Windows 10 Mobile: Why Microsoft Is Confident
XPoint Memory Chips: Ushering In A New Mobile Era
IBM Cooks Up IoT Developer Community
HP Buys ActiveState's PaaS, Stackato
Windows 10: 5 Reasons It Matters, 5 Key Concerns
News & Commentary
Anthem Breach Linked To Black Vine Group & Beijing InfoSec Firm
Sara Peters, Senior Editor at Dark Reading
News
Health insurer's breach of 80 million records attributed to 'well-resourced cyberespionage group' Black Vine. Could they also be behind breaches at OPM and United Airlines?
By Sara Peters Senior Editor at Dark Reading, 7/29/2015
Comment0 comments  |  Read  |  Post a Comment
XPoint Memory Chips: Ushering In A New Mobile Era
Charles Babcock, Editor at Large, Cloud
News
Chip technology from Intel and Micron combines the best qualities of DRAM and solid state memory. It may lead to big changes in mobile and data center operations.
By Charles Babcock Editor at Large, Cloud, 7/29/2015
Comment2 comments  |  Read  |  Post a Comment
IBM Cooks Up IoT Developer Community
Larry Loeb, Blogger, Informationweek
Commentary
IBM's new developerWorks Recipes is a new community for those that want to want to develop IoT devices on the Big Blue model.
By Larry Loeb Blogger, Informationweek, 7/29/2015
Comment5 comments  |  Read  |  Post a Comment
Nokia OZO Virtual Reality Camera Aimed At Film Pros
Nathan Eddy, Freelance Writer
News
The world of virtual reality content moves a little closer to the mainstream with the launch of Nokia’s OZO virtual reality camera.
By Nathan Eddy Freelance Writer, 7/29/2015
Comment1 Comment  |  Read  |  Post a Comment
CERN Taps Brocade For SDN
Marcia Savage, Managing Editor, Network Computing
News
The legendary particle physics lab will use Brocade's OpenDaylight-based SDN controller to build out its SDN strategy.
By Marcia Savage Managing Editor, Network Computing, 7/29/2015
Comment0 comments  |  Read  |  Post a Comment
Windows 10 Mobile: Why Microsoft Is Confident
Eric Zeman,
Commentary
Windows 10 for smartphones is essentially feature complete, says Microsoft, and will make its official debut with a new flagship phone soon.
By Eric Zeman , 7/29/2015
Comment2 comments  |  Read  |  Post a Comment
Can't Touch This: 'Hammertoss' Russian Cyberspies Hide In Plain Sight
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
APT29 cyber espionage attackers operate under the cover of legitimate services including Twitter, Github, and cloud storage services.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/29/2015
Comment0 comments  |  Read  |  Post a Comment
Code Theft: Protecting IP At The Source
Anna Chiang, Technical Marketing Manager, Perforce Software
Commentary
Your corporate assets are at risk and every day that you avoid taking action shortens the time until your IP will be leaked. Here are six steps toward better data security.
By Anna Chiang Technical Marketing Manager, Perforce Software, 7/29/2015
Comment0 comments  |  Read  |  Post a Comment
HP Buys ActiveState's PaaS, Stackato
Charles Babcock, Editor at Large, Cloud
News
HP's Helion Development Platform is based on Stackato, one of the few commercially supported versions of Cloud Foundry.
By Charles Babcock Editor at Large, Cloud, 7/29/2015
Comment1 Comment  |  Read  |  Post a Comment
VMware Certifications To Boost Your Data Center Skills
Network Computing Editors,
News
Specialized training in virtualization, cloud, and virtual networks is becoming increasingly important for infrastructure professionals. VMware certifications like the VCAP and VCDX can help hone your skills.
By Network Computing Editors , 7/29/2015
Comment1 Comment  |  Read  |  Post a Comment
Intel, Micron Introduce Speedy Memory Technology
Thomas Claburn, Editor at Large, Enterprise Mobility
News
3D XPoint, coming next year, combines the advantages of DRAM and NAND flash. It's the first new category of memory introduced since NAND flash debuted in 1989.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/29/2015
Comment1 Comment  |  Read  |  Post a Comment
Mythbusters Tests Killer Drones
David Wagner, Executive Editor, Community & IT Life
News
See what the team on Discovery Communications' TV series Mythbusters learned when they tested the safety of drones. The results might make you lose your head.
By David Wagner Executive Editor, Community & IT Life, 7/29/2015
Comment5 comments  |  Read  |  Post a Comment
Building A Data-Centric Data Center
Kevin Deierling, Vice President, Mellanox
Commentary
The final installment of this series examines the key elements required to accomplish rack-level optimization for a new data center architecture.
By Kevin Deierling Vice President, Mellanox, 7/29/2015
Comment0 comments  |  Read  |  Post a Comment
Windows 10: 5 Reasons It Matters, 5 Key Concerns
Kelly Sheridan, Associate Editor, InformationWeek
News
The Windows 10 rollout has officially begun. Here are five reasons we're excited about the OS, and a few concerns for its future.
By Kelly Sheridan Associate Editor, InformationWeek, 7/29/2015
Comment4 comments  |  Read  |  Post a Comment
IT Life Radio: Where Virtual Reality Falls Short
David Wagner, Executive Editor, Community & IT Life
News
The latest episode of IT Life radio features the real-life inventor of Iron Man's Jarvis, who happens to bring similar innovations to the way we work.
By David Wagner Executive Editor, Community & IT Life, 7/28/2015
Comment3 comments  |  Read  |  Post a Comment
Motorola Moto X, Moto G Smartphones Target Samsung
Eric Zeman,
Commentary
The Motorola Moto X Style, Moto X Play, and Moto G offer something for everyone in customizable packages.
By Eric Zeman , 7/28/2015
Comment3 comments  |  Read  |  Post a Comment
Researchers Steal Door Badge Credentials Using Smartphone Bluetooth
Ericka Chickowski, Contributing Writer, Dark Reading
News
Weakness in facility access control protocol leaves most badge-in systems open to attack.
By Ericka Chickowski Contributing Writer, Dark Reading, 7/28/2015
Comment1 Comment  |  Read  |  Post a Comment
Lockheed Martin-Led Consortium Builds Secure 'System Of Systems'
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Multilevel Security (MLS) group says this policy-based architecture could apply to sensitive commercial networks as well as government agencies.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/28/2015
Comment11 comments  |  Read  |  Post a Comment
Is Cortana Microsoft's Equalizer With Google?
Larry Loeb, Blogger, Informationweek
Commentary
While Microsoft is positioning Cortana as a digital assistant, it could also filter search results to Bing, giving Redmond a new edge against Google in the lucrative search market.
By Larry Loeb Blogger, Informationweek, 7/28/2015
Comment0 comments  |  Read  |  Post a Comment
Google Lets Cloud Customers Supply Encryption Keys
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Users of Google Compute Engine can now provide their own keys to secure data, turning Infrastructure-as-a-Service (IaaS) into even more of a self-service affair.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/28/2015
Comment2 comments  |  Read  |  Post a Comment
More Stories
PR Newswire
10 Windows 10 Slogans That Didn't Make The Cut
David Wagner, Executive Editor, Community & IT Life,  7/26/2015
Drones: 10 Novel Uses For Your City
David Wagner, Executive Editor, Community & IT Life,  7/23/2015
Register for InformationWeek Newsletters
White Papers
Current Issue
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio