InfoWorld Bossies
InfoWorld's Best of Open Source Software Awards
InfoWorld's Best of Open Source Software Awards
Heading out on the road? Be sure you have these critical business apps on your Android device
Apple has released a patch for iOS and says an OS X fix will be released 'very soon'
Microsoft chairman praises Macintosh but never sees corporate buyers being a strong point for Apple
Germany's Der Spiegel reports that the NSA has compromised a wide range of hardware for years to enable its spying
A baker's dozen of mostly free apps for server monitoring, remote access, network troubleshooting, password management, even scripting - right from your Windows Phone.
From Office to Hyper-V to Azure, the much-maligned 'dying dinosaur' has a lot going for it as the Ballmer era winds down
Oracle Database, WebLogic Server, and Java now certified for Windows Azure and Hyper-V
To close a federal investigation into possibly anticompetitive business practices, Google agrees to a slew of changes
A new generation of monitoring systems addresses the challenges of large-scale applications and more dynamic infrastructures
Which of today's newest shipping technologies will cast the longest shadow over business computing? Here are our best guesses.
Beware these all-to-common IT blunders before they derail your career
Redmond will produce its own ARM and Intel versions, which will include a cover with a touch keyboard
Find out how to implement authentication and authorization security controls in your company, with help from InfoWorld's expert guide
Insiders are responsible for as much as 80 percent of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other techniques. Roger Grimes, an InfoWorld contributing editor -- and a working security professional who tracks down unscrupulous insiders -- explains how to plan and execute a complete insider threat strategy.