From Uber's dirty tactics to Silicon Valley's lack of diversity, look back at the year's biggest letdowns.By Shane O'Neill Managing Editor, InformationWeek, 12/29/20140 comments | Read | Post a Comment
In 2015, expect to see the cloud mature as a platform for hybrid operations, with cloud data centers achieving new efficiencies through containers.By Charles Babcock Editor At Large, InformationWeek , 12/29/20140 comments | Read | Post a Comment
Apple's iPad sales slowed down in 2014, but the company can open new avenues for growth in 2015, especially among enterprise customers. By Michael Endler Associate Editor, InformationWeek.com, 12/29/20141 Comment | Read | Post a Comment
Containers aren't just good for developers. They're good for cloud workloads, if their supporters can get the security right.By Charles Babcock Editor At Large, InformationWeek , 12/29/20140 comments | Read | Post a Comment
Take a look back at some of the most memorable IT incidents -- for good and bad -- over the past year.By Lawrence Garvin Technical Product Marketing Manager, SolarWinds, 12/29/20140 comments | Read | Post a Comment
Docker is the latest technology to reduce the cost of making an application environment available to developers and other users.By Eric Schrock VP Engineering, Delphix, 12/29/20140 comments | Read | Post a Comment
Facebook, Twitter, LinkedIn, and other social media sites really stepped in it this year. Check out these 10 boneheaded moves that infuriated users.By Kristin Burnham Senior Editor, InformationWeek.com, 12/26/201412 comments | Read | Post a Comment
IT leaders play an increasing role for IT in charting company strategy, but challenges remain, including cost-cutting, improving analytics and innovation marketing, and boosting customer service.By InformationWeek Staff , 12/26/20140 comments | Read | Post a Comment
For small and midsize businesses, the benefits of public cloud services are many. Larger enterprises, however, may see less of a payoff. By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 12/26/20145 comments | Read | Post a Comment
By understanding what happened, when, how, and why, security teams can prevent similar breaches from occurring in the future.By Craig Carpenter President & COO, Resolution1 Security, 12/24/20147 comments | Read | Post a Comment
Sources close to the breach investigation say a network server missing two-factor authentication let attackers make their way into JPMorgan's servers.By Kelly Jackson Higgins Executive Editor at Dark Reading, 12/24/20149 comments | Read | Post a Comment
Many network managers and sysadmins will toil away during the holiday season dealing with remote access issues and other problems, an Ipswitch survey finds.By Marcia Savage Managing Editor, Network Computing, 12/24/201415 comments | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but thatís arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which theyíre developed ó even the attitudes, values, and work styles of the developers creating them.
InformationWeek 2014 Strategic CIO SurveyIT leaders play an increasing role for IT in charting company strategy, but challenges remain, including cost-cutting, improving analytics and innovation marketing, and boosting customer service.
Join us for a roundup of the top stories on InformationWeek.com for the week of December 14, 2014. Be here for the show and for the incredible Friday Afternoon Conversation that runs beside the program.