Google I/O 2015: 9 Things We Loved
Dartmouth Predicts GPA Based on Phone Tracking App
Android M: 5 Best Features
10 Tech Stars: Will They Deliver in 2015?
New IT Skills: Why Communication, Accountability, Initiative Are Hot Now
News & Commentary
Google I/O 2015: 9 Things We Loved
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Google Photos, for all its mass appeal, is less interesting than Google's more ambitious work. Get ready for touch-aware clothes and gesture-sensing devices.
By Thomas Claburn Editor at Large, Enterprise Mobility, 5/29/2015
Comment1 Comment  |  Read  |  Post a Comment
Home Routers Being Targeted in DNS Hijacking Attack, Trend Micro Says
Jai Vijayan, Freelance writer
News
Attackers attempting to steal sensitive data by diverting home router traffic to malicious domains, security firm says.
By Jai Vijayan Freelance writer, 5/29/2015
Comment2 comments  |  Read  |  Post a Comment
How I Would Secure The Internet With $4 Billion
Jim Manico, OWASP Global Board Member
Commentary
In an open letter to President Obama, a member of the Open Web Application Security Project tells why pending legislation on threat-intel sharing doesn’t go far enough.
By Jim Manico OWASP Global Board Member, 5/29/2015
Comment4 comments  |  Read  |  Post a Comment
Android M: 5 Best Features
Eric Zeman,
Commentary
Android M may focus more on improving the user experience, but Google still added some impressive new features. Here's what we learned at Google I/O.
By Eric Zeman , 5/29/2015
Comment9 comments  |  Read  |  Post a Comment
Apple Acquires Metaio, Targeting Augmented Reality
Nathan Eddy, Freelance Writer
News
Apple continues its string of acquisitions with the purchase of Metaio, a company specializing in augmented reality software development.
By Nathan Eddy Freelance Writer, 5/29/2015
Comment2 comments  |  Read  |  Post a Comment
Dartmouth Predicts GPA Based on Phone Tracking App
David Wagner, Executive Editor, Community & IT Life
News
Can a phone app predict your performance based on your behavior? This one can, at least if you are a college student.
By David Wagner Executive Editor, Community & IT Life, 5/29/2015
Comment9 comments  |  Read  |  Post a Comment
Using Twitter, Smartphones To Accurately Assess Crowds
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
As part of the Big Data Challenge, researchers from England's University of Warwick have turned to smartphones and Twitter to estimate crowd sizes quickly and accurately.
By Curtis Franklin Jr. Executive Editor, Technical Content, 5/29/2015
Comment4 comments  |  Read  |  Post a Comment
10 Tech Stars: Will They Deliver in 2015?
David Wagner, Executive Editor, Community & IT Life
News
Juniper Research names the top 10 tech leaders and -- as with any good top 10 list -- we quibble with the rankings.
By David Wagner Executive Editor, Community & IT Life, 5/29/2015
Comment7 comments  |  Read  |  Post a Comment
Converged Infrastructure Delivery Via The Cloud
Alex Henthorn-Iwane, QualiSystems Vice President of Marketing
Commentary
Converged infrastructure helps simplify private clouds, but still require time and effort to design and provision. The cloud is helping streamline the converged infrastructure supply chain.
By Alex Henthorn-Iwane QualiSystems Vice President of Marketing, 5/29/2015
Comment4 comments  |  Read  |  Post a Comment
UN Report Warns Encryption Backdoors Violate Human Rights
Sara Peters, Senior Editor at Dark Reading
News
Report says States should be promoting strong encryption and anonymity tools, not restricting them.
By Sara Peters Senior Editor at Dark Reading, 5/28/2015
Comment2 comments  |  Read  |  Post a Comment
Google Details Android M, VR, IoT, And Unlimited Photos
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Google used the opening day of its I/O 2015 developer conference to offer details about the next version of Android, what it has planned for virtual reality and the Internet of Things, and free unlimited photos.
By Thomas Claburn Editor at Large, Enterprise Mobility, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
IRS Attack Demonstrates How Breaches Beget More Breaches
Ericka Chickowski, Contributing Writer, Dark Reading
News
Weak authentication validation assumed only taxpayers would know their Social Security Numbers and other information that criminals have been stealing for years.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/28/2015
Comment6 comments  |  Read  |  Post a Comment
Google I/O: Gmail Hits 900M Users, Android Reaches A Billion
Kelly Sheridan, Associate Editor, InformationWeek
News
Key statistics from this year's Google I/O included one billion Android users and 900 million Gmail users, 75% of whom are on mobile.
By Kelly Sheridan Associate Editor, InformationWeek, 5/28/2015
Comment12 comments  |  Read  |  Post a Comment
Small-to Mid-sized Organizations Targeted By 'Grabit' Cyberspies
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Rare SMB-focused cyber espionage campaign hitting small firms worldwide.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/28/2015
Comment2 comments  |  Read  |  Post a Comment
'Tox' Offers Ransomware As A Service
Jai Vijayan, Freelance writer
News
The ransomware is free to use but site retains 20 percent of any ransom that is collected, McAfee researcher says.
By Jai Vijayan Freelance writer, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
GE's Kate Johnson: How CIOs Can Be Heroes
Chris Murphy, Editor, InformationWeek
Commentary
GE's new software group CEO aims its industrial Internet message at CIOs, as she helps GE up its software selling game.
By Chris Murphy Editor, InformationWeek, 5/28/2015
Comment5 comments  |  Read  |  Post a Comment
Ads Built By Algorithm
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Persado contends its machine learning system can produce better direct response ads than human ad copywriter.
By Thomas Claburn Editor at Large, Enterprise Mobility, 5/28/2015
Comment3 comments  |  Read  |  Post a Comment
iOS 9 Rumor: Proactive Project Will Rival Google Now
Eric Zeman,
Commentary
Apple iOS 9 is shaping up to be more than just a performance upgrade. New details emerge pointing to a stronger competitor, called Proactive, which will challenge Google Now and Microsoft's Cortana.
By Eric Zeman , 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
FUD Watch: The Marketing Of Security Vulnerabilities
Bill Brenner, Information Security Blogger
Commentary
I’m all for raising awareness, but making designer vulnerabilities, catchy logos and content part of the disclosure process is a step in the wrong direction.
By Bill Brenner Information Security Blogger, 5/28/2015
Comment1 Comment  |  Read  |  Post a Comment
Meeker: Internet Has Only Begun Changing Our Lives
Charles Babcock, Editor at Large, Cloud
News
Kleiner Perkins partner Mary Meeker presents her annual take on how the Internet is changing business, as US and China dominate among Web companies.
By Charles Babcock Editor at Large, Cloud, 5/28/2015
Comment7 comments  |  Read  |  Post a Comment
More Stories
PR Newswire
8 Reasons IT Pros Hate The Cloud
Andrew Froehlich, President & Lead Network Architect, West Gate Networks,  5/25/2015
KFC's Bluetooth Placemats: 10 Better Ideas
David Wagner, Executive Editor, Community & IT Life,  5/24/2015
Google I/O: Gmail Hits 900M Users, Android Reaches A Billion
Kelly Sheridan, Associate Editor, InformationWeek,  5/28/2015
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 Digital Issue, April 2015
The 27th annual ranking of the leading US users of business technology
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join the editors for a roundup of the top stories on InformationWeek.com for the week of May 24, 2015.