Docker containers isolate resources similar to Linux or virtual machine hypervisors, but fall short with management and administration, Gartner analyst says. By Charles Babcock Editor At Large, InformationWeek , 1/14/20154 comments | Read | Post a Comment
After Google discloses Win 8.1 vulnerability two days prior to planned patch, Microsoft argues in favor of vulnerability publication schedules.By Thomas Claburn Editor-at-Large, 1/12/201514 comments | Read | Post a Comment
The latest flagship smartphone from Samsung gets its big reveal on the eve of Mobile World Congress 2015. Let us count the ways that it shines.By Thomas Claburn Editor-at-Large, 3/1/20151 Comment | Read | Post a Comment
This Week In 60 Seconds delves into the FCC’s net neutrality vote, reveals secret nerdy hobbies of the stars, and checks the state of secure payment systems.By Andrew Conry Murray Director of Content & Community, Interop, 2/27/20152 comments | Read | Post a Comment
MySQL Cluster was NoSQL and in-memory before those became fashionable, according to Oracle. Now those traits stand out in MySQL Cluster 7.4. By Doug Henschen Executive Editor, InformationWeek, 2/27/20153 comments | Read | Post a Comment
Using a single learning algorithm, Google's AI agent has developed its video game skills to the point where it can beat most human players in dozens of different games.By Thomas Claburn Editor-at-Large, 2/26/20158 comments | Read | Post a Comment
Salesforce claims its Service Cloud is ousting SAP and Oracle while the Wave Analytics Cloud is driving seven- and eight-figure deals.By Doug Henschen Executive Editor, InformationWeek, 2/26/20151 Comment | Read | Post a Comment
The FCC is slated to approve a controversial plan for net neutrality -- but that won't be the end of the matter.By Joe Stanganelli Attorney, Beacon Hill Law, 2/26/20153 comments | Read | Post a Comment
Space exploration, self-driving vehicles, advanced biometrics, and robotics are among the cool projects in the works at DARPA that are likely to have applications in the enterprise, too.By Joe Stanganelli Attorney, Beacon Hill Law, 2/25/201516 comments | Read | Post a Comment
Hadoop and big data community infighting won't attract enterprise adoption. It's time to raise the level of discourse.By Doug Henschen Executive Editor, InformationWeek, 2/25/20152 comments | Read | Post a Comment
But the 'sophisticated' attacks hit only Gemalto office networks--not 'massive theft' of SIM crypto keys, vendor says, and such an attack, if waged, would only affect 2G networks, not 3G or 4G.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/25/20153 comments | Read | Post a Comment
As companies embrace Tableau and Qlik, will the reporting platforms like BusinessObjects, Cognos, and MicroStrategy be left behind? Gartner sees conflicting needs and deployment practices.By Doug Henschen Executive Editor, InformationWeek, 2/25/20151 Comment | Read | Post a Comment
Developers are failing to respond quickly to reports of security flaws, Trojans are infecting corporate devices at an alarming rate, and even mundane data about your device's power consumption could threaten your privacy.By Thomas Claburn Editor-at-Large, 2/24/201516 comments | Read | Post a Comment
When famous technologists and scientists fear the menace of thinking machines, it's time to worry, right? Not really, because computers lack the imagination to wreak havoc, says one AI expert.By Jeff Bertolucci , 2/24/201527 comments | Read | Post a Comment
Staying on top of current technologies means anticipating future ones. Here, we look at seven technologies IT should be studying right now. One (or more) of these may well be the next big trend in the industry.By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 2/23/201528 comments | Read | Post a Comment
Time to Reconsider Enterprise Email StrategyCost, time, and risk. It's the demand trifecta vying for the attention of both technology professionals and attorneys charged with balancing the expectations of their clients and business units with the hard reality of the current financial and regulatory climate. Sometimes, organizations assume high levels of risk as a result of their inability to meet the costs involved in data protection. In other instances, it's time that's of the essence, as with a data breach.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.
InformationWeek 2014 Hybrid Cloud SurveyMixing public and private can deliver the best of both cloud worlds for IT groups that can figure out where workloads work best and address potential security issues.