Equinix Service Aims To Scrub Out DDoS Attacks
Equinix is making F5 Networks' Silverline protection available in a handful of its International Business Exchange data centers. Silverline can detect the launch of an attack as it makes use of the network and take steps to mitigate it in real-time.
How TD Bank Is Transforming Its Data Infrastructure
TD Bank has embarked on an effort to transform traditional banking data infrastructure into a more modern system built on a new application framework and APIs. This system leverages TD Bank's data to deliver insights on-demand.
6 Barriers To IoT Data Flow
Enterprises are integrating IoT devices into their ecosystems to get data that was not available previously. As with most new data sources, there may be concerns about whether the data is accessible, usable, valuable, and secure. Here are a few things to consider as your enterprise moves toward IoT.
Apple May Add Touch ID To OS X
The iconic computer and device maker is reportedly considering an OS X 10.12 feature that would allow users to unlock their Macs via the same Touch ID technology that's in iPhones and iPads.
LinkedIn Hack: Why Breach Is A Wake-Up Call For Users
The 2012 LinkedIn security breach is far worse than previously reported. Now reports say that hackers are trying to sell information for more than 117 million accounts, which should have people who use the same password on multiple sites worried.
Microsoft SQL Server 2016 Update Embraces Hybrid Cloud, Big Data
Microsoft's forthcoming SQL Server 2016 adds better encryption, support for unstructured data queries including those on Apache Hadoop, and new features to enable the hybrid cloud. The updates are part of an overhaul that updates Microsoft's flagship database management platform for a new age.
Google Ending Automatic Chrome Support For Flash
Google's Chrome browser will begin to display HTML5 video and animation, when they're available, on all but 10 websites starting in the fourth quarter of this year. It's another serious blow to the Adobe Flash platform.
FBI Chief: Battle Over Encrypted Devices Rages On
Despite dropping its fight with Apple over creating a backdoor to access the iPhone used by one of the San Bernardino shooters, the FBI still plans to pursue access to other encrypted devices and data, said the agency's director.
IBM Watson To Fight Cybercrime
After Watson beat human players on the TV game show Jeopardy!, its cognitive might was put to work in a variety of fields, including healthcare and finance. Now IBM Security is dispatching the supercomputer to fight cybercrime.
Twitter Blocks US Spy Agencies' Access To Dataminr
Silicon Valley's fight to protect users' privacy against inquiries by intelligence agencies could escalate with Twitter denying access to a data mining service that reveals political unrest and terrorist attacks in real-time.
Data Products: 9 Best Practices To Minimize Risk
Data generation, collection, and analysis are making their way into more types of products and services. The trend is creating new opportunities for innovation, some of which are so impactful, they're causing some companies to revisit their business models. The path to success isn't always obvious, however, so here are a few best practices to keep in mind.
7 Ways Cloud Computing Propels IT Security
A spate of high-profile public and private cloud security breaches is helping to push advancements in security such as encryption. Here's a look at 7 ways the cloud may be the largest driver of IT security today.
Technicolor's Cloud Transition Enables Hollywood-As-A-Service
Technicolor provides services to content creators and distributors in Hollywood, but the company faced challenges scaling to storage requirements that were projected to grow 100 times over. Here's how the company's new CIO transitioned the organization to embrace elastic cloud-focused services.
Verizon Outages Hit Thousands Amid Strike
Thousands of businesses and consumers have lost wireline services over the past several weeks, as Verizon Communications contends with a spike in cases of vandalism and striking workers.
Capital One: Think Like A Designer, Work Like A Startup
The creation of Capital One Wallet is an example of how a large financial services IT organization can move like a startup and think like a design firm, transforming business expectations in the process. Their work earned them the No. 1 spot in the 2016 InformationWeek Elite 100.
Horizon Prioritizes Data And Patient Experience
Horizon Blue Cross Blue Shield of New Jersey implemented a fee-for-value healthcare delivery model that uses new technologies to gather data and improve member experience. More than 80 business processes were created or modified, transforming systems for enrollment, claims processing, billing, customer service, provider portals, sales, and benefit monitoring. These efforts earned the company the No. 3 spot in the 2016 InformationWeek Elite 100.
The Elite 100: Celebrating The People Who Make IT Happen
To talk about technology transforming business only tells part of the story, though. At the end of the day, it's the people behind the technology who are the true agents of change. Join us as we celebrate their work in the 2016 InformationWeek Elite 100.