Windows 8 was a complete flop on non-touch desktop PCs but Windows 8.1 cures some headaches. Here's how desktop users can get the most out of Microsoft's new operating system.By Michael Endler , 10/18/20130 | Read | Post a CommentLatest Comment:
Independent bodies would be funded by vendors, customers and government agencies, and validate products' performance, security and overall trustworthiness.By Mathew Schwartz , 10/18/20132 comments | Read | Post a CommentLatest Comment:
Dallas has higher smartphone adoption rate than New York and San Francisco, survey shows. Also, a frightening 2% of people admit to mobile shopping during a funeral.By Eric Zeman , 10/18/20130 | Read | Post a CommentLatest Comment:
Lenovo would like to purchase the reach of BlackBerry's enterprise network. But it's unlikely to end up in China-based Lenovo's hands, security experts say.By Eric Zeman , 10/18/20130 | Read | Post a CommentLatest Comment:
OpenStack is building up services fast, including some aspects of platform-as-a-service, in its new Havana release. That increases its appeal as the basis for private cloud in the enterprise.By Charlie Babcock , 10/18/20130 | Read | Post a CommentLatest Comment:
Federal agencies and IT contractors are still assessing the fallout from the shutdown on their operations, but initial figures point to high costs.By Elena Malykhina , 10/17/20130 | Read | Post a CommentLatest Comment:
Millennials are generally uninterested in cybersecurity careers -- which is dangerous, given the shortage of experts in this vital field.By InformationWeek , 10/17/20130 | Read | Post a CommentLatest Comment:
InformationWeek Tech Digest August 03, 2015The networking industry agrees that software-defined networking is the way of the future. So where are all the deployments? We take a look at where SDN is being deployed and what's getting in the way of deployments.
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.