InformationWeek, serving the information needs of the Business Technology Community

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
How Enterprises Can Adopt Video Game Cloud Strategy
Why Data Science Isn't an Exact Science
How COVID is Changing Technology Futures
What the IBM-Adobe Collaboration Means for Transformation
Equinix Prioritizes AI Investments Amid Pandemic
News & Commentary
Business Continuity Planning: The Pandemic Wake-Up Call
Guest Commentary, Guest Commentary
Commentary
Ensuring continuity of operations in the face of unforeseen disruptions must be a top priority going forward. Is your organization in good shape?
By Seth Siegel, AI & Automation Leader, Infosys Consulting , 8/3/2020
Comment0 comments  |  Read  |  Post a Comment
The ABCs of Data Science Algorithms
Guest Commentary, Guest Commentary
Commentary
Data science algorithms are never a one-size-fits-all solution. Do you know what makes sense for your business?
By Michael Zeller, Head of AI Strategy & Solutions, Temasek , 7/31/2020
Comment0 comments  |  Read  |  Post a Comment
Ill-Defined Career Paths Hamper Growth for IT Security Pros
Jai Vijayan, Contributing Writer
News
Appsec and cloud security skills are the most in demand, and a shortage of staff is wearing on security teams, a new study shows.
By Jai Vijayan Contributing Writer, 7/30/2020
Comment0 comments  |  Read  |  Post a Comment
Morningstar on Reshaping Its Infrastructure for Flexibility
Joao-Pierre S. Ruth, Senior Writer
Commentary
CTO for the global investment research firm discusses strategy to bring dev teams to public cloud and how New Relic fit into those plans.
By Joao-Pierre S. Ruth Senior Writer, 7/30/2020
Comment0 comments  |  Read  |  Post a Comment
Optimize Existing Technologies for Maximum Value
John Edwards, Technology Journalist & Author
Commentary
Looking to get a bigger bang from your budget? Think about optimizing some of your existing IT resources.
By John Edwards Technology Journalist & Author, 7/30/2020
Comment0 comments  |  Read  |  Post a Comment
Average Cost of a Data Breach: $3.86 Million
Jai Vijayan, Contributing Writer
News
New IBM study shows that security system complexity and cloud migration can amplify breach costs.
By Jai Vijayan Contributing Writer, 7/29/2020
Comment1 Comment  |  Read  |  Post a Comment
'BootHole' Vulnerability Exposes Secure Boot Devices to Attack
Kelly Sheridan, Staff Editor, Dark Reading
News
A flaw in the GRUB2 bootloader affects most Linux devices and some Windows computers using UEFI Secure Boot.
By Kelly Sheridan Staff Editor, Dark Reading, 7/29/2020
Comment2 comments  |  Read  |  Post a Comment
Cloud Eases Pivot to Remote Work for Capital One
Jessica Davis,  Senior Editor, Enterprise Apps
News
Capital One has committed to enabling employees to keep working from home through the end of 2020.
By Jessica Davis Senior Editor, Enterprise Apps, 7/29/2020
Comment0 comments  |  Read  |  Post a Comment
How Machine Learning is Influencing Diversity & Inclusion
Pierre DeBois, Founder, Zimana
Commentary
Here's how IT leaders can better manage the bias that becomes embedded in algorithms and datasets to help increase opportunities for minority tech professionals.
By Pierre DeBois Founder, Zimana, 7/29/2020
Comment0 comments  |  Read  |  Post a Comment
Is Your Cloud Strategy Ready to Hyperscale?
Guest Commentary, Guest Commentary
Commentary
In the face of the unexpected demands 2020 has seen so far, business and IT leaders need to stay in a constant state of planning with their cloud operations.
By Aaron Kamphuis, Data Analytics and IoT Practice Manager, OST , 7/29/2020
Comment0 comments  |  Read  |  Post a Comment
Researchers Foil Phishing Attempt on Netflix Customers
Steve Zurier, Contributing Writer
News
Hackers use two stolen domains to steal credentials from Netflix users and then send them to the real Netflix site.
By Steve Zurier Contributing Writer, 7/28/2020
Comment0 comments  |  Read  |  Post a Comment
How Enterprises Can Adopt Video Game Cloud Strategy
Joao-Pierre S. Ruth, Senior Writer
Commentary
Forrester report explores ways other sectors can learn from infrastructure deployed to support video gaming.
By Joao-Pierre S. Ruth Senior Writer, 7/28/2020
Comment0 comments  |  Read  |  Post a Comment
Why Data Science Isn't an Exact Science
Lisa Morgan, Freelance Writer
Commentary
Organizations adopt data science with the goal of getting answers to more types of questions, but those answers are not absolute.
By Lisa Morgan Freelance Writer, 7/27/2020
Comment0 comments  |  Read  |  Post a Comment
Block/Allow: The Changing Face of Hacker Linguistics
Seth Rosenblatt, Contributing Writer
News
Terms such as "whitelist," "blacklist," "master," and "slave" are being scrutinized again and by a wider range of tech companies than ever before.
By Seth Rosenblatt Contributing Writer, 7/27/2020
Comment7 comments  |  Read  |  Post a Comment
Data in the Age of COVID
Guest Commentary, Guest Commentary
Commentary
This crisis is teaching us a ton about the dissemination and use of data. But we must remember to use it in a way that maintains the quality of data and protects privacy rights.
By Tim Molino, Technology Consultant, Peck Madigan Jones , 7/27/2020
Comment0 comments  |  Read  |  Post a Comment
4 Ways to Excel as a Female Data Scientist
Guest Commentary, Guest Commentary
Commentary
Glassdoor has ranked data science as one of the top 10 best jobs in the US every year since 2015. Here’s how you can stand out in this field.
By Alicia Frame, Lead Product Manager and Data Scientist, Neo4j , 7/24/2020
Comment0 comments  |  Read  |  Post a Comment
What the IBM-Adobe Collaboration Means for Transformation
Joao-Pierre S. Ruth, Senior Writer
News
Adobe Experience Manager running on Red Hat OpenShift and other IBM resources intended to help regulated enterprises meet security demands.
By Joao-Pierre S. Ruth Senior Writer, 7/23/2020
Comment0 comments  |  Read  |  Post a Comment
How COVID is Changing Technology Futures
Jessica Davis,  Senior Editor, Enterprise Apps
News
Accenture released its Technology Vision 2020 report in February, but then COVID hit. Here's how the pandemic is changing technology futures according to the company.
By Jessica Davis Senior Editor, Enterprise Apps, 7/23/2020
Comment0 comments  |  Read  |  Post a Comment
VC Investment in Cybersecurity Dips & Shifts with COVID-19
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
While the pandemic has infected funding for cybersecurity startups, it also has emboldened some startups with innovative tools that secure the wave of at-home work.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/22/2020
Comment0 comments  |  Read  |  Post a Comment
Q&A: How Systemic Racism Weakens Cybersecurity
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Cybersecurity policy expert and attorney Camille Stewart explains how to dismantle systemic racism in the industry – and build a more diverse and representative workforce.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 7/22/2020
Comment6 comments  |  Read  |  Post a Comment
More Stories
Commentary
Gartner Forecast Sees 7.3% Shrinkage in IT Spending for 2020
Joao-Pierre S. Ruth, Senior Writer,  7/15/2020
Slideshows
10 Ways AI Is Transforming Enterprise Software
Cynthia Harvey, Freelance Journalist, InformationWeek,  7/13/2020
Commentary
IT Career Paths You May Not Have Considered
Lisa Morgan, Freelance Writer,  6/30/2020
Register for InformationWeek Newsletters
White Papers
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Video
Sponsored Video
Slideshows
Twitter Feed
Flash Poll