6 Characteristics Of Data-Driven Rock Stars
NSA Wanted To Hack Google App Store, Infect Android Phones
iOS 9 Rumors  Point To 'Home' App For HomeKit
Google Maps Slur Forces Company To Apologize
Windows 10 Mobile: 5 Questions We Want Answered
News & Commentary
Bots Outpace Humans Online: Study
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
Humans were responsible for only 41% of network traffic monitored by Distil Networks; bots made up the rest. What does this mean for your applications?
By Curtis Franklin Jr. Executive Editor, Technical Content, 5/22/2015
Comment0 comments  |  Read  |  Post a Comment
10 iPhone Apps You've Never Heard Of
Nathan Eddy, Freelance Writer
News
Apple's App Store stocks more than a million apps; this guide will show you the hidden gems.
By Nathan Eddy Freelance Writer, 5/22/2015
Comment1 Comment  |  Read  |  Post a Comment
EMC Open Sources ViPR With Eye On Software Future
Jim O'Reilly, Consultant
Commentary
Storage heavyweight prepares for industry shift to software-defined storage by open sourcing its storage controller.
By Jim O'Reilly Consultant, 5/22/2015
Comment0 comments  |  Read  |  Post a Comment
PayPal Pivots From Platform To 'Operating System'
Thomas Claburn, Editor at Large, Enterprise Mobility
News
As it prepares for independence from eBay, PayPal is trying to redefine itself as something more than a payment company.
By Thomas Claburn Editor at Large, Enterprise Mobility, 5/21/2015
Comment0 comments  |  Read  |  Post a Comment
NASA Technology Roadmap: A Heavenly Guide For IT And CIOs
David Wagner, Executive Editor, Community & IT Life
News
NASA's Technology Roadmap for 2015-2035 gives hints about the future of IT in your enterprise. Here's how space is changing big data, supercomputing, and other technologies.
By David Wagner Executive Editor, Community & IT Life, 5/21/2015
Comment4 comments  |  Read  |  Post a Comment
NSA Wanted To Hack Google App Store, Infect Android Phones
Eric Zeman,
Commentary
The NSA and its Five Eyes allies researched a man-in-the-middle attack to infect Android smartphone users by hacking Google's App Store. It's the last revelation from Edward Snowden.
By Eric Zeman , 5/21/2015
Comment6 comments  |  Read  |  Post a Comment
iOS 9 Rumors Point To 'Home' App For HomeKit
Kelly Sheridan, Associate Editor, InformationWeek
News
Apple could be showing "Home," an app that integrates with home automation framework HomeKit and iOS 9, at WWDC next month.
By Kelly Sheridan Associate Editor, InformationWeek, 5/21/2015
Comment1 Comment  |  Read  |  Post a Comment
Google Maps Slur Forces Company To Apologize
Nathan Eddy, Freelance Writer
News
While Google's mapping technology can make everyday life much easier for many -- especially during Memorial Day weekend -- users' ability to edit search terms with Map Maker can cause problems.
By Nathan Eddy Freelance Writer, 5/21/2015
Comment5 comments  |  Read  |  Post a Comment
Data Encryption In The Cloud: Square Pegs In Round Holes
Thomas Ristenpart, Asst. Professor, Computer Sciences, University of Wisconsin
Commentary
Conventional encryption is a surefire solution for protecting sensitive data -- except when it breaks cloud applications. “Format-preserving” encryption could change all that.
By Thomas Ristenpart Asst. Professor, Computer Sciences, University of Wisconsin, 5/21/2015
Comment0 comments  |  Read  |  Post a Comment
Fluke's TruView Live Monitors Cloud, SaaS Apps
Andrew Conry Murray, Director of Content & Community, Interop
Commentary
A new hosted service from Fluke Networks uses physical and virtual appliances to monitor cloud application performance.
By Andrew Conry Murray Director of Content & Community, Interop, 5/21/2015
Comment0 comments  |  Read  |  Post a Comment
6 Characteristics Of Data-Driven Rock Stars
Lisa Morgan, Freelance Writer
News
Learn what traits to look for in data-savvy movers and shakers, from data scientists and business analysts to executives, managers, and even employees.
By Lisa Morgan Freelance Writer, 5/21/2015
Comment0 comments  |  Read  |  Post a Comment
The Great File Migration Is Underway
Andres Rodriguez, CEO, Nasuni
Commentary
As the amount of data in files grows, more and more will find their way in a great migration to cloud storage.
By Andres Rodriguez CEO, Nasuni , 5/21/2015
Comment2 comments  |  Read  |  Post a Comment
Half Of Retail, Healthcare Sites 'Always Vulnerable'
Sara Peters, Senior Editor at Dark Reading
News
Finding vulnerabilities in custom web applications isn't the major problem; fixing them in a timely fashion is, a new report from WhiteHat Security finds.
By Sara Peters Senior Editor at Dark Reading, 5/21/2015
Comment0 comments  |  Read  |  Post a Comment
ARIN Nearing IPv4 Depletion, For Real
Marcia Savage, Managing Editor, Network Computing
News
The American Registry for Internet Numbers says it will have to activate its IPv4 waiting list this summer. Enterprises can opt for IPv4 transfer market or finally consider deploying IPv6.
By Marcia Savage Managing Editor, Network Computing, 5/21/2015
Comment2 comments  |  Read  |  Post a Comment
9 Cool, Free Summer Classes For Tech Pros
Susan Fogarty, Editor in Chief
News
Looking to enrich your brain this summer? Look no further than these free online courses on everything from cyberwarfare and Python programming to superheroes, robotics and cooking for geeks.
By Susan Fogarty Editor in Chief, 5/21/2015
Comment4 comments  |  Read  |  Post a Comment
Windows 10 Mobile: 5 Questions We Want Answered
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft has given Windows 10 for desktop its share of attention. What can we expect from Windows 10 Mobile?
By Kelly Sheridan Associate Editor, InformationWeek, 5/20/2015
Comment4 comments  |  Read  |  Post a Comment
Driverless Cars, AI, Robots: Why CIOs Should Care
Susan Nunziata, Editorial Director
Commentary
Everybody loves to talk about a future filled with driverless cars, robots to tend to our every need, and artificial intelligence that can solve our problems. But does it all really matter for CIOs?
By Susan Nunziata Editorial Director, 5/20/2015
Comment8 comments  |  Read  |  Post a Comment
1.1 Million Hit In Another BlueCross BlueShield Breach
Dark Reading Staff,
News
CareFirst BCBS announces breach, two months after Premera Blue Cross disclosed a breach of 11 million records.
By Dark Reading Staff , 5/20/2015
Comment0 comments  |  Read  |  Post a Comment
Logjam Encryption Flaw Threatens Secure Communications On Web
Jai Vijayan, Freelance writer
News
Most major browsers, websites that support export ciphers impacted
By Jai Vijayan Freelance writer, 5/20/2015
Comment1 Comment  |  Read  |  Post a Comment
HANA, Hadoop Help SAP Connect IoT And Big Data
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
Engineers at Sapphire Now discussed the potential and limitations for SAP S/4HANA as a platform for managing an enterprise Internet of Things and the big data that strategy requires.
By Curtis Franklin Jr. Executive Editor, Technical Content, 5/20/2015
Comment2 comments  |  Read  |  Post a Comment
More Stories
PR Newswire
Microsoft Says Short Attention Spans Are Fine
David Wagner, Executive Editor, Community & IT Life,  5/15/2015
9 iOS, Android Apps to Boost Productivity
Kelly Sheridan, Associate Editor, InformationWeek,  5/18/2015
Google Self-Driving Cars Hit The Road
Thomas Claburn, Editor at Large, Enterprise Mobility,  5/16/2015
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 Digital Issue, April 2015
The 27th annual ranking of the leading US users of business technology
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
. We've got a management crisis right now, and we've also got an engagement crisis. Could the two be linked? Tune in for the next installment of IT Life Radio, Wednesday May 20th at 3PM ET to find out.