Accounting, transaction, and even navigation applications are based on the same basic type of structured database that has underpinned enterprise applications for the last three decades or more. So why aren't we paying more attention to these databases?By Curtis Franklin Jr. Executive Editor, Technical Content, 8/4/20150 comments | Read | Post a Comment
IBM has received 1,200 patents on cloud computing over the last 18 months. Here's a sample of what Big Blue is patenting and why it's a concern. By Charles Babcock Editor at Large, Cloud, 8/4/20154 comments | Read | Post a Comment
The friendly hitchBOT met a grisly end in Philadelphia. That tells you all you need to know about human-AI interactions.By Thomas Claburn Editor at Large, Enterprise Mobility, 8/3/20155 comments | Read | Post a Comment
Although the first edition of Google Glass didn't take off, the company is retooling the device for specialty industries such as healthcare and energy.By Nathan Eddy Freelance Writer, 8/1/20151 Comment | Read | Post a Comment
Travelers can now translate a greater variety of languages in images more efficiently, even when offline. Foreign travelers in remote areas with poor connectivity now have broader communication options.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/30/20159 comments | Read | Post a Comment
3D XPoint, coming next year, combines the advantages of DRAM and NAND flash. It's the first new category of memory introduced since NAND flash debuted in 1989.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/29/20152 comments | Read | Post a Comment
Users of Google Compute Engine can now provide their own keys to secure data, turning Infrastructure-as-a-Service (IaaS) into even more of a self-service affair.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/28/20152 comments | Read | Post a Comment
Tonia Williams, CIO of the Housing Authority of the Cherokee Nation, recounts how she was invited to imagine a data center where there was none, and then set out to build it. By Thomas Claburn Editor at Large, Enterprise Mobility, 7/28/20151 Comment | Read | Post a Comment
A new report shows that the iPhone kill switch may not be as effective as first thought. What does this mean for other smartphone kill switches? By Eric Zeman , 7/27/20159 comments | Read | Post a Comment
Google researchers have compared the security practices of experts to non-experts, and identified several ways that typical Internet users can improve their online security.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/27/20156 comments | Read | Post a Comment
Sussex County, NJ, built a cloud-based virtual desktop infrastructure for a mobile workforce. The project earned the organization a spot in the 2015 InformationWeek Elite 100.By Curtis Franklin Jr. Executive Editor, Technical Content, 7/27/20154 comments | Read | Post a Comment
Researchers now have proven you can hack a car remotely, and at Black Hat USA will share most -- but not all -- of the details on how they did it.By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/23/201511 comments | Read | Post a Comment
By entering the drone business in a joint venture with Aerosense, Sony aims to expand its involvement with cloud services and the Internet of Things.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/23/20152 comments | Read | Post a Comment
Drones are becoming more than mere law enforcement adjuncts, as cities find new ways to save money and even raise revenue with the unmanned aerial vehicles.By David Wagner Executive Editor, Community & IT Life, 7/23/201519 comments | Read | Post a Comment
InformationWeek Tech Digest August 03, 2015The networking industry agrees that software-defined networking is the way of the future. So where are all the deployments? We take a look at where SDN is being deployed and what's getting in the way of deployments.
Time to Reconsider Enterprise Email StrategyCost, time, and risk. It's the demand trifecta vying for the attention of both technology professionals and attorneys charged with balancing the expectations of their clients and business units with the hard reality of the current financial and regulatory climate. Sometimes, organizations assume high levels of risk as a result of their inability to meet the costs involved in data protection. In other instances, it's time that's of the essence, as with a data breach.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.