Google agrees to not abuse mobile patents, search ads, or search results
To close a federal investigation into possibly anticompetitive business practices, Google agrees to a slew of changes
To close a federal investigation into possibly anticompetitive business practices, Google agrees to a slew of changes
A new generation of monitoring systems addresses the challenges of large-scale applications and more dynamic infrastructures
Which of today's newest shipping technologies will cast the longest shadow over business computing? Here are our best guesses.
Beware these all-to-common IT blunders before they derail your career
Redmond will produce its own ARM and Intel versions, which will include a cover with a touch keyboard
Find out how to implement authentication and authorization security controls in your company, with help from InfoWorld's expert guide
Insiders are responsible for as much as 80 percent of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other techniques. Roger Grimes, an InfoWorld contributing editor -- and a working security professional who tracks down unscrupulous insiders -- explains how to plan and execute a complete insider threat strategy.
Thanks to the success of Amazon EC2, Salesforce, and other public cloud services, most enterprises understand the value of cloud computing, and an increasing number of enterprises are exploring the idea of getting into the cloud computing business. Why not? Launching a public cloud service may establish a new revenue stream -- or self-service convenience for customers -- with minimal additions to existing infrastructure.
By now, IT has seen a stream of smartphones, tablets, laptops, and more enter the business. There's no stopping the consumerization trend, but IT can ease the transition and its own workload.
Change never lets up in technology, and the best developers must stay atop all the latest shifts, from big data to cloud computing to consumerization and beyond. InfoWorld's experts offer guidance to programmers on trends to watch, best practices to adopt, and sins to drop. They also point out programming languages on the rise, the best areas to find tech jobs, and the business skills to master.
These days, successful technology leadership means creatively and innovatively using technology to make a real business impact, whether in the private, government, education, or nonprofit sector. To honor the leaders behind such innovation, InfoWorld.com, the premier website for IT and business professionals seeking to stay abreast of leading technology trends and issues, seeks entries for its annual Technology Leadership Awards.
There may be someone in a dark corner of IT who hasn't heard about the consumerization of IT, that growing trend toward active user involvement and even control over aspects of the business's technology portfolio. By now, most of IT is aware -- sometimes painfully so. Also quite aware are business execs, who increasingly wave away IT's securty and control concerns as their users and customers swoon over iPads, social networking, cloud services, and the rest of the consumerization repertoire. They see employees who can do more in more places, and often they're discovering the joys personally.
InfoWorld gives you the full scoop on the state of the cloud in 2012, including key trends in the cloud's technology and its job opportunities, as well as what you have to know about the cloud before developing for it.
If malware were biological, the world would be in the grip of the worst pandemic in history. In 2009, more than 25 million unique malware programs were identified, more than all the malware programs ever created in all previous years. No one need wonder what all that malware is trying to do: It's trying to steal money -- through data theft, bank transfers, stolen passwords, or swiped identities.
You'd think we'd run out of them, but technology simply hasn't advanced enough to take <a href="http://www.infoworld.com/t/it-jobs/t1-vs-t10-playing-the-numbers-game-marketing-168279">boneheaded users</a> out of the daily equation that is the IT admin's life.