Fitness Trackers: Holiday Gift Guide
Ghostery Makes Privacy Marketable
Google Contributor: Pay To Block Ads
Retired CIOs: 5 Rewarding Second Acts
10 Holiday Party Attire Atrocities
News & Commentary
Cyber Security Needs Its Ralph Nader
Tsion Gonen , Chief Strategy Officer, SafeNet
Commentary
It took thousands of unnecessary traffic fatalities to create an environment for radical transformation of the auto industry. What will it take for a similar change to occur in data security?
By Tsion Gonen Chief Strategy Officer, SafeNet, 11/24/2014
Comment0 comments  |  Read  |  Post a Comment
USPS Played Cat And Mouse With Cyber Attacker
Jai Vijayan, Freelance writer
News
Postal Service takes restrained, methodical approach to cyberattack. Was this the right strategy?
By Jai Vijayan Freelance writer, 11/24/2014
Comment0 comments  |  Read  |  Post a Comment
Samsung Galaxy S5 Sales Tank, CEO In Glare
Eric Zeman,
News
Samsung shipped 40% fewer GS5 smartphones than it expected to, leaving them piled up in warehouses.
By Eric Zeman , 11/24/2014
Comment0 comments  |  Read  |  Post a Comment
IBM Courts DevOps With Dedicated Bluemix
Charles Babcock, Editor At Large, InformationWeek
News
Dedicated Bluemix is IBM's development platform with host servers in the cloud dedicated to a single customer, for security and compliance reasons.
By Charles Babcock Editor At Large, InformationWeek , 11/24/2014
Comment0 comments  |  Read  |  Post a Comment
Web Search, Transformed: Looking Out For You
Shane O'Neill, Managing Editor, InformationWeek
Commentary
Microsoft Bing director and author Stefan Weitz discusses how sensors, wearables, and big data are changing search.
By Shane O'Neill Managing Editor, InformationWeek, 11/24/2014
Comment0 comments  |  Read  |  Post a Comment
Ghostery Makes Privacy Marketable
Thomas Claburn, Editor-at-Large
News
Service that blocks Web tracking code turns out to be good for business, too.
By Thomas Claburn Editor-at-Large, 11/24/2014
Comment2 comments  |  Read  |  Post a Comment
Fitness Trackers: Holiday Gift Guide
Alison Diana, Senior Editor
News
Wearable fitness devices top many holiday lists this year. Here's how to choose the right one.
By Alison Diana Senior Editor, 11/24/2014
Comment5 comments  |  Read  |  Post a Comment
SDN Rationales
Jim O'Reilly, Consultant
Commentary
Understanding the different motivations for adopting software-defined networking provides a clearer view into the technology.
By Jim O'Reilly Consultant, 11/24/2014
Comment0 comments  |  Read  |  Post a Comment
Is Cloud Security Actually Achievable?
Neil Griffiths, Vice President of UCC Product Management, IntelePeer
Commentary
There's no denying the growth of cloud services, but security is still their biggest hurdle.
By Neil Griffiths Vice President of UCC Product Management, IntelePeer, 11/24/2014
Comment1 Comment  |  Read  |  Post a Comment
Cloud Security By The Numbers
Ericka Chickowski, Contributing Writer, Dark Reading
News
Quantifying the perceptions around cloud security practices.
By Ericka Chickowski Contributing Writer, Dark Reading, 11/21/2014
Comment4 comments  |  Read  |  Post a Comment
Google Contributor: Pay To Block Ads
Kristin Burnham, Senior Editor, InformationWeek.com
News
Google launched a new service that blocks ads on some websites in exchange for a nominal monthly subscription.
By Kristin Burnham Senior Editor, InformationWeek.com, 11/21/2014
Comment11 comments  |  Read  |  Post a Comment
Geekend: Replacing the Turing Test
David Wagner, Community Editor
Commentary
We need a better way to test artificial intelligence.
By David Wagner Community Editor, 11/21/2014
Comment4 comments  |  Read  |  Post a Comment
The Week When Attackers Started Winning The War On Trust
Kevin Bocek, VP Security Strategy & Threat Intelligence, Venafi
Commentary
The misuse of keys and certificates is not exotic or hypothetical. Itís a real threat that could undermine most, if not all, critical security controls, as recent headlines strongly show.
By Kevin Bocek VP Security Strategy & Threat Intelligence, Venafi, 11/21/2014
Comment1 Comment  |  Read  |  Post a Comment
Cartoon: Your SLA Is A Turkey
Brian Moore, Cartoonist & Illustrator
Commentary
Our cartoonist shows that, even on Thanksgiving, there's no such thing as a free lunch for IT people.
By Brian Moore Cartoonist & Illustrator, 11/21/2014
Comment10 comments  |  Read  |  Post a Comment
Video: Tech Hygiene Bad Habits, 3D Stock Portfolios
Andrew Conry Murray, Director of Content & Community, Interop
Commentary
This Week In 60 Seconds looks at bad tech hygiene habits, using Oculus Rift for 3D stock portfolios, security risks during the holiday shopping season, and more.
By Andrew Conry Murray Director of Content & Community, Interop, 11/21/2014
Comment2 comments  |  Read  |  Post a Comment
Comcast App Lets Customers Track Service Techs
Eric Zeman,
News
Comcast tests a service that alerts customers when technicians are on the way.
By Eric Zeman , 11/21/2014
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Azure Outage: Questions Remain
Charles Babcock, Editor At Large, InformationWeek
News
Microsoft Azure's East and South Central US data centers' performance plummeted while West remained relatively unaffected.
By Charles Babcock Editor At Large, InformationWeek , 11/21/2014
Comment5 comments  |  Read  |  Post a Comment
Grumpy IT Guy Tries Out Gonzo Tech Journalism
Grumpy IT Guy, IT Guy
Commentary
I want to quit IT, swig booze, do drugs while speeding across America to Las Vegas, and ruminate about the failure of '60s counterculture.
By Grumpy IT Guy IT Guy, 11/21/2014
Comment7 comments  |  Read  |  Post a Comment
Marketers Should Look Beyond Facebook, Twitter
Thomas Claburn, Editor-at-Large
News
Build social engagement around your own website, Forrester recommends.
By Thomas Claburn Editor-at-Large, 11/21/2014
Comment0 comments  |  Read  |  Post a Comment
Top Colleges For Online Computer Science Degrees
Marcia Savage, Managing Editor, Network Computing
News
New guide ranks US college online programs in computer science and related fields, and provides a neat tool for looking up average IT salaries by location.
By Marcia Savage Managing Editor, Network Computing, 11/21/2014
Comment9 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Firefox Drops Google For Yahoo Search
Thomas Claburn, Editor-at-Large,  11/20/2014
Tech Hygiene: 10 Bad Habits To Break
Jeff Bertolucci 11/18/2014
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
You're Doing BYOD Wrong: These Numbers Prove It
Almost 40% of users who connect personal mobile devices to corporate networks have no lock-screen mechanism set in place. Read >>
White Papers
Current Issue
InformationWeek Tech Digest, Nov. 10, 2014
Just 30% of respondents to our new survey say their companies are very or extremely effective at identifying critical data and analyzing it to make decisions, down from 42% in 2013. What gives?
Flash Poll
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
InformationWeek 2014 Healthcare IT Priorities Survey
InformationWeek 2014 Healthcare IT Priorities Survey
Health IT pros are focused on government mandates and programs, which leaves little time to optimize the new technology they've added over the last few years.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 16, 2014.
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.