Consumers, businesses, and manufacturers can all help ensure that the privacy rights of those using wearables are respected and enforced.By Ruby A. Zefo Chief Privacy & Security Counsel, Intel, 8/18/201410 comments | Read | Post a Comment
Many of the "improvements" to ordinary household objects promised by SmartThings, a software company just acquired by Samsung, are already available elsewhere or seem like overkill. By Thomas Claburn Editor-at-Large, 8/18/201415 comments | Read | Post a Comment
Many of today's enterprises build 100 or more mobile apps every year. If you don't have a plan to manage the APIs that support them, innovation will come to a screeching halt.By Cathal McGloin CEO, FeedHenry, 8/22/20140 comments | Read | Post a Comment
Opera Software's Opera Mini browser will replace Nokia's Xpress on Nokia feature phones, but Microsoft's long-term plan for old Nokia products is unclear. By Michael Endler Associate Editor, InformationWeek.com, 8/21/20142 comments | Read | Post a Comment
Do you know the ins and outs of cloud software stacks and security? Got the finesse to break through cultural resistance? Then you may have found your next career.By Jonathan Feldman CIO, City of Asheville, NC, 8/21/20143 comments | Read | Post a Comment
When a database must stay tucked away in an enterprise data center, running a dependent service in the public clouds spells "latency." Or does it?By David Fowler VP Marketing, INetU, 8/21/20143 comments | Read | Post a Comment
The Android Security Modules (ASM) framework aims to streamline and spread security features, updates to Android devices.By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/20/20142 comments | Read | Post a Comment
Mobile malware continues to proliferate, particularly on Android devices. These four steps help counter the threat.By Julie M. Anderson Managing Director, Civitas Group, 8/20/20142 comments | Read | Post a Comment
For proposed V2V safety systems to work in the real world, a free flow of data between connected cars is essential. Naturally, the devil's in the details.By Jeff Bertolucci , 8/20/20145 comments | Read | Post a Comment
As the industry continues to shrink chips, energy efficiency is one way to expand Moore's Law beyond its current form. Let's explore how.By Mark Papermaster SVP & CTO, AMD, 8/20/20146 comments | Read | Post a Comment
A few apparent pranks, practice DDoS attacks, and other mischievous activities were spotted on the Black Hat USA wireless network in Las Vegas this month.By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/19/20142 comments | Read | Post a Comment
Leaked specs show what a budget-friendly Windows device might offer. Is it enough to stem surging Chromebook sales?By Michael Endler Associate Editor, InformationWeek.com, 8/19/201412 comments | Read | Post a Comment
InformationWeek Elite 100Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
The UC Infrastructure TrapWorries about subpar networks tanking unified communications programs could be valid: Thirty-one percent of respondents have rolled capabilities out to less than 10% of users vs. 21% delivering UC to 76% or more. Is low uptake a result of strained infrastructures delivering poor performance?
IT Salary Survey 2014: BI/AnalyticsIntelligence/analytics and data integration/warehousing professionals at the staff and managerial level are in demand, feel challenged, and are generally secure and optimistic about their careers. So why is compensation stagnant?