Professors from UC Berkeley and UC Davis have developed a new way of reading fingerprints that allows for a 3D scan, rather than the traditional 2D scan. In theory, this should make fingerprint authentication on mobile devices harder to fool.By David Wagner Executive Editor, Community & IT Life, 7/2/20150 comments | Read | Post a Comment
Social Media enhances learning, develops needed contacts, speeds problem-solving, and helps you create business transformation.By Jonathan Feldman CIO, City of Asheville, NC, 7/2/20150 comments | Read | Post a Comment
US businesses are rapidly adopting hyperconverged systems as a way to streamline IT and storage operations, and in some cases as a bridge to software-defined storage, researchers find.By InformationWeek , 7/2/20150 comments | Read | Post a Comment
Containerization is a hot technology that IT teams can't afford to ignore. Here are some basic facts to know plus benefits and risks to weigh.By Azmi Jafarey Network Computing Author, 7/2/20150 comments | Read | Post a Comment
Microsoft has released Windows 10 Build 10159 to the Fast ring of Windows Insiders, marking the second PC build in two days. By Kelly Sheridan Associate Editor, InformationWeek, 7/1/20151 Comment | Read | Post a Comment
Cisco's acquisition of security provider OpenDNS is a symptom of the vendor's transition to services that could have wide partner and competitor repercussions.By Russ White Principal Engineer, IPOS, Ericsson, 7/1/20150 comments | Read | Post a Comment
Enterprise customers on Office 365 can preview new Skype for Business features, including broadcast and voice dial-in capabilities. By Kelly Sheridan Associate Editor, InformationWeek, 7/1/20151 Comment | Read | Post a Comment
At the 2015 InformationWeek conference, Chris Anderson spoke of building his drone company and how he weaponized Legos with his son.By InformationWeek Staff , 7/1/20152 comments | Read | Post a Comment
Latest wave of DDoS attacks abuses small office-home routers via the 27-year-old, outdated Routing Information Protocol Version 1 (RIPv1).By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/1/20151 Comment | Read | Post a Comment
While a recent study focuses on how consumers interact with brands, the results also hold lessons for IT in how to tailor internal tech support services to best meet the expectations of a multigenerational workforce.By David Wagner Executive Editor, Community & IT Life, 7/1/20154 comments | Read | Post a Comment
Gartner is predicting that worldwide spending on information technology will decline 5.5%, while Forrester has revised its US tech market projections down slightly.By Thomas Claburn Editor at Large, Enterprise Mobility, 6/30/20152 comments | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.