Richard Stallman is absolutely certain of many things. One of them is that he is not the father of open source software.By Curtis Franklin Jr. Executive Editor, Technical Content, 12/1/20152 comments | Read | Post a Comment
The trend towards virtualization is expanding the duties of a network engineer beyond traditional networking into server management.By Lee Badman Network Engineer & Wireless Technical Lead, 12/1/20152 comments | Read | Post a Comment
A recent spate of enterprise-class tablets -- and a significant increase in the ability to create content on tablets -- could change how enterprise users view the devices.By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 12/1/20151 Comment | Read | Post a Comment
In this video, Tony Fortunato discusses the simple form of HTTP authentication and shows how to verify an application is using it via Wireshark.By Tony Fortunato Owner, The Technology Firm, 11/30/20152 comments | Read | Post a Comment
Deciding whether to adopt a new technology can be nerve-wracking. Terry Slattery outlines key steps you can take to minimize the risk.
By Terry Slattery Principal Architect, NetCraftsmen, 11/30/20152 comments | Read | Post a Comment
Apple's professional-grade tablet is a massive slate that may replace a laptop for some -- but definitely not all -- mobile professionals. Here's a look at where the iPad Pro rises to the occasion and where it falls flat. By Eric Zeman , 11/29/20158 comments | Read | Post a Comment
Microsoft is releasing a test version of its Cortana digital concierge for Apple's iOS platform. This follows a similar release for Google Android smartphones. By Nathan Eddy Freelance Writer, 11/29/20156 comments | Read | Post a Comment
Microsoft this week yanked and restored its latest Windows 10 update, released disappointing workplace diversity numbers, and marked down products for Black Friday.
By Kelly Sheridan Associate Editor, InformationWeek, 11/28/20154 comments | Read | Post a Comment
Hybrid cloud is popular, but slow WAN connections ultimately make it an interim step towards moving all stored data to public cloud.By Jim O'Reilly Consultant, 11/26/20155 comments | Read | Post a Comment
After pulling its Windows 10 November update after reported problems with some users' privacy settings preferences, Microsoft reinstates the update.By Larry Loeb Blogger, Informationweek, 11/25/201513 comments | Read | Post a Comment
Apache Spark hit two more incremental milestones as the IBM SystemML machine learning engine for Spark was accepted to the Apache Incubator program and Databricks unveiled a preview of its SaaS edition of Spark 1.6.By Jessica Davis Senior Editor, Enterprise Apps, 11/25/20150 comments | Read | Post a Comment
The role of open source in networking is growing with the OpenDaylight Project among those leading the charge.By Dr. Jim Metzler Founder & Vice President, Ashton, Metzler & Associates, 11/25/20152 comments | Read | Post a Comment
Gifts for technologists don't have to be boring. Our tech gift guide offers fun and thoughtful options for your geeky friends and relations. By Susan Fogarty Editor in Chief, 11/25/20159 comments | Read | Post a Comment
About nine days after releasing its first major November update for Windows 10, Microsoft is yanking the downloadable version and replacing it with the build released originally in July. By Larry Loeb Blogger, Informationweek, 11/24/201533 comments | Read | Post a Comment
Microsoft's latest diversity report counts fewer women due to layoffs related to the restructuring of its phone business earlier this year.
By Kelly Sheridan Associate Editor, InformationWeek, 11/24/20154 comments | Read | Post a Comment
Third-party certification credential manager used by Cisco and others is taken down after malware infection.By Marcia Savage Managing Editor, Network Computing, 11/24/201510 comments | Read | Post a Comment
What's the first step to improving information security? Quit blaming people and focus on enabling technologies like encryption.By Tarun Loomba, VP & GM, Computing Storage Solutions, SanDisk Inc. , 11/24/20151 Comment | Read | Post a Comment
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.