The industry is focusing less on electronic record features and more on sharing the data held in them.By Mark Braunstein Professor of the Practice, Georgia Institute of Technology, 4/17/20150 comments | Read | Post a Comment
The Los Angeles Unified School District's ambitious plan to provide an iPad for every student has been derailed by questions about the contract bidding process and dissatisfaction with the software.By Thomas Claburn Editor at Large, Enterprise Mobility, 4/17/20151 Comment | Read | Post a Comment
Threat actors have set up several new C&C servers and dozens of new malicious URLs -- and now targeting White House staffers, Trend Micro says.
By Jai Vijayan Freelance writer, 4/17/20150 comments | Read | Post a Comment
Through Android For Work, Google has made its mobile device management tool for Android smartphones available to businesses, offering IT teams the control they want and the security they need.By Eric Zeman , 4/17/20152 comments | Read | Post a Comment
How do you prevent your environment from becoming the next target? Turn the tables on your attackers. By Dr. Chase Cunningham Head of Threat Intelligence, FireHost, 4/17/20150 comments | Read | Post a Comment
Several components of Docker, including Engine, Registry, and orchestration tools, have been upgraded together as a platform.By Charles Babcock Editor at Large, Cloud, 4/17/20151 Comment | Read | Post a Comment
Space is expensive, dangerous, and easy to get wrong. This week, news about Space X, the upcoming Hubble anniversary, and the price of astronaut coffee shows why we should think hard about future projects.By David Wagner Executive Editor, Community & IT Life, 4/17/20159 comments | Read | Post a Comment
Joint flash memory ventures Intel-Micron and Toshiba-SanDisk are overcoming the limitations of conventional planar flash memory by going 3D.By Howard Marks Network Computing Blogger, 4/17/20151 Comment | Read | Post a Comment
The Surface 3, the newest hybrid from Microsoft, packs the hallmarks of Surface Pro 3 into a thinner and lighter device. By Kelly Sheridan Associate Editor, InformationWeek, 4/17/20156 comments | Read | Post a Comment
Malicious firmware update could lead to device, full home network 0wnage, researcher will show next week at the RSA Conference.By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/16/20152 comments | Read | Post a Comment
Microsoft and Yahoo renew their 2009 partnership to enhance the search experience across platforms and boost value for advertisers. By Kelly Sheridan Associate Editor, InformationWeek, 4/16/20153 comments | Read | Post a Comment
How users and their endpoints are leveraged by the bad guys to eventually find their way to critical dataBy Ericka Chickowski Contributing Writer, Dark Reading, 4/16/20153 comments | Read | Post a Comment
Angela Ahrendts, Apple's retail chief, said the company will sell its high-end Apple Watch online exclusively until June as preorders continue unabated. The latest estimates have preorder sales topping 2 million.By Eric Zeman , 4/16/20153 comments | Read | Post a Comment
New Engine Yard CEO Beau Vrolyk is moving the company toward managing Linux containers for developers, with the acquisition of OpDemand.By Charles Babcock Editor at Large, Cloud, 4/16/20152 comments | Read | Post a Comment
Here are six real-world examples of how changing your modus operandi from reactive to proactive can drive rapid response to the threats that matter. By Stu Solomon VP, General Counsel & Chief Risk Officer, iSIGHT Partners, 4/16/20151 Comment | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.