7 Bold Tech Ideas That Will Make You Uncomfortable
Google I/O: 10 Things We Expect To See
John Nash, 'Beautiful Mind' Inspiration, Influenced IT, Too
EMC Buys Virtustream To Expand Its Cloud Offerings
BlackBerry Doomed By First iPhone, Storm Failure
News & Commentary
Big Data: 6 Real-Life Business Cases
Lisa Morgan, Freelance Writer
News
Better data analysis enables companies to optimize everything in the value chain -- from sales to order delivery to optimal store hours. Here are six examples of how major enterprises are using data to improve their business models.
By Lisa Morgan Freelance Writer, 5/27/2015
Comment0 comments  |  Read  |  Post a Comment
Microsoft Releases SQL Server 2016 Preview, Azure Update
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft Azure and big data updates include public previews of SQL Server 2016 and Live Encoding for Azure Media Services.
By Kelly Sheridan Associate Editor, InformationWeek, 5/27/2015
Comment0 comments  |  Read  |  Post a Comment
Moose Malware Uses Linux Routers For Social Network Fraud
Sara Peters, Senior Editor at Dark Reading
News
Linux/Moose is sophisticated enough to do DNS hijacks, DDoSes, and deep network penetration...so why is it wasting its time on Instagram?
By Sara Peters Senior Editor at Dark Reading, 5/27/2015
Comment0 comments  |  Read  |  Post a Comment
Microsoft Office Coming To 20 More Android Tablets
Eric Zeman,
Commentary
Microsoft has convinced 20 more Android tablet OEMs to install its Office productivity software on their devices. It's a smart move by Redmond.
By Eric Zeman , 5/27/2015
Comment0 comments  |  Read  |  Post a Comment
Escalating Cyberattacks Threaten US Healthcare Systems
Rick Kam and Larry Ponemon, Rick Kam, President & Co-founder, ID Experts & Larry Ponemon, Chairman & Founder, Ponemon Institute
Commentary
Electronic health records are prime targets because healthcare organizations lack the resources, processes, and technologies to protect them. And it’s only going to get worse.
By Rick Kam and Larry Ponemon Rick Kam, President & Co-founder, ID Experts & Larry Ponemon, Chairman & Founder, Ponemon Institute, 5/27/2015
Comment0 comments  |  Read  |  Post a Comment
Google Planning New Nexus Smartphones In 2015, Report Claims
Nathan Eddy, Freelance Writer
News
Although Google's Android platform is the dominant operating system on smartphones worldwide, it has struggled with its Nexus-branded hardware. A new report claims Google will try again this year.
By Nathan Eddy Freelance Writer, 5/27/2015
Comment0 comments  |  Read  |  Post a Comment
Internet Traffic Will Hit 2 Zettabytes By 2019, Cisco Says
Marcia Savage, Managing Editor, Network Computing
News
The Cisco Visual Networking Index forecasts surge in IP traffic driven by number of factors, including growth of the Internet of Things.
By Marcia Savage Managing Editor, Network Computing, 5/27/2015
Comment4 comments  |  Read  |  Post a Comment
Iris Scans: Security Breakthrough Or Privacy Invasion?
David Wagner, Executive Editor, Community & IT Life
News
New technology allows irises to be scanned from 40 feet away. Is this a wonder weapon against crime and terrorism or a way for governments to invade our privacy and track our movements?
By David Wagner Executive Editor, Community & IT Life, 5/27/2015
Comment2 comments  |  Read  |  Post a Comment
Tech Jobs: 12 Killer Locations
Susan Fogarty, Editor in Chief
News
The number of technology jobs is increasing across the country, but you might need to look in some unexpected cities and states to find them.
By Susan Fogarty Editor in Chief, 5/27/2015
Comment4 comments  |  Read  |  Post a Comment
What Data Breaches Now Cost And Why
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
New Ponemon report says the cost of a data breach has increased by 23% and healthcare and education breaches are the most pricey.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/27/2015
Comment1 Comment  |  Read  |  Post a Comment
Google I/O: 10 Things We Expect To See
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Expect a demonstration of the next version of Android, along with a standalone photo-sharing service and a new iteration of Chromecast.
By Thomas Claburn Editor at Large, Enterprise Mobility, 5/27/2015
Comment0 comments  |  Read  |  Post a Comment
Overcoming Cloud Security Challenges
Brendan Ziolo, Head of Large Enterprise Strategy, Alcatel-Lucent
Commentary
To truly take advantage of cloud computing, enterprises must balance the capabilities of public and private, while focusing on security.
By Brendan Ziolo Head of Large Enterprise Strategy, Alcatel-Lucent, 5/27/2015
Comment1 Comment  |  Read  |  Post a Comment
John Nash, 'Beautiful Mind' Inspiration, Influenced IT, Too
David Wagner, Executive Editor, Community & IT Life
News
If you have ever played a game against a computer, you played against an algorithm that used at least some math laid down -- or inspired -- by John Nash. Many of those same algorithms are being extended to cognitive computing outside of game situations.
By David Wagner Executive Editor, Community & IT Life, 5/26/2015
Comment2 comments  |  Read  |  Post a Comment
EMC Buys Virtustream To Expand Its Cloud Offerings
Charles Babcock, Editor at Large, Cloud
News
EMC will apply Virtustream's cloud software and managed hosting expertise across its businesses, including VMware.
By Charles Babcock Editor at Large, Cloud, 5/26/2015
Comment0 comments  |  Read  |  Post a Comment
IRS Breach Exposes 100,000 Taxpayers' Tax Returns, Other Data
Dark Reading Staff,
News
Online 'Get Transcript' service accessed from February to mid-May.
By Dark Reading Staff , 5/26/2015
Comment6 comments  |  Read  |  Post a Comment
7 Bold Tech Ideas That Will Make You Uncomfortable
Chris Murphy, Editor, InformationWeek
News
Elite tech leaders pushed the boundaries at the InformationWeek Conference. At least one of these ideas should make you squirm and think, "We need to do that."
By Chris Murphy Editor, InformationWeek, 5/26/2015
Comment8 comments  |  Read  |  Post a Comment
Profile Of A Cybercrime Petty Thief
Sara Peters, Senior Editor at Dark Reading
News
Trend Micro provides peek at methods of amateur, lone-wolf carder.
By Sara Peters Senior Editor at Dark Reading, 5/26/2015
Comment0 comments  |  Read  |  Post a Comment
Jony Ive Promoted To Chief Design Officer At Apple
Nathan Eddy, Freelance Writer
News
Jony Ive, the design genius behind Apple's most iconic products, including the MacBook, iPhone, and Apple Watch, gets a promotion to chief design officer. What does it mean for the rest of the company?
By Nathan Eddy Freelance Writer, 5/26/2015
Comment7 comments  |  Read  |  Post a Comment
A Threat Intelligence-Sharing Reality-Check
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Many organizations employ sharing one-way (gathering) and mainly for 'CYA,' experts say.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/26/2015
Comment0 comments  |  Read  |  Post a Comment
Microsoft Cortana Destined For iOS, Android
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft's Cortana app for Apple's iOS and Google Android will be available for download later this year.
By Kelly Sheridan Associate Editor, InformationWeek, 5/26/2015
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
8 Reasons IT Pros Hate The Cloud
Andrew Froehlich, President & Lead Network Architect, West Gate Networks,  5/25/2015
Driverless Cars, AI, Robots: Why CIOs Should Care
Susan Nunziata, Editorial Director,  5/20/2015
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 Digital Issue, April 2015
The 27th annual ranking of the leading US users of business technology
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
. We've got a management crisis right now, and we've also got an engagement crisis. Could the two be linked? Tune in for the next installment of IT Life Radio, Wednesday May 20th at 3PM ET to find out.