Facebook, Twitter, LinkedIn, and other social media sites really stepped in it this year. Check out these 10 boneheaded moves that infuriated users.By Kristin Burnham Senior Editor, InformationWeek.com, 12/26/201412 comments | Read | Post a Comment
IT leaders play an increasing role for IT in charting company strategy, but challenges remain, including cost-cutting, improving analytics and innovation marketing, and boosting customer service.By InformationWeek Staff , 12/26/20140 comments | Read | Post a Comment
For small and midsize businesses, the benefits of public cloud services are many. Larger enterprises, however, may see less of a payoff. By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 12/26/20145 comments | Read | Post a Comment
By understanding what happened, when, how, and why, security teams can prevent similar breaches from occurring in the future.By Craig Carpenter President & COO, Resolution1 Security, 12/24/20147 comments | Read | Post a Comment
Sources close to the breach investigation say a network server missing two-factor authentication let attackers make their way into JPMorgan's servers.By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/24/20149 comments | Read | Post a Comment
Many network managers and sysadmins will toil away during the holiday season dealing with remote access issues and other problems, an Ipswitch survey finds.By Marcia Savage Managing Editor, Network Computing, 12/24/201413 comments | Read | Post a Comment
Facebook's open data center designs offer efficiency and flexibility, but should your enterprise follow the Open Compute Project model? Here are some pros and cons.By Jim O'Reilly Consultant, 12/24/20143 comments | Read | Post a Comment
A journalist who writes about software writes his own and finds out coding is not easy. In fact, easy is particularly hard.By David F Carr Editor, InformationWeek Government/Healthcare, 12/23/201410 comments | Read | Post a Comment
Travel analytics firm Boxever thrives while executing three or four updates a day to its core systems on Cassandra in Amazon cloud.By Charles Babcock Editor At Large, InformationWeek , 12/23/20146 comments | Read | Post a Comment
RSA report on Backoff dives deeper into clues about the POS software and hints at attackers potentially located in India.By Ericka Chickowski Contributing Writer, Dark Reading, 12/23/20141 Comment | Read | Post a Comment
New Payment Card Industry security standards that take effect January 1 aim to replace checkmark mindsets with business as usual processes. Here are three examples.By Troy Leach and Christopher Strand Chief Technology Officer, PCI Security Standards Council & Senior Director of Compliance, Bit9, 12/23/20141 Comment | Read | Post a Comment
In 2015, software defined networking will move from niche technology to one that creates real business value.By Jonathan Davidson SVP & GM, Security, Switching & Solutions Business Unit, Juniper Networks, 12/23/20141 Comment | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
InformationWeek 2014 Strategic CIO SurveyIT leaders play an increasing role for IT in charting company strategy, but challenges remain, including cost-cutting, improving analytics and innovation marketing, and boosting customer service.
Join us for a roundup of the top stories on InformationWeek.com for the week of December 14, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program.