Microsoft is restricting Cortana to work only with Bing and Edge, and eliminating the use of third-party browsers and search engines for its digital assistant.By Kelly Sheridan Associate Editor, InformationWeek, 4/30/20160 comments | Read | Post a Comment
Microsoft is working with Twist Bioscience, a company that encodes data onto microscopic and long-lasting synthetic DNA. By Michelle Maisto Freelance Writer, 4/30/20160 comments | Read | Post a Comment
Microsoft this week published Office updates for April, launched a new workflow app, and released a major new Windows 10 so Insiders can help with bug-squashing.By Kelly Sheridan Associate Editor, InformationWeek, 4/30/20160 comments | Read | Post a Comment
Google is looking to bring together its diverse array of hardware products, which includes its Glass wearable headgear and TV streaming stick Chromecast, under a newly created division. By Dawn Kawamoto Freelance Writer and Editor, 4/29/20160 comments | Read | Post a Comment
Flash storage is maturing, and the latest products are taking on a more general-purpose storage function. To meet those needs, IBM introduced three such arrays this week.By Charles Babcock Editor at Large, Cloud, 4/29/20160 comments | Read | Post a Comment
Tablet shipments declined during the first quarter, but a curious change is occurring. Interest in detachable tablets like Microsoft Surface is increasing, while interest in traditional slates decreases.By Eric Zeman , 4/29/20161 Comment | Read | Post a Comment
Wearables, wireless audio, and the connected devices that are paving the way to the Internet of Things are driving spending in the consumer tech market in 2016, according to a report from the Consumer Technology Association. By Nathan Eddy Freelance Writer, 4/29/20160 comments | Read | Post a Comment
Yes, it’s true that the speed of DevOps has made security more difficult. But that doesn’t mean accelerated release cycles and secure applications have to be mutually exclusive.By Robert Reeves CTO & Co-Founder, Datical, 4/29/20160 comments | Read | Post a Comment
Bertrand Piccard, the pilot of the Solar Impulse 2 plane that recently flew from Hawaii to San Francisco, says more radical thinking is needed on energy.By Charles Babcock Editor at Large, Cloud, 4/29/20162 comments | Read | Post a Comment
Many organizations are taking the Agile development discipline beyond IT to every department. What are the key issues to make the transition successful?By Curtis Franklin Jr. Executive Editor, Technical Content, 4/29/20161 Comment | Read | Post a Comment
HP and Google introduced the Chromebook 13, an ultra-thin, lightweight laptop that looks to make enterprise computing easier to integrate with cloud-based infrastructure and apps.By Scott Ferguson Director of Audience Development, UBM Tech, 4/29/20160 comments | Read | Post a Comment
The Internet of Things hasn't quite caught on with consumers. But developers are working on changing that by rolling out innovative projects. Here's a look at some on display at the recent Samsung Developer Conference. By Thomas Claburn Editor at Large, Enterprise Mobility, 4/29/20160 comments | Read | Post a Comment
Group called Platinum employs spear phishing and malicious use of hot patching to steal information from government agencies in Asia.By Rutrell Yasin Business Technology Writer, Tech Writers Bureau, 4/28/20160 comments | Read | Post a Comment
In the wake of OPM and other big gov breaches, government cybersecurity performance scores and employee confidence ratings sink through the floor.
By Ericka Chickowski Contributing Writer, Dark Reading, 4/28/20160 comments | Read | Post a Comment
The US House of Representatives has approved the Email Privacy Act by a unanimous vote. That sets the stage for requiring search warrants to review electronic communications older than 180 days.By Dawn Kawamoto Freelance Writer and Editor, 4/28/20160 comments | Read | Post a Comment
Apple CareKit technology is now available to developers through GitHub, and to consumers through four updated applications -- Iodine, One Drop, Glow Nurture, and Glow Baby -- from startups Apple spent the last month working with.By Michelle Maisto Freelance Writer, 4/28/20160 comments | Read | Post a Comment
As POS malware attacks on hotels increase and threat actors target executives, traveling for business puts company data at risk.
By Emily Johnson Associate Editor, UBM Americas, 4/28/20169 comments | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Join us for a roundup of the top stories on InformationWeek.com for the week of April 24, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week!