You might want to think twice about using an easy-to-remember security question for your protected accounts, according to a Google study. By Nathan Eddy Freelance Writer, 5/22/20153 comments | Read | Post a Comment
Apple is preparing some long overdue features for the iPad and may launch them on larger iPad Pro tablets later this year. This relates back to functionality in the upcoming iOS 9.By Eric Zeman , 5/22/20153 comments | Read | Post a Comment
Humans were responsible for only 41% of network traffic monitored by Distil Networks; bots made up the rest. What does this mean for your applications?By Curtis Franklin Jr. Executive Editor, Technical Content, 5/22/20151 Comment | Read | Post a Comment
Everybody loves to talk about a future filled with driverless cars, robots to tend to our every need, and artificial intelligence that can solve our problems. But does it all really matter for CIOs?By Susan Nunziata Editorial Director, 5/20/201515 comments | Read | Post a Comment
An IDC report indicates the market for the Internet of Things will only become more robust over the next few years. An increase use in retail digital signage will help the IoT market grow 19 percent in 2015.By Nathan Eddy Freelance Writer, 5/20/20151 Comment | Read | Post a Comment
The National Hockey League kicks off a five-year big data partnership with SAP with the 2015 Stanley Cup Bracket Challenge.By William Terdoslavich Freelance Writer, 5/20/20150 comments | Read | Post a Comment
With its OpenStack Services, IBM is looking to expand its cloud services portfolio to compete with the likes of Amazon and Microsoft Azure.By William Terdoslavich Freelance Writer, 5/19/20151 Comment | Read | Post a Comment
Among the major concerns of enterprises these days are data security and theft from mobile devices. Here's a look at whether iOS or Android offers better enterprise security. By InformationWeek Staff , 5/19/20153 comments | Read | Post a Comment
The letter, signed by Google, Apple, and a number of tech companies and security organizations, is urging Obama to halt legislation that would allow government to access personal data stored on mobile devices.By Nathan Eddy Freelance Writer, 5/19/20151 Comment | Read | Post a Comment
Whether prominent hacker Chris Roberts took over a plane or not, the industry needs to rethink the way white hat hackers do their research.By David Wagner Executive Editor, Community & IT Life, 5/18/20155 comments | Read | Post a Comment
Apple's Maps service has been gaining traction in the years following its bumpy rollout, and the acquisition of Coherent Navigation could make the app even more precise with GPS technology.By Nathan Eddy Freelance Writer, 5/18/20150 comments | Read | Post a Comment
By blending static big data with streaming analysis, agencies will get insights they've never had.By Chris Steel Chief Solutions Architect, Software AG Government Solutions, 5/18/20150 comments | Read | Post a Comment
In the Internet of Things, everything needs to be connected and "smart." But, if everything is smart, how do you know what's dumb or doomed to fail?By Pablo Valerio International Business & IT Consultant, 5/18/20153 comments | Read | Post a Comment
Here's what systems administrators and others in IT will love (and hate) about Microsoft's Windows 10 patch and upgrade strategy.By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 5/17/20151 Comment | Read | Post a Comment
The latest self-driving car prototypes from Google will roll on public roads in Mountain View, Calif., later this summer.By Thomas Claburn Editor at Large, Enterprise Mobility, 5/16/20159 comments | Read | Post a Comment
Despite the big data hype, the adoption of Hadoop remains a slow, steady process, according to new Gartner research. A lack of Hadoop skills and complexity can account for this.By William Terdoslavich Freelance Writer, 5/15/20151 Comment | Read | Post a Comment
The Apple Watch and Google's Android Wear platform don't have any security measures in place protecting their pricey wearables from loss or theft.By Eric Zeman , 5/14/20156 comments | Read | Post a Comment
A group of 80 Web academics have penned an open letter to Google insisting on more transparency for right to be forgotten requests in Europe. By Nathan Eddy Freelance Writer, 5/14/20154 comments | Read | Post a Comment
Building A Mobile Business MindsetAmong 688 respondents, 46% have deployed mobile apps, with an additional 24% planning to in the next year. Soon all apps will look like mobile apps – and it's past time for those with no plans to get cracking.
2014 IT Budget SurveyIs the IT budget moving out of IT's control? Maybe -- 37% of respondents say the rate of outside spending is on the rise, up from 22% last year. Just 21% of CIOs retain full budgetary authority. What is in our control: how we respond and work with business leaders.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
. We've got a management crisis right now, and we've also got an engagement crisis. Could the two be linked? Tune in for the next installment of IT Life Radio, Wednesday May 20th at 3PM ET to find out.