The Apple Watch made a big splash in the media, but some financial and tech analysts aren't convinced consumers and enterprises are buying the hype. By Nathan Eddy Freelance Writer, 7/2/20150 comments | Read | Post a Comment
The pressure's on to use data to outsmart your competitors. Here are six ways companies can use data to imagine and even re-imagine what's possible.By Lisa Morgan Freelance Writer, 7/2/20150 comments | Read | Post a Comment
Longing to get away this summer but more interested in the Shire than St. Barths? Check out our guide to geek-tastic vacations worldwide. By Nathan Eddy Freelance Writer, 7/2/20150 comments | Read | Post a Comment
A new Gartner report finds that CIOs need to embrace agile development, and the firm offers 10 principles to guide this change.By Larry Loeb Blogger, Informationweek, 7/2/20150 comments | Read | Post a Comment
Working as a woman in IT doesn't have to be isolating. We've compiled the best organizations for women to connect with their peers, learn about career advancement, and receive the support to persevere.By Crystal Bedell freelance writer, 7/2/20151 Comment | Read | Post a Comment
Professors from UC Berkeley and UC Davis have developed a new way of reading fingerprints that allows for a 3D scan, rather than the traditional 2D scan. In theory, this should make fingerprint authentication on mobile devices harder to fool.By David Wagner Executive Editor, Community & IT Life, 7/2/20150 comments | Read | Post a Comment
Social Media enhances learning, develops needed contacts, speeds problem-solving, and helps you create business transformation.By Jonathan Feldman CIO, City of Asheville, NC, 7/2/20150 comments | Read | Post a Comment
US businesses are rapidly adopting hyperconverged systems as a way to streamline IT and storage operations, and in some cases as a bridge to software-defined storage, researchers find.By Marcia Savage Managing Editor, Network Computing, 7/2/20150 comments | Read | Post a Comment
Containerization is a hot technology that IT teams can't afford to ignore. Here are some basic facts to know plus benefits and risks to weigh.By Azmi Jafarey Network Computing Author, 7/2/20154 comments | Read | Post a Comment
Microsoft has released Windows 10 Build 10159 to the Fast ring of Windows Insiders, marking the second PC build in two days. By Kelly Sheridan Associate Editor, InformationWeek, 7/1/20151 Comment | Read | Post a Comment
Cisco's acquisition of security provider OpenDNS is a symptom of the vendor's transition to services that could have wide partner and competitor repercussions.By Russ White Principal Engineer, IPOS, Ericsson, 7/1/20151 Comment | Read | Post a Comment
Enterprise customers on Office 365 can preview new Skype for Business features, including broadcast and voice dial-in capabilities. By Kelly Sheridan Associate Editor, InformationWeek, 7/1/20151 Comment | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.