Daily
Follow IW:
 March 05, 2016

TOP STORIES

9 Free iPhone Apps To Help You Land Your Next Job
Whether you're on the hunt for greener pastures, or looking for a complete career change, online resources are plentiful. Here are 9 iOS apps that could improve and shorten your search.
Google, Microsoft, Others Rally Behind Apple Against FBI
Amazon, Google, Microsoft, Facebook and others filed a friend of the court brief in support of Apple. It argues against the government's use of the All Writs Act to force the writing of new code, and emphasizes the "singular importance" of the case to all of them.
IBM Cuts Jobs In 'Workforce Rebalancing'
IBM has reportedly begun a wave of layoffs that are initially targeting the Global Technology Services and Global Business Services groups. Here's what we know so far.
Data Warehouse Disruptions 2016: Gartner Magic Quadrant
Cloud computing, virtualization, and the need to analyze non-relational data types are all driving disruption in the data warehouse market. Here's a look at how traditional and new vendors have shifted their placements in Gartner's Magic Quadrant report for 2016.
iPhone Encryption: 7 Reasons Why Feds Want It Cracked
Testimony from the FBI and National District Attorney's Association speak to the range of issues that have them fighting Apple's encryption practices. These seven snippets offer a summary of their positions.

Gain insight into the latest threats and emerging best practices for managing them. Attend the Security Track at Interop Las Vegas, May 2-6. Register now!


Partner Perspectives

Hacking Vulnerable Medical Equipment Puts Millions at Risk
Hospitals and medical device manufacturers need to start doing more to detect and thwart incoming attacks on networks and devices.

Android Security Gets Better with Lollipop
It's reassuring to see Google deploying new and improved security features as its mobile OS matures.

Privacy & Cybercrime Use The Same Tools
Users who are hungry for privacy need to choose their solutions carefully.

Security Spotlight

Why Marrying Infosec & Info Governance Boosts Security Capabilities

In today’s data centric world, security pros need to know where sensitive data is supposed to be, not just where it actually is now. InformationWeek's sister website, Dark Reading, has the full story.


TECH RESOURCES

ACCESS TECH LIBRARY NOW

  • The Analytics Job and Salary Outlook for 2016

    With data science and big data top-of-mind for all types of organizations, hiring analytics professionals often was a challenge for managers in 2015. For the professional with good data skills, that meant not only full employment but some decent bumps in ...

  • [Financial Services] How to Boost Customer Experience & Gain Competitive Advantage

    It has become essential for organizations to ensure a great customer experience if they want to survive in an increasingly competitive marketplace. Join InformationWeek for a 60-minute webinar to learn what helps customer experience leaders thrive and how they beat ...

MORE WEBINARS

MOST POPULAR

"Most people would like to be delivered from temptation but would like it to keep in touch." -- Robert Orben

SLIDESHOWS

9 Free iPhone Apps To Help You Land Your Next Job

MORE SLIDESHOWS

FEATURED REPORTS

MORE REPORTS
InformationWeek is looking for engaged readers to moderate message board on this site. Interact with your IT peers; earn recognition and perks. Interested? Email:Iwkmoderator@ubm.com

CURRENT ISSUE

DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS
InformationWeek Daily
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future InformationWeek Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: InformationWeekDaily@ubmtechcontent.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.