Today
Follow IW:
 February 02, 2017

TOP STORIES

It's Still 'Intel Inside', But Now Intel's Inside The Cloud
Intel re-architects x86 toward the needs of the cloud, builds in management features for large scale server power savings.
Data-Driven Effectiveness Is A Team Sport
Smart people and the best technology aren't enough to drive a data-driven culture. It's all about people and collaboration, which is easier said than done. If you're serious about affecting change, consider these best practices.
Podcast: A Look Into The Cloud For 2017
InformationWeek spoke with the author of our 2017 State of the Cloud report to get his take on the data and trends in cloud computing.
What To Consider When Hiring Data Science Talent
Dealing with the data science talent crunch isn't just about competing for talent; it also requires the right data science strategy to help the analytics team be effective and efficient.

Partner Perspectives

Making The Most Of Software-Defined-Storage With Consulting, Training & Support
Companies such as Red Hat have become important for software-defined storage by providing access to the expertise, training, and support user organizations need to take fullest advantage of SDS.

Future Software-Defined Datacenters Defined by Abstraction and Hardware Commoditization
IT decision makers need to understand the use cases and risks associated with software-defined datacenters and the role hyperconvergence plays in an SDDC.

What To Consider When Moving To Hyperconverged Infrastructure
Scalability, data availability, and agility are three reasons enterprises are making the move to HCI.

TECH RESOURCES

ACCESS TECH LIBRARY NOW

  • [Cybersecurity] Dark Reading Virtual Event

    How much should your organization spend on information security? What's the potential cost of a major hack or data breach? What's the risk that your enterprise will be hit by a cyberattack? How can you measure the benefits of your ...

  • [Endpoint Security] Protect Your Memory - Stop Fileless Attacks

    Advanced attackers use sophisticated techniques to compromise, entrench and act on critical assets. With the rise of fileless attacks, Security Operations Center (SOC) teams must protect endpoint memory to stop adversaries from gaining foothold on enterprise endpoints.

MORE WEBINARS

MOST POPULAR

Gartner's 10 Tech Predictions That Will Change IT
During its recent Symposium ITXpo, Gartner released predictions about the future of technology for IT departments and users. Here's a look at those predictions and what they might mean for you and your organization.

10 Best US Cities For Tech Jobs In 2016
Glassdoor recently released its report on the best cities for jobs in 2016 based on factors including cost of living, job satisfaction, and work-life balance. Which of these cities on its list are best for IT pros? We take a look.

10 Strategic Tech Trends For 2017: Gartner
At the Gartner Symposium and ITxpo, Gartner released its annual list of the top 10 strategic trends. Are you planning for the right technology in your organization?

9 Raspberry Pi Projects For Your Summer Vacation
The right Raspberry Pi project can make the summer fun and educational. Here are nine possibilities that fit the bill.

10 Factors Determining Data Pro Salaries
O'Reilly Media's 4th annual survey of data professionals looks at tools, languages, gender, geographies, and a host of other factors that are predictors in terms of how much data workers can expect to earn. Where do you fit?

SLIDESHOWS

5 Ways to Be Successful with Open Source Software in 2017

MORE SLIDESHOWS

FEATURED REPORTS

  • [Secure Application Development] New Best Practices

    The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure ...

  • The Top Cybersecurity Risks & How Enterprises Are Responding

    The information security landscape is a constantly shifting risk environment. Today's IT security department must manage both internal and external threats' ranging from malware to mobile device vulnerabilities, to cloud security and ransomware. Download the Dark Reading 2016 Strategic Security Survey ...

MORE REPORTS
InformationWeek is looking for engaged readers to moderate message board on this site. Interact with your IT peers; earn recognition and perks. Interested? Email:Iwkmoderator@ubm.com

CURRENT ISSUE

DOWNLOAD THIS ISSUE SUBSCRIBE NOW
BACK ISSUES | MUST READS
InformationWeek Today
-- Published By InformationWeek
UBM Tech
2 Penn Plaza, 15th Floor, New York, NY 10121
To update your profile, change your e-mail address, or unsubscribe, click here.
To opt-out of any future InformationWeek Today Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: InformationWeekToday@ubmtechcontent.com
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.