelly Sheridan Associate Editor, InformationWeek, 4/1/2015
Comment0 comments  |  Read  |  Post a Comment
VMware VSAN: Reality Vs. Hype
Jim O'Reilly, Consultant
Commentary
VMware's Virtual SAN is touted for its performance, lower cost and scalability, but emerging trends such as white-box storage undercut those claims.
By Jim O'Reilly Consultant, 4/1/2015
Comment3 comments  |  Read  |  Post a Comment
Legacy IT Vendors & The AWS Fear Factor
Colm Keegan, Senior Analyst, Enterprise Strategy Group
Commentary
The popularity of Amazon Web Services, along with SaaS, means that traditional IT vendors must transform themselves in order to remain relevant in the new cloud era.
By Colm Keegan Senior Analyst, Enterprise Strategy Group, 4/1/2015
Comment3 comments  |  Read  |  Post a Comment
Apple Rumor Mill: Disposable Smartphones
David Wagner, Executive Editor, Community & IT Life
News
Well-placed sources leaked news on April 1 revealing Apple's plans for new line of disposable smartphones and accompanying recycling program.
By David Wagner Executive Editor, Community & IT Life, 4/1/2015
Comment2 comments  |  Read  |  Post a Comment
Amazon Buy Button: 1-Click Ordering Minus The Click
Thomas Claburn, Editor at Large, Enterprise Mobility
News
With its Dash Button and Dash Replenishment Service, Amazon aims to take the Internet of Things mainstream.
By Thomas Claburn Editor at Large, Enterprise Mobility, 3/31/2015
Comment2 comments  |  Read  |  Post a Comment
3 Big-Picture Themes CISOs Should Track At Interop
Ericka Chickowski, Contributing Writer, Dark Reading
News
Security programming is great, but Interop offers opportunity to learn about larger trends that will impact security in the coming year
By Ericka Chickowski Contributing Writer, Dark Reading, 3/31/2015
Comment0 comments  |  Read  |  Post a Comment
30% Of Companies Would Pay Ransoms To Cybercriminals
Sara Peters, Senior Editor at Dark Reading
News
Factor in under-reporting and the growing sophistication of ransomware -- like PacMan's social engineering scheme -- and the number might be higher.
By Sara Peters Senior Editor at Dark Reading, 3/31/2015
Comment1 Comment  |  Read  |  Post a Comment
Microsoft 'Project Spartan': Hands-On Demo
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft's Project Spartan, the browser designed to replace Internet Explorer, is available for testing on Windows 10.
By Kelly Sheridan Associate Editor, InformationWeek, 3/31/2015
Comment11 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Robot Room Service Delivers The Goods
Thomas Claburn, Editor at Large, Enterprise Mobility,  3/28/2015
IoT Revolution: Is The Enterprise Ready?
Susan Fourtané, Science & Technology journalist, writer, and philosopher,  3/27/2015
Facebook's Teleportation Station: 10 Things We Wanted Instead
David Wagner, Executive Editor, Community & IT Life,  3/27/2015
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
White Papers
Current Issue
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio