Why do you need a sweater in the office in the summer? Because we're cooling it based on a formula that dates back to when the Beatles were still together.By David Wagner Executive Editor, Community & IT Life, 8/4/20153 comments | Read | Post a Comment
A panel of influential women in the security industry will share their insights and identify resources for fostering professional development (and recruiting) of women in the field. By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/4/20150 comments | Read | Post a Comment
Microsoft has learned a lesson from Google Glass. The company's HoloLens is designed for developers who want to create enterprise, not consumer, applications. By Larry Loeb Blogger, Informationweek, 8/4/20150 comments | Read | Post a Comment
The purchase of Incent Games and its sales gamification platform FantasySalesTeam will help Microsoft drive CRM adoption and team competition. By Kelly Sheridan Associate Editor, InformationWeek, 8/4/20150 comments | Read | Post a Comment
Acer is courting the budget-conscious market with the release of the Aspire One Cloudbook, which uses Windows 10 and features Acer's abApps ecosystem.By Nathan Eddy Freelance Writer, 8/4/20150 comments | Read | Post a Comment
Accounting, transaction, and even navigation applications are based on the same basic type of structured database that has underpinned enterprise applications for the last three decades or more. So why aren't we paying more attention to these databases?By Curtis Franklin Jr. Executive Editor, Technical Content, 8/4/20150 comments | Read | Post a Comment
IBM has received 1,200 patents on cloud computing over the last 18 months. Here's a sample of what Big Blue is patenting and why it's a concern. By Charles Babcock Editor at Large, Cloud, 8/4/20154 comments | Read | Post a Comment
After the global rollout of Windows 10, we look at what's coming up for Microsoft's new operating system and overall product lineup. By Kelly Sheridan Associate Editor, InformationWeek, 8/4/20151 Comment | Read | Post a Comment
Networking pros who want to make the leap from a small shop to a big network environment can learn from how our newest network engineer got the job.By Lee Badman Network Engineer & Wireless Technical Lead, 8/4/20152 comments | Read | Post a Comment
The Internet of Things needs a strong backbone for the many billions of connected devices and apps most prognosticators expect. Find out which companies are building the IoT behind the scenes.By Kevin Casey , 8/4/20150 comments | Read | Post a Comment
The friendly hitchBOT met a grisly end in Philadelphia. That tells you all you need to know about human-AI interactions.By Thomas Claburn Editor at Large, Enterprise Mobility, 8/3/20155 comments | Read | Post a Comment
Amazon is looking to open its Alexa voice service to more developers and offering $100 million to get the service off the ground.By Larry Loeb Blogger, Informationweek, 8/3/20150 comments | Read | Post a Comment
The analytics unit of Harvard Business Review concludes that since everybody is doing it, less advantage is found in moving to cloud. By Charles Babcock Editor at Large, Cloud, 8/3/20151 Comment | Read | Post a Comment
The startup's virtual appliance is designed to give networking pros an easy way to test its software for white-box switches.By Marcia Savage Managing Editor, Network Computing, 8/3/20154 comments | Read | Post a Comment
RIG 3.0 used to infect millions of Internet Explorer (IE) users worldwide -- mostly via malvertising.By Kelly Jackson Higgins Executive Editor at Dark Reading, 8/3/20151 Comment | Read | Post a Comment
InformationWeek Tech Digest August 03, 2015The networking industry agrees that software-defined networking is the way of the future. So where are all the deployments? We take a look at where SDN is being deployed and what's getting in the way of deployments.
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.