www.fgks.org   »   [go: up one dir, main page]

iPhone 6S, iPad Pro, TV, Watch: Apple's Fall Lineup
Vint Cerf Wants Your Help Re-Imagining The Internet
iSchool Bus Takes Tech To Teachers
Amazon Fire Smartphone Extinguished After Slow Sales
Salesforce Beefs Up Heroku For Custom Enterprise Apps
News & Commentary
Heartland CEO: Dealing Honestly With Data Breaches
InformationWeek Staff,
CommentaryVideo
At this year's InformationWeek Conference in Las Vegas, Heartland CEO Robert O. Carr spoke about how his company publicly confronted a huge data breach that exposed millions of credit card records to cyber-criminals. Is honesty the best policy when it comes to security? Carr thinks it is.
By InformationWeek Staff , 9/10/2015
Comment5 comments  |  Read  |  Post a Comment
What Ashley Madison Can Teach The Rest Of Us About Data Security
Mohan Koo, CEO & Co-founder, Dtex Systems
Commentary
For a company whose offering can best be described as discretion-as-a-service, using anything less than state-of-the-art threat detection capabilities is inexcusable.
By Mohan Koo CEO & Co-founder, Dtex Systems, 9/10/2015
Comment0 comments  |  Read  |  Post a Comment
Salesforce Beefs Up Heroku For Custom Enterprise Apps
Charles Babcock, Editor at Large, Cloud
News
Salesforce App Cloud ties together Salesforce's CRM apps, Force.com platform, and Heroku platform to run various parts of an application.
By Charles Babcock Editor at Large, Cloud, 9/10/2015
Comment0 comments  |  Read  |  Post a Comment
Amazon Fire Smartphone Extinguished After Slow Sales
Nathan Eddy, Freelance Writer
News
In a crowded smartphone market, sales of Amazon's Fire smartphone just weren't hot enough for the company to continue its existence.
By Nathan Eddy Freelance Writer, 9/10/2015
Comment0 comments  |  Read  |  Post a Comment
iSchool Bus Takes Tech To Teachers
Curtis Franklin Jr., Executive Editor, Technical Content
Commentary
The iSchool Initiative is teaching school districts how to build better classrooms with technology.
By Curtis Franklin Jr. Executive Editor, Technical Content, 9/10/2015
Comment4 comments  |  Read  |  Post a Comment
Demystifying Converged Infrastructure
Christine Cignoli, Freelance Writer
News
These data center building blocks consolidate storage, compute, virtualization and networking into one product. We look under the hood to find out exactly what that means.
By Christine Cignoli Freelance Writer, 9/10/2015
Comment0 comments  |  Read  |  Post a Comment
Troubleshooting IP Helper Address Issues
Tony Fortunato, Owner, The Technology Firm
News
IP helper addresses are often used to manage broadcast protocols, especially when it comes to DHCP, but be on the lookout for potential problems they can cause.
By Tony Fortunato Owner, The Technology Firm, 9/10/2015
Comment0 comments  |  Read  |  Post a Comment
iPhone 6S, iPad Pro, TV, Watch: Apple's Fall Lineup
Thomas Claburn, Editor at Large, Enterprise Mobility
News
iPhone 6S and 6S Plus and iPad Pro were among the products getting their big reveal at Apple's San Francisco shindig Sept. 9. But the real excitement lies in Apple's vision for the future of TV.
By Thomas Claburn Editor at Large, Enterprise Mobility, 9/10/2015
Comment2 comments  |  Read  |  Post a Comment
Managed Cloud Providers: 3 Questions To Ask
Jason Andersen, Senior Director of Product Marketing and Management, Stratus Technologies
Commentary
Before outsourcing to a managed cloud service provider, ask these questions to get past the hype and ensure the CSP is up to the task.
By Jason Andersen Senior Director of Product Marketing and Management, Stratus Technologies, 9/10/2015
Comment1 Comment  |  Read  |  Post a Comment
Vint Cerf Wants Your Help Re-Imagining The Internet
David Wagner, Executive Editor, Community & IT Life
News
Vint Cerf, recognized as one of the fathers of the Internet, is using social media to generate new ideas about how the Web should evolve.
By David Wagner Executive Editor, Community & IT Life, 9/10/2015
Comment3 comments  |  Read  |  Post a Comment
What You Should, But Don't, Do About Untrusted Certs, CAs
Sara Peters, Senior Editor at Dark Reading
News
Security departments could take measures to protect organizations from untrusted certificate authorities and counterfeit SSL certs, but most don't bother.
By Sara Peters Senior Editor at Dark Reading, 9/9/2015
Comment2 comments  |  Read  |  Post a Comment
iPhone 6s, iPad Pro Star At Apple Event
Eric Zeman,
Commentary
The new iPhone 6s and iPhone 6s Plus, along with a larger iPad, dominated Apple's fall event, which also heralded a new Apple TV and revised mobile and wearable operating systems.
By Eric Zeman , 9/9/2015
Comment7 comments  |  Read  |  Post a Comment
AT&T;, ZTE Transform Cars Into WiFi Hotspots With Mobley
Nathan Eddy, Freelance Writer
News
AT&T; and ZTE are offering a new device called Mobley, which can turn almost any car into a WiFi hotspot.
By Nathan Eddy Freelance Writer, 9/9/2015
Comment1 Comment  |  Read  |  Post a Comment
Microsoft, Dell, HP Bringing Surface Pro Tablets To Enterprises
Larry Loeb, Blogger, Informationweek
Commentary
In a move to bring more Surface Pro tablets into the enterprise, Microsoft is teaming up with hardware partners Dell and HP.
By Larry Loeb Blogger, Informationweek, 9/9/2015
Comment8 comments  |  Read  |  Post a Comment
Why Everybody Loves (And Hates) Security
Sergio Galindo, GM, GFI Software
Commentary
Even security professionals hate security. So why do we all harbor so much dislike for something we need so much? And what can we do about it?
By Sergio Galindo GM, GFI Software, 9/9/2015
Comment1 Comment  |  Read  |  Post a Comment
Apple's iPhone 6s Event: 5 Things To Watch
Nathan Eddy, Freelance Writer
Commentary
At Apple's event on Wednesday, Sept. 9, the company is expected to show off a faster iPhone 6s, a retooled Apple TV, and a bigger iPad built for professionals.
By Nathan Eddy Freelance Writer, 9/9/2015
Comment0 comments  |  Read  |  Post a Comment
Russian-Speaking Hackers Hijack Satellite Links To Hide Cyberspying Operation
Kelly Jackson Higgins, Executive Editor at Dark Reading
News
'Turla' exploits unencrypted satellite links in Africa and the Middle East to evade detection.
By Kelly Jackson Higgins Executive Editor at Dark Reading, 9/9/2015
Comment0 comments  |  Read  |  Post a Comment
Cloudera Sees Spark Emerging As Hadoop Engine
Charles Babcock, Editor at Large, Cloud
News
Cloudera launches the One Platform Initiative to advance Spark as the data processing successor to MapReduce inside Hadoop.
By Charles Babcock Editor at Large, Cloud, 9/9/2015
Comment2 comments  |  Read  |  Post a Comment
Want More Women In IT? Drop the Geek
David Wagner, Executive Editor, Community & IT Life
Commentary
Young women of high school and college age are not attracted to computer science because of old stereotypes, some true and some not.
By David Wagner Executive Editor, Community & IT Life, 9/9/2015
Comment5 comments  |  Read  |  Post a Comment
6 Ways To Ask Smarter Questions Of Big Data
Lisa Morgan, Freelance Writer
News
To drive more value out of your big data, you have to start with the right questions. Here are six strategies for improving the quality of the questions you ask big data.
By Lisa Morgan Freelance Writer, 9/9/2015
Comment0 comments  |  Read  |  Post a Comment
More Stories
PR Newswire
8 Back-To-School Gadgets IT Pros Will Want, Too
David Wagner, Executive Editor, Community & IT Life,  9/4/2015
How IT Workers Can Survive Cold And Flu Season
David Wagner, Executive Editor, Community & IT Life,  9/7/2015
Microsoft, Dell, HP Bringing Surface Pro Tablets To Enterprises
Larry Loeb, Blogger, Informationweek,  9/9/2015
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest August 03, 2015
The networking industry agrees that software-defined networking is the way of the future. So where are all the deployments? We take a look at where SDN is being deployed and what's getting in the way of deployments.
Building a Mobile Business Mindset
Building a Mobile Business Mindset
The differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Steal Our Slides
Dark Reading Threat Intelligence Survey
Dark Reading Threat Intelligence Survey
Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
Video
Sponsored Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
IT Projects fail at an alarming rate. Estimates range to as high as 86%, but it is safe to say that at least half of all IT projects fail to deliver on-time, on-budget, and provide the anticipated results. How can you improve your results? According to Karla Sasser, IT could learn a lot from the beancounters in accounting.