Jeremy Schulman shares his secrets for navigating the transition in network operations by leveraging lessons learned from DevOps.By Susan Fogarty Editor in Chief, 8/28/20140 comments | Read | Post a Comment
JP Morgan working with FBI, US Secret Service to determine scope of breach, but other newly reported intrusions at financial firms may not be related. By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/28/20141 Comment | Read | Post a Comment
National Institute for Standards and Technology issues first draft of guidelines intended to help federal agencies balance benefits and risks of third-party mobile apps.By Richard W. Walker , 8/28/20142 comments | Read | Post a Comment
A year after launching NSX with much fanfare, VMware is targeting its network virtualization platform at customers with ample security budgets in the wake of high-profile security breaches.By Marcia Savage Managing Editor, Network Computing, 8/28/20142 comments | Read | Post a Comment
All Twitter users can access a detailed report on their followers and individual tweets, including impressions, clicks, and engagement. Here's what you need to know.By Kristin Burnham Senior Editor, InformationWeek.com, 8/28/20146 comments | Read | Post a Comment
HP tries to grow its lead in server market with ProLiant Gen9 servers that offer more computing power and lower costs.By Michael Endler Associate Editor, InformationWeek.com, 8/28/20141 Comment | Read | Post a Comment
Workday COO Mike Stankey claims his firm has a three- to five-year tech lead on Oracle and SAP because the cloud is "more than a destination and a pricing model."By Doug Henschen Executive Editor, InformationWeek, 8/28/20142 comments | Read | Post a Comment
Drawbaugh, whose inventive approach to healthcare IT and revenue creation earned UPMC a No. 1 ranking in the 2013 InformationWeek 500, is leaving his role after 18 years.By David F Carr Editor, InformationWeek Healthcare, 8/28/20141 Comment | Read | Post a Comment
Pew Research finds that social media users are less likely to voice opinions face-to-face if they believe their Facebook followers would disagree. Call it surveillance fallout.By Thomas Claburn Editor-at-Large, 8/28/20147 comments | Read | Post a Comment
IBM Watson moves from supplying known answers to tough questions to making its own discoveries in life sciences and pharmaceutical research.By Doug Henschen Executive Editor, InformationWeek, 8/28/201410 comments | Read | Post a Comment
Google, Twitter, and others identify the most common software design mistakes -- compiled from their own organizations -- that lead to security woes and how to avoid them.By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/27/20148 comments | Read | Post a Comment
Dogged by competition, Dropbox now gives subscribers 1 TB for $10 a month, but backing up data to an external hard drive is still cheaper.By Thomas Claburn Editor-at-Large, 8/27/20147 comments | Read | Post a Comment
Kevin Counihan, who ran Connecticut's successful state-based health insurance exchange, becomes HealthCare.gov's leader.By Ellis Booker Technology Journalist, 8/27/20146 comments | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
IT Salary Survey 2014: Application DevelopmentDevelopers' raises matched or beat inflation in 2014, and middle-aged men working at large firms on the coasts fared best. Still, software development remains a well-paying field for everyone.