11 Office 2013 Shortcuts That Will Change Your Life
FTC: Google Received No Favors During Investigation
Samsung Galaxy S6, HTC One M9 Go On Sale April 10
Amazon Delivers Unlimited Cloud Storage
Zuckerberg At F8: Facebook Is A Family Of Apps
News & Commentary
SDN Interest Shifts Toward The WAN
Dr. Jim Metzler, Founder & Vice President, Ashton, Metzler & Associates
Commentary
Software-defined networking improves network utilization and efficiency, and as the technology matures, enterprises are looking to apply those benefits to their WAN and campus networks.
By Dr. Jim Metzler Founder & Vice President, Ashton, Metzler & Associates, 3/27/2015
Comment0 comments  |  Read  |  Post a Comment
Facebook's Teleportation Station: 10 Things We Wanted Instead
David Wagner, Executive Editor, Community & IT Life
News
Facebook accidentally leaked something called Teleportation Station and the rumor mill went wild. However, the rumors weren't that good, so we came up with something better.
By David Wagner Executive Editor, Community & IT Life, 3/27/2015
Comment1 Comment  |  Read  |  Post a Comment
Backup Appliances: 5 Considerations
Robbie Wright, Virtualization & Cloud Computing Strategist, CommVault
Commentary
Appliances in your backup infrastructure can help save you time and money. Weigh these issues to ensure you choose the right one for your business.
By Robbie Wright Virtualization & Cloud Computing Strategist, CommVault, 3/27/2015
Comment0 comments  |  Read  |  Post a Comment
Facebook F8: Oculus Will Make Virtual Reality Mainstream
Thomas Claburn, Editor at Large, Enterprise Mobility
News
After decades of false starts, Facebook believes virtual reality will drive the next wave of technology. Here's how the company's Oculus acquisition fits in.
By Thomas Claburn Editor at Large, Enterprise Mobility, 3/26/2015
Comment1 Comment  |  Read  |  Post a Comment
Internet Explorer's Demise: 7 Things IT Pros Should Know
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
News
We still don't have all the answers in regards to exactly what Microsoft is planning for Internet Explorer and Project Spartan. But we know enough to get you started on building a game plan for how you'll continue to support legacy web apps moving forward.
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 3/26/2015
Comment0 comments  |  Read  |  Post a Comment
Amazon Delivers Unlimited Cloud Storage
Kelly Sheridan, Associate Editor, InformationWeek
News
Amazon gives customers the option to choose from two unlimited storage plans on Cloud Drive.
By Kelly Sheridan Associate Editor, InformationWeek, 3/26/2015
Comment1 Comment  |  Read  |  Post a Comment
Samsung Galaxy S6, HTC One M9 Go On Sale April 10
Eric Zeman,
Commentary
If there's one day to go smartphone shopping, it's April 10. The Samsung Galaxy S6 and the S6 Edge and the HTC One M9 will hit store shelves on the same day.
By Eric Zeman , 3/26/2015
Comment1 Comment  |  Read  |  Post a Comment
Cyber Hunting: 5 Tips To Bag Your Prey
David J. Bianco, Security Architect, Sqrrl
Commentary
Knowing the lay of the land and where attackers hide is a key element in hunting, both in nature and in the cyber realm.
By David J. Bianco Security Architect, Sqrrl, 3/26/2015
Comment5 comments  |  Read  |  Post a Comment
FTC: Google Received No Favors During Investigation
Nathan Eddy, Graduate of Northwestern University's Medill School of Journalism
News
The FTC is pushing back against reports that it gave Google favorable treatment due to the search engine giant's lobbying prowess. Google is also facing more scrutiny in Europe.
By Nathan Eddy Graduate of Northwestern University's Medill School of Journalism, 3/26/2015
Comment2 comments  |  Read  |  Post a Comment
SSL/TLS Suffers 'Bar Mitzvah Attack'
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
Researcher at Black Hat Asia shows how attackers could abuse a known-weak crypto algorithm to steal credentials and other data from encrypted communications.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 3/26/2015
Comment0 comments  |  Read  |  Post a Comment
Hybrid Cloud Storage Challenges
Jim O'Reilly, Consultant
Commentary
Moving to a hybrid model helps address security and compliance concerns, but comes with problems such as data synchronization and WAN latency.
By Jim O'Reilly Consultant, 3/26/2015
Comment7 comments  |  Read  |  Post a Comment
3 Priorities For Enterprise Applications In 2015
Sameer Bhatia, Founder & CEO, ProProfs
Commentary
Competition and cloud delivery haven't done enough to improve enterprise apps. Buyers must pressure vendors for better features, improved usability, and meaningful analytics.
By Sameer Bhatia Founder & CEO, ProProfs, 3/26/2015
Comment1 Comment  |  Read  |  Post a Comment
Zuckerberg At F8: Facebook Is A Family Of Apps
Thomas Claburn, Editor at Large, Enterprise Mobility
News
At the F8 developer conference on Wednesday, Facebook CEO Mark Zuckerberg talked about how the social media giant is striving to become more than a singular online destination.
By Thomas Claburn Editor at Large, Enterprise Mobility, 3/26/2015
Comment4 comments  |  Read  |  Post a Comment
Big Data Deployment Models: Open Vs. Proprietary
Nik Rouda, Senior Analyst, Enterprise Strategy Group
Commentary
Open source data platforms like Hadoop, Cassandra, and MongoDB are core to the big data market, but vendors supporting the platforms are winning over enterprises with proprietary tools.
By Nik Rouda Senior Analyst, Enterprise Strategy Group, 3/26/2015
Comment4 comments  |  Read  |  Post a Comment
Researchers Use Heat To Breach Air-Gapped Systems
Jai Vijayan, Freelance writer
News
BitWhisper project is part of ongoing air gap security research at Israel's Ben-Gurion University.
By Jai Vijayan Freelance writer, 3/25/2015
Comment1 Comment  |  Read  |  Post a Comment
IT Pros Make Job-Hopping A Way Of Life
David Wagner, Executive Editor, Community & IT Life
Commentary
IT pros are always looking for the next job (actively or passively). Why can't anyone sit still?
By David Wagner Executive Editor, Community & IT Life, 3/25/2015
Comment7 comments  |  Read  |  Post a Comment
FBI Threat Intelligence Cyber-Analysts Still Marginalized In Agency
Sara Peters, Senior Editor at Dark Reading
News
Despite good progress, 9/11 Review Commission says that analysts could have a greater impact on FBI counter-terrorism activities if they had more domain awareness, forensics capabilities, and were more empowered to question agents.
By Sara Peters Senior Editor at Dark Reading, 3/25/2015
Comment1 Comment  |  Read  |  Post a Comment
Apple Buys FoundationDB To Improve Apps, Software
Eric Zeman,
Commentary
By acquiring FoundationDB, a database startup, Apple could incorporate the technology in order to improve the performance of key apps and software services.
By Eric Zeman , 3/25/2015
Comment1 Comment  |  Read  |  Post a Comment
Microsoft's Project Spartan Gets 'Edge' Over Internet Explorer
Kelly Sheridan, Associate Editor, InformationWeek
News
Internet Explorer 11 will not host Microsoft's new "Edge" browser engine, but Project Spartan will.
By Kelly Sheridan Associate Editor, InformationWeek, 3/25/2015
Comment1 Comment  |  Read  |  Post a Comment
The Internet Of Bring-Your-Own Things
David Lindner, Global Practice Manager, Mobile Application Security Services, Aspect Security
Commentary
Devices and interconnected systems are finding a foothold not only in our homes but in mainstream organizations. Here are three tips to mitigate the risk.
By David Lindner Global Practice Manager, Mobile Application Security Services, Aspect Security, 3/25/2015
Comment0 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Layoffs Breed Long-Term Employee Distrust, Study Finds
David Wagner, Executive Editor, Community & IT Life,  3/20/2015
Windows 10 Vs. Windows 8: 10 Differences
InformationWeek Staff 3/20/2015
This NFL Player Is Better At Math Than You Are
David Wagner, Executive Editor, Community & IT Life,  3/24/2015
Register for InformationWeek Newsletters
Partner Perspectives
What's This?
White Papers
Current Issue
InformationWeek Tech Digest, Dec. 9, 2014
Apps will make or break the tablet as a work device, but don't shortchange critical factors related to hardware, security, peripherals, and integration.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio