IBM is leveraging Kubernetes to enable its Watson AI to run on public clouds AWS, Google, and Microsoft Azure. The move signals a shift in strategy for IBM.By Jessica Davis Senior Editor, Enterprise Apps, 2/15/20190 comments | Read | Post a Comment
When TaylorMade Golf spun off from Adidas, it had to separate all its operations, including IT, and used the opportunity to try the Oracle Autonomous Database.By Jessica Davis Senior Editor, Enterprise Apps, 2/15/20190 comments | Read | Post a Comment
A wireless device resembling an Apple USB-Lightning cable that can exploit any system via keyboard interface highlights risks associated with hardware Trojans and insecure supply chains.By Robert Lemos Technology Journalist/Data Researcher, 2/14/20190 comments | Read | Post a Comment
Carmaker's open source car-hacking tool platform soon will be available to the research community.By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/14/20190 comments | Read | Post a Comment
In the weeks leading up to Valentine's Day 2019, researchers notice a new form of Gandcrab appearing in romance-themed emails.By Kelly Sheridan Staff Editor, Dark Reading, 2/14/20191 Comment | Read | Post a Comment
Enterprises that hold out to hire DevOps unicorns may be overlooking worthwhile workers who are already available.By Joao-Pierre S. Ruth Senior Writer, 2/14/20190 comments | Read | Post a Comment
The Internet is not fake, but protecting the value derived from online activity must account for social engineering. Here’s why.By Pierre DeBois Founder, Zimana, 2/14/20190 comments | Read | Post a Comment
Monica Witt, former Air Force and counterintel agent, has been indicted for conspiracy activities with Iranian government, hackers. By Kelly Jackson Higgins Executive Editor at Dark Reading, 2/13/20190 comments | Read | Post a Comment
Online dating profiles and social media accounts add to the rich data sources that allow criminals to tailor attacks.By Curtis Franklin Jr. Senior Editor at Dark Reading, 2/13/20190 comments | Read | Post a Comment
Speed, simplicity, and security underscore their desire, a new study shows.By Steve Zurier Freelance Writer, 2/13/20190 comments | Read | Post a Comment
Both individual employees and their employers need to take action to prepare for a future where people increasingly work alongside machines.By Ravi Kumar S., President, Infosys , 2/13/20190 comments | Read | Post a Comment
Migration to the cloud is part of many transformation plans but it can spiral into expenses that could be avoided.By Joao-Pierre S. Ruth Senior Writer, 2/13/20190 comments | Read | Post a Comment
With their regularly scheduled Patch Tuesday updates, both companies issued fixes for scores of vulnerabilities in their widely used software.By Robert Lemos , 2/12/20190 comments | Read | Post a Comment
Cybersecurity and IT risk budgets continue to grow. Here's how they'll be spent.By Ericka Chickowski Contributing Writer, Dark Reading, 2/12/20190 comments | Read | Post a Comment
Artificial intelligence is the brains behind self-driving cars, cancer research, and more. Now the White House has created an initiative to foster this technology.By Jessica Davis Senior Editor, Enterprise Apps, 2/12/20190 comments | Read | Post a Comment
The Fourth Industrial Revolution has arrived with the emergence of new technologies. Is your company ready to join in?By John Edwards Technology Journalist & Author, 2/12/20190 comments | Read | Post a Comment
The promise of AI is real, but the potential dangers are also just as real. In the end countermeasures will alleviate the dangers.By Jim Carnes, Chief Security Architect, Ciena , 2/12/20190 comments | Read | Post a Comment
New data from the credit reporting firm shows the sheer scale of online activity in the US also has made businesses and consumers there prime targets.By Jai Vijayan Freelance writer, 2/11/20190 comments | Read | Post a Comment
Take a fresh look at how your organization sources IT equipment, software, and services. Consider partnering with other IT organizations to gain efficiencies in your buying process.By Keith Fowlkes Vice President, Technology Business Category E&I Cooperative Services, 2/11/20190 comments | Read | Post a Comment
AI facial recognition algorithms are far from perfect. Here's what you should know if your enterprise is considering deploying this technology.By Jessica Davis Senior Editor, Enterprise Apps, 2/11/20190 comments | Read | Post a Comment
Security and Privacy vs. Innovation: The Great Balancing ActThis InformationWeek IT Trend Report will help you better understand and address the growing challenge of balancing the need for innovation with the real-world threats and regulations.
2018 State of the CloudCloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
To save this item to your list of favorite InformationWeek content so you can find it later in your Profile page, click the "Save It" button next to the item.
If you found this interesting or useful, please use the links to the services below to share it with other readers. You will need a free account with each service to share an item via that service.