Software // Operating Systems
News & Commentary
Network Forensics Separate Signal From Noise
Jay Botelho, Director of Product Management, WildPackets
Commentary
Identifying data breaches in progress and distinguishing false positives from real security attacks requires effective network forensics software.
By Jay Botelho Director of Product Management, WildPackets, 3/4/2015
Comment1 Comment  |  Read  |  Post a Comment
iPhone 6 Sales Propel Apple To Top Smartphone Spot
Kelly Sheridan, Associate Editor, InformationWeek
News
Samsung lost its top spot to Apple towards the end of 2014, during which smartphone sales surpassed 1 billion devices, according to Gartner.
By Kelly Sheridan Associate Editor, InformationWeek, 3/3/2015
Comment3 comments  |  Read  |  Post a Comment
IT Job Search: Talent Shortage Or Discrimination?
Marcia Savage, Managing Editor, Network Computing
News
Complaints of IT staffing shortages by hiring organizations puzzle IT pros who are looking for work. Experts cite some factors behind the disconnect.
By Marcia Savage Managing Editor, Network Computing, 3/3/2015
Comment12 comments  |  Read  |  Post a Comment
SDN Controller Handbook
Network Computing Editors,
News
This guide to SDN controllers describes the options available via open source software, traditional networking vendors and SDN startups, and how they differ.
By Network Computing Editors , 3/3/2015
Comment2 comments  |  Read  |  Post a Comment
What You Need To Know About Nation-State Hacked Hard Drives
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
The nation-state Equation Group compromise of most popular hard drives won't be a widespread threat, but future disk security -- and forensic integrity -- remain unclear.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/2/2015
Comment11 comments  |  Read  |  Post a Comment
Office For Windows 10: New Details Released At MWC
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft shares more details on the mobile Office for Windows 10 at this year’s Mobile World Congress.
By Kelly Sheridan Associate Editor, InformationWeek, 3/2/2015
Comment0 comments  |  Read  |  Post a Comment
Windows 10 For Mobile Takes MWC Stage
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft unveils Lumia 640 and 640XL with the promise of a Windows 10 flagship phone later this year.
By Kelly Sheridan Associate Editor, InformationWeek, 3/2/2015
Comment0 comments  |  Read  |  Post a Comment
GNS3 Network Simulator Raises Its Game
Susan Fogarty, Editor in Chief
News
GNS3 began as a Cisco emulation tool, but has grown into a multi-vendor network simulator with a collaborative community.
By Susan Fogarty Editor in Chief, 3/2/2015
Comment2 comments  |  Read  |  Post a Comment
Network Engineers: Don't Fear The Code
Lori MacVittie,
Commentary
The DevOps focus on automation and coding is pushing its way into networks, making network engineers uneasy about learning new skills. But a closer look at the trend shows it's more about the scripting they already do.
By Lori MacVittie , 3/2/2015
Comment1 Comment  |  Read  |  Post a Comment
Windows 10 Search, Productivity Apps: Microsoft Review
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft debuted Band updates, predicted the future of productivity, and broadened support for Docker in Azure, among other announcements.
By Kelly Sheridan Associate Editor, InformationWeek, 2/28/2015
Comment15 comments  |  Read  |  Post a Comment
NFV Home Lab: Licensing, Storage & Networking
Ethan Banks, Senior Network Architect
Commentary
In the second part of this two-part blog, Ethan Banks describes the storage and networking considerations that come into play when building a lab for testing network functions virtualization.
By Ethan Banks Senior Network Architect, 2/27/2015
Comment3 comments  |  Read  |  Post a Comment
LG Watch Urbane LTE Smartwatch Forgoes Android Wear
Eric Zeman,
Commentary
The LG Watch Urbane LTE smartwatch is the latest wearable from the company. This version adds features for making calls and sending messages, but LG ditched Android Wear to make it work.
By Eric Zeman , 2/26/2015
Comment1 Comment  |  Read  |  Post a Comment
BGP Security: No Quick Fix
Cengiz Alaettinoglu, Chief Technology Officer, Packet Design
Commentary
The routing protocol is plagued by multiple security vulnerabilities, which attackers are exploiting. However, securing BGP is no small feat.
By Cengiz Alaettinoglu Chief Technology Officer, Packet Design, 2/26/2015
Comment8 comments  |  Read  |  Post a Comment
Treating The Cloud As A Utility
Joe Stanganelli, Attorney, Beacon Hill Law
Commentary
A NIST report indicates that federal agencies want cloud providers to operate with more utility-like standardization.
By Joe Stanganelli Attorney, Beacon Hill Law, 2/26/2015
Comment9 comments  |  Read  |  Post a Comment
Software-Defined Storage Vs. Software-Delivered Storage
Howard Marks, Network Computing Blogger
Commentary
The difference between a software-defined storage product and one that's software delivered has more to do a vendor's go-to-market strategy than technical features.
By Howard Marks Network Computing Blogger, 2/25/2015
Comment3 comments  |  Read  |  Post a Comment
7 Linux Facts That Will Surprise You
Charles Babcock, Editor at Large, Cloud
News
Here are seven things we bet you didn't know about Linux and why it remains a software project of historic proportions.
By Charles Babcock Editor at Large, Cloud, 2/24/2015
Comment18 comments  |  Read  |  Post a Comment
Software-Defined Storage Takes Shape
Jim O'Reilly, Consultant
Commentary
The term is often misused in the industry, but some credible software-defined storage products have emerged.
By Jim O'Reilly Consultant, 2/24/2015
Comment11 comments  |  Read  |  Post a Comment
Cloud Integration Pain
Marcia Savage, Managing Editor, Network Computing
News
CDW study shows that integrating cloud services with legacy systems can be a headache for IT pros.
By Marcia Savage Managing Editor, Network Computing, 2/23/2015
Comment10 comments  |  Read  |  Post a Comment
NFV: 4 Home Lab Options
Ethan Banks, Senior Network Architect
Commentary
Network functions virtualization is well suited to the home lab. Ethan Banks describes how he built his NFV lab and the pros and cons of different configurations.
By Ethan Banks Senior Network Architect, 2/23/2015
Comment10 comments  |  Read  |  Post a Comment
Zero-Knowledge Cloud Storage: Far From Perfect
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
Commentary
You may get an extra layer of protection with zero-knowledge cloud encryption, but the cloud security system isn't fail-safe.
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 2/20/2015
Comment14 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Steal Our Slides
InformationWeek 2014 Hybrid Cloud Survey
InformationWeek 2014 Hybrid Cloud Survey
Mixing public and private can deliver the best of both cloud worlds for IT groups that can figure out where workloads work best and address potential security issues.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
UBM's Future Cities
Latest Stories from UBM's Future Cities
View All from Future Cities