InformationWeek News Connects The Business Technology Community
IoT
IoT
10 Things You Didn't Know About Soft Skills for IT
Government IT's Risks and Rich Rewards
Manage What You Can't See: No Magic Required
15 Best Places to Work in Technology
DevOps Today: What Does It Mean to You?
News & Commentary
Town of Cary Embraces the IoT to Serve Citizens
Lisa Morgan, Freelance Writer
Satire
Alexa, Waze, apps. Citizens are getting more tech savvy and city governments are struggling to keep up. North Carolina's Town of Cary has an award-winning strategy, though. We reveal what that is.
By Lisa Morgan Freelance Writer, 4/6/2018
Comment0 comments  |  Read  |  Post a Comment
Why IT Costs Keep Rising (and How to Resist the Climb)
Guest Commentary, Guest Commentary
Commentary
It will take a multi-pronged approach for IT organizations to stop the escalation of IT costs.
By Larry Alton, business consultant , 4/6/2018
Comment0 comments  |  Read  |  Post a Comment
Unpatched Vulnerabilities the Source of Most Data Breaches
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
New studies show how patching continues to dog most organizations - with real consequences.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/5/2018
Comment0 comments  |  Read  |  Post a Comment
It’s About Augmented Intelligence, not Artificial Intelligence
Guest Commentary, Guest Commentary
Commentary
The adoption of AI applications isn't about replacing workers but helping workers do their jobs better.
By Roger Gorman, Founder and CEO of ProFinda , 4/5/2018
Comment0 comments  |  Read  |  Post a Comment
How Nissan Drove Users to Self-Service Data Analytics
Jessica Davis,  Senior Editor, Enterprise Apps
News
Nissan NA was about to launch a new data visualization platform across the enterprise and wanted to encourage self-service analytics. Here's how it got users to get in and drive.
By Jessica Davis Senior Editor, Enterprise Apps, 4/5/2018
Comment0 comments  |  Read  |  Post a Comment
Four Gas Pipeline Firms Hit in Attack on Their EDI Service Provider
Jai Vijayan, Freelance writer
News
Attack a warning on vulnerabilities in energy networks, security analysts say.
By Jai Vijayan Freelance writer, 4/5/2018
Comment0 comments  |  Read  |  Post a Comment
Emerging Technologies Remain a Gamble in 2018
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
Commentary
IT leaders face a tornado of vendor news and business user demands relating to emerging technologies such as blockchain, AI, and augmented reality. Those leaders need to put those technologies and the business need in perspective.
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 4/5/2018
Comment0 comments  |  Read  |  Post a Comment
How Gamers Could Save the Cybersecurity Skills Gap
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
McAfee shares its firsthand experience on training in-house cybersecurity pros and publishes new data on how other organizations deal with filling security jobs.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 4/4/2018
Comment1 Comment  |  Read  |  Post a Comment
In Cyber-Defense, Good Enough is Far Better Than Perfect
Guest Commentary, Guest Commentary
Commentary
Agile and DevOps concepts help businesses get the basics of applications to market quickly, and those same concepts can help prepare the military for its challenges.
By Col. Jeffrey Collins, Air Force CyberWorx , 4/4/2018
Comment0 comments  |  Read  |  Post a Comment
Leadership: How to Succeed as a New Manager
Jessica Davis,  Senior Editor, Enterprise Apps
Satire
You've spent your career learning about IT -- network troubleshooting, programming languages, and data management. But now they want you to manage a team of people. Here are a few tips to get you started on your new journey.
By Jessica Davis Senior Editor, Enterprise Apps, 4/4/2018
Comment0 comments  |  Read  |  Post a Comment
One-Third of Internal User Accounts Are 'Ghost Users'
Sara Peters, Senior Editor at Dark Reading
News
Attackers and malware can easily move laterally through an organization, thanks to inadequate access controls on file systems and a proliferation of inactive but enabled users.
By Sara Peters Senior Editor at Dark Reading, 4/4/2018
Comment3 comments  |  Read  |  Post a Comment
Ethical Tech: Myth or Reality?
Lisa Morgan, Freelance Writer
Commentary
Technology innovation is accelerating and so are the impacts of technology on society. As machine intelligence gets baked into more products and services, as more human tasks become automated, and as more industries are disrupted, the tech industry needs to think differently. Here's why.
By Lisa Morgan Freelance Writer, 4/4/2018
Comment0 comments  |  Read  |  Post a Comment
Tech Trends: Top 8 Priorities for IT
Cynthia Harvey, Contributor, NetworkComputing
News
Survey data from The Hackett Group show how IT leaders are supporting the business side of their organizations.
By Cynthia Harvey Contributor, NetworkComputing, 4/3/2018
Comment0 comments  |  Read  |  Post a Comment
Your First AI Project: Avoid Customer-facing Chatbots
Jessica Davis,  Senior Editor, Enterprise Apps
News
Your competitor has a shiny new AI-driven chatbot, so shouldn't you be developing one, too? Not necessarily. Here's why these customer-facing bots may not be the best first project for your AI program, and what you should choose instead.
By Jessica Davis Senior Editor, Enterprise Apps, 4/3/2018
Comment0 comments  |  Read  |  Post a Comment
Five Traits to Look for in a Data Protection Officer
Guest Commentary, Guest Commentary
Commentary
It's crucial for a data protection officer -- required under the EU's GDPR -- to have a enterprisewide view of an organization's stored data and how it is used, or not used.
By Kon Leong, president, CEO and co-founder, ZL Technologies , 4/3/2018
Comment0 comments  |  Read  |  Post a Comment
A Cyber Breach Contingency Plan is Not Just the CIO's Responsibility
Emily Johnson, Digital Content Editor, InformationWeek
Satire
Ask any CIO and they'll likely tell you one of their greatest fears is a data breach, and rightfully so. Having a plan in place for when the worst does happen and knowing there's a team of people to back you up should relieve some of the anxiety.
By Emily Johnson Digital Content Editor, InformationWeek, 4/2/2018
Comment0 comments  |  Read  |  Post a Comment
Define DevOps' Role in Application Security
John Edwards, Technology Journalist & Author
Satire
DevOps teams are challenged by hackers whose tools and practices have grown increasingly sophisticated. Here's how the good guys can gain the upper hand.
By John Edwards Technology Journalist & Author, 4/2/2018
Comment0 comments  |  Read  |  Post a Comment
Big Data Maturity: You're Not As Mature As You Think
Jessica Davis,  Senior Editor, Enterprise Apps
News
Big data is past the hype stage, but are organizations really past the challenges and getting the most value out of big data technologies? Not so much. Here's a look at the state of big data maturity and the challenges that remain.
By Jessica Davis Senior Editor, Enterprise Apps, 4/2/2018
Comment0 comments  |  Read  |  Post a Comment
10 Women in Security You May Not Know But Should
Kelly Sheridan, Staff Editor, Dark Reading
News
The first in a series of articles shining a spotlight on women who are quietly changing the game in cybersecurity.
By Kelly Sheridan Staff Editor, Dark Reading, 3/30/2018
Comment2 comments  |  Read  |  Post a Comment
Neuroevolution Will Push AI Development to the Next Level
James Kobielus, Lead Analyst, SiliconANGLE Wikibon
Commentary
Next up for developing artificial intelligence systems is automated neural-net architecture search.
By James Kobielus Lead Analyst, SiliconANGLE Wikibon, 3/30/2018
Comment0 comments  |  Read  |  Post a Comment
More Stories
Commentary
IT Leadership: Winning at What Cost?
Guest Commentary, Guest Commentary,  3/27/2018
News
3 Myths About the Site Reliability Engineer, Debunked
Emily Johnson, Digital Content Editor, InformationWeek,  3/20/2018
Commentary
My Algorithm is Better than Yours
Jen Underwood, Impact Analytix,  3/28/2018
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
The Dynamics Of The Digital Workplace
As companies begin to fully embrace the digital workplace, they should focus on the employee experience the same way they would on the customer experience. Read >>
Partner Perspectives
What's This??
Partner Perspectives
What's This?
White Papers
Current Issue
Cybersecurity Strategies for the Digital Era
At its core, digital business relies on strong security practices. In addition, leveraging security intelligence and integrating security with operations and developer teams can help organizations push the boundaries of innovation.
2018 State of the Cloud
2018 State of the Cloud
Cloud adoption is growing, but how are organizations taking advantage of it? Interop ITX and InformationWeek surveyed technology decision-makers to find out, read this report to discover what they had to say!
Video
Sponsored Video
Slideshows
Twitter Feed
Flash Poll