Fujitsu ScanSnap ix100: Portable Scanning In A Backpack
Microsoft Releases SQL Server 2016 Preview, Azure Update
DoJ Argues Against Google's Java Appeal
Microsoft Office Coming To 20 More Android Tablets
7 Bold Tech Ideas That Will Make You Uncomfortable
News & Commentary
SAP HANA: Not The Only In-Memory Game In Town
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
SAP HANA is not the only option for those looking for an in-memory database platform. Big rivals such as Microsoft and Oracle offers similar tech.
By Curtis Franklin Jr. Executive Editor, Technical Content, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
Data Theft The Goal Of BlackEnergy Attacks On Industrial Control Systems, Researchers Say
Jai Vijayan, Freelance writer
News
CyberX analysis of BlackEnergy module reveals most likely motive behind sophisticated multi-year attack campaign.
By Jai Vijayan Freelance writer, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
Build WiFi To Weather The IoT Onslaught
Dirk Gates, Executive Chairman & Founder, Xirrus
Commentary
The Internet of Things is coming. The four strategies here can help enterprises future-proof their wireless networks to support the looming demands.
By Dirk Gates Executive Chairman & Founder, Xirrus, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
Campus Switch Upgrades: How To Make The Case
Dan Conde, Analyst, Enterprise Strategy Group
Commentary
Deciding when to upgrade your campus switch involves ROI considerations, figuring out wireless user requirements, and understanding process implications.
By Dan Conde Analyst, Enterprise Strategy Group, 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
New IT Skills: Why Communication, Accountability, Initiative Are Hot Now
Kevin Casey,
News
Using Bureau of Labor Statistics data and information supplied by CompTIA and Burning Glass Technologies Labor Insights, we've identified eight crucial, non-technical skills that companies are looking for in their IT hires.
By Kevin Casey , 5/28/2015
Comment0 comments  |  Read  |  Post a Comment
Oracle PeopleSoft In The Crosshairs
Ericka Chickowski, Contributing Writer, Dark Reading
News
Presenter at Hack In The Box says PeopleSoft is in worse security shape than SAP was five years ago.
By Ericka Chickowski Contributing Writer, Dark Reading, 5/27/2015
Comment1 Comment  |  Read  |  Post a Comment
DoJ Argues Against Google's Java Appeal
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The Solicitor General advises the Supreme Court to reject Google's petition to have its copyright infringement loss to Oracle reviewed.
By Thomas Claburn Editor at Large, Enterprise Mobility, 5/27/2015
Comment1 Comment  |  Read  |  Post a Comment
Big Data: 6 Real-Life Business Cases
Lisa Morgan, Freelance Writer
News
Better data analysis enables companies to optimize everything in the value chain -- from sales to order delivery, to optimal store hours. Here are six examples of how major enterprises are using data to improve their business models.
By Lisa Morgan Freelance Writer, 5/27/2015
Comment0 comments  |  Read  |  Post a Comment
Microsoft Releases SQL Server 2016 Preview, Azure Update
Kelly Sheridan, Associate Editor, InformationWeek
News
Microsoft Azure and big data updates include public previews of SQL Server 2016 and Live Encoding for Azure Media Services.
By Kelly Sheridan Associate Editor, InformationWeek, 5/27/2015
Comment0 comments  |  Read  |  Post a Comment
Moose Malware Uses Linux Routers For Social Network Fraud
Sara Peters, Senior Editor at Dark Reading
News
Linux/Moose is sophisticated enough to do DNS hijacks, DDoSes, and deep network penetration...so why is it wasting its time on Instagram?
By Sara Peters Senior Editor at Dark Reading, 5/27/2015
Comment1 Comment  |  Read  |  Post a Comment
Microsoft Office Coming To 20 More Android Tablets
Eric Zeman,
Commentary
Microsoft has convinced 20 more Android tablet OEMs to install its Office productivity software on their devices. It's a smart move by Redmond.
By Eric Zeman , 5/27/2015
Comment1 Comment  |  Read  |  Post a Comment
Escalating Cyberattacks Threaten US Healthcare Systems
Rick Kam and Larry Ponemon, Rick Kam, President & Co-founder, ID Experts & Larry Ponemon, Chairman & Founder, Ponemon Institute
Commentary
Electronic health records are prime targets because healthcare organizations lack the resources, processes, and technologies to protect them. And it’s only going to get worse.
By Rick Kam and Larry Ponemon Rick Kam, President & Co-founder, ID Experts & Larry Ponemon, Chairman & Founder, Ponemon Institute, 5/27/2015
Comment0 comments  |  Read  |  Post a Comment
Google Planning New Nexus Smartphones In 2015, Report Claims
Nathan Eddy, Freelance Writer
News
Although Google's Android platform is the dominant operating system on smartphones worldwide, it has struggled with its Nexus-branded hardware. A new report claims Google will try again this year.
By Nathan Eddy Freelance Writer, 5/27/2015
Comment0 comments  |  Read  |  Post a Comment
Internet Traffic Will Hit 2 Zettabytes By 2019, Cisco Says
Marcia Savage, Managing Editor, Network Computing
News
The Cisco Visual Networking Index forecasts surge in IP traffic driven by number of factors, including growth of the Internet of Things.
By Marcia Savage Managing Editor, Network Computing, 5/27/2015
Comment5 comments  |  Read  |  Post a Comment
Iris Scans: Security Breakthrough Or Privacy Invasion?
David Wagner, Executive Editor, Community & IT Life
News
New technology allows irises to be scanned from 40 feet away. Is this a wonder weapon against crime and terrorism or a way for governments to invade our privacy and track our movements?
By David Wagner Executive Editor, Community & IT Life, 5/27/2015
Comment2 comments  |  Read  |  Post a Comment
Tech Jobs: 12 Killer Locations
Susan Fogarty, Editor in Chief
News
The number of technology jobs is increasing across the country, but you might need to look in some unexpected cities and states to find them.
By Susan Fogarty Editor in Chief, 5/27/2015
Comment10 comments  |  Read  |  Post a Comment
What Data Breaches Now Cost And Why
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
New Ponemon report says the cost of a data breach has increased by 23% and healthcare and education breaches are the most pricey.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 5/27/2015
Comment1 Comment  |  Read  |  Post a Comment
Google I/O: 10 Things We Expect To See
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Expect a demonstration of the next version of Android, along with a standalone photo-sharing service and a new iteration of Chromecast.
By Thomas Claburn Editor at Large, Enterprise Mobility, 5/27/2015
Comment2 comments  |  Read  |  Post a Comment
Overcoming Cloud Security Challenges
Brendan Ziolo, Head of Large Enterprise Strategy, Alcatel-Lucent
Commentary
To truly take advantage of cloud computing, enterprises must balance the capabilities of public and private, while focusing on security.
By Brendan Ziolo Head of Large Enterprise Strategy, Alcatel-Lucent, 5/27/2015
Comment1 Comment  |  Read  |  Post a Comment
John Nash, 'Beautiful Mind' Inspiration, Influenced IT, Too
David Wagner, Executive Editor, Community & IT Life
News
If you have ever played a game against a computer, you played against an algorithm that used at least some math laid down -- or inspired -- by John Nash. Many of those same algorithms are being extended to cognitive computing outside of game situations.
By David Wagner Executive Editor, Community & IT Life, 5/26/2015
Comment2 comments  |  Read  |  Post a Comment
More Stories
PR Newswire
8 Reasons IT Pros Hate The Cloud
Andrew Froehlich, President & Lead Network Architect, West Gate Networks,  5/25/2015
Google: Your Password Security Questions Are Terrible
Nathan Eddy, Freelance Writer,  5/22/2015
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 Digital Issue, April 2015
The 27th annual ranking of the leading US users of business technology
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
. We've got a management crisis right now, and we've also got an engagement crisis. Could the two be linked? Tune in for the next installment of IT Life Radio, Wednesday May 20th at 3PM ET to find out.