PayPal navigated its separation and independence from eBay in a seven-month accelerated transition. On the big day, all systems were go. Learn how the creative use of cloud technologies, and a remarkable degree of employee collaboration, earned the company a 2016 Elite 100 Award in the category of Best Use Of Cloud Services.By Charles Babcock Editor at Large, Cloud, 0 comments | Read | Post a Comment
We asked the IT leaders in the 2016 InformationWeek Elite 100 about how they're addressing important IT issues, such as tech spending, organizational priorities, and strategy. Find out what we learned, and see how your IT organization stacks up.
By Susan Nunziata Editorial Director, 1 Comment | Read | Post a Comment
A report by the Cloud Security Alliance finds that identity management tools and processes are key to ameliorating the threat of breaches. The report reveals which tools are most popular, and which are underutilized.By Charles Babcock Editor at Large, Cloud, 1 Comment | Read | Post a Comment
A ransomware attack could be around the corner, but there are some practical steps you can take to back up your data and deflect the attack. By Steve Zurier Freelance Writer, 0 comments | Read | Post a Comment
Cybercriminals are increasingly targeting healthcare institutions and successfully deploying malware and ransomware to exploit hospitals' need to recover quickly.
By Emily Johnson Associate Editor, UBM Americas, 0 comments | Read | Post a Comment
With PC sales on the decline Intel looks to cut 11% of the company's workforce -- about 12,000 positions -- and refocus on IoT businesses, as well as cloud computing and data centers.By Nathan Eddy Freelance Writer, 4 comments | Read | Post a Comment
It's tricky trying to figure out whether or not your preferred app, website, or service provider has received a federal subpoena demanding information. When a warrant canary vanished from Reddit's Transparency Report, it got folks talking. The incident holds important lessons for enterprise IT professionals trying to decipher whether or not a service provider's data is being trolled by the feds.By Joe Stanganelli Attorney, Beacon Hill Law, 0 comments | Read | Post a Comment
Mainframe systems are still the backbone of much of today's IT infrastructure. Yet, finding IT talent to maintain these systems, and the COBOL and Fortran languages that support them, is becoming increasingly difficult. Knowledge transfer expert Steve Trautman, founder of The Steve Trautman Co., offers real-world advice on how IT leaders can cultivate the talent needed to run these crucial systems.
By Steve Trautman Freelance Writer, 13 comments | Read | Post a Comment
An update to the Email Privacy Act requiring a warrant for the search of data older than 180 days was unanimously supported by the House Judiciary Committee. It now heads for a vote by the full chamber. By Michelle Maisto Freelance Writer, 0 comments | Read | Post a Comment
The PC market continued its losing streak in the first quarter of 2016, as shipments declined for the sixth consecutive quarter, according to the latest numbers from Gartner and IDC. Lenovo and HP remained the market leaders.By Nathan Eddy Freelance Writer, 1 Comment | Read | Post a Comment
One in five employees is willing to leak confidential information, and 30% of them say that they will sell their work-related passwords for less than $1,000, according to Sailpoint 2016 Market Pulse Survey findings. The release of the Panama Papers is adding to the debate.By Pablo Valerio International Business & IT Consultant, 7 comments | Read | Post a Comment
Can relational database management systems peacefully coexist with big data technologies? Here's what the experts have to say.By William Terdoslavich Freelance Writer, 0 comments | Read | Post a Comment
Apple reached its 40th anniversary this month, no mean feat in a tech industry littered with the names of long-gone giants. Here's a look at the 12 products that defined the company, and changed what we know as computing in the process.By Curtis Franklin Jr. Executive Editor, Technical Content, 9 comments | Read | Post a Comment
The acquisition of Bluewolf pairs cloud services and strategic consulting with IBM's expertise in experience design, mobility, and cognitive solutions. Financial details were not released.By Nathan Eddy Freelance Writer, 0 comments | Read | Post a Comment
NIST published a new cybersecurity standard that specifies 'format- preserving encryption' techniques to secure credit card number and sensitive medical information.By Dark Reading Staff , 1 Comment | Read | Post a Comment
Microsoft executives kicked off Build 2016 with a series of announcements, including the rollout of a major Windows 10 update this summer.By Kelly Sheridan Associate Editor, InformationWeek, 3 comments | Read | Post a Comment
If you're considering -- or merely curious about -- converting your data center to a private cloud, we'll help you learn about the management, scalability, and efficiency improvements you may gain.By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 2 comments | Read | Post a Comment