Profile of Thomas ClaburnEditor at Large, Enterprise Mobility
Member Since: 11/15/2013
News & Commentary Posts: 4491
Thomas Claburn has been writing about business and technology since 1996, for publications such as New Architect, PC Computing, InformationWeek, Salon, Wired, and Ziff Davis Smart Business. Before that, he worked in film and television, having earned a not particularly useful master's degree in film production. He wrote the original treatment for 3DO's Killing Time, a short story that appeared in On Spec, and the screenplay for an independent film called The Hanged Man, which he would later direct. He's the author of a science fiction novel, Reflecting Fires, and a sadly neglected blog, Lot 49. His iPhone game, Blocfall, is available through the iTunes App Store. His wife is a talented jazz singer; he does not sing, which is for the best.
Articles by Thomas Claburn
posted in August 2016
If your organization can't move beyond traditional work hours, it may have trouble keeping valuable tech employees happy. Here's what IT leaders need to know.
Inviting developers to solve technical challenges can open organizations up to new ways of doing things. Here are 6 IT benefits of hosting a hackathon.
Data from a 2012 breach has resurfaced, leading to fears that the information could be used to compromise accounts. IT managers using a new Dropbox feature don't need to worry, but they still have to guard against employees' bad password hygiene.
Having grown up amid crises and technologically accelerated change, the second-wave of Millennials -- or Gen Z -- that's entering the workforce has different expectations and needs than people who came before them. Here are some tips on how IT managers can support and direct this new generation of workers.
Forget the bells and whistles of powerful networking tools. When overseeing clients' networks, some IT pros insist that simpler is better.
A study by Stanford researchers finds computers can predict lung cancer patient outcomes better than pathologists. While the study is specific to the medical profession, it illustrates the promise and potential of machine learning for IT professionals in any industry.
If your organization doesn't run its own threat analysis center, it may be worth hiring a hunt team to watch your back. Here's what you need to know.
Welcome to the first episode of InformationWeek's Expert Voice, a new podcast series featuring interviews with top IT executives, managers, and technology experts. In this episode, we speak with Stuart Clarke, chief technical officer for cybersecurity at Nuix, about the impact intelligent data analysis can have on data security.
For colocation provider vXchnge, security isn't just a matter of strong defenses. It also involves planning for the worst.
Emerging from beta, Google's cloud databases are ready for business workloads.
Choosing the right EMM suite requires IT organizations to understand their needs and the capabilities of the various options. These nine options were featured in Gartner's 2016 Magic Quadrant for Enterprise Mobility Management Suites. They serve as a starting point to help you find the right tools for your IT needs.
The chipmaker says it will use Nervana Systems' expertise in accelerating deep learning algorithms to expand Intel's capabilities in the field of artificial intelligence.
Email overload and emerging alternatives have people looking at different communication channels. But maybe email can be saved -- something Nylas is working toward.
The acquisition, which reportedly cost more than $100 million, will allow Google to help companies sell cloud software to other businesses more efficiently.
IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications. Any flaw can bring unwelcome attention, for those making affected products and those using them. Any flaw may prove useful to compromise other systems on the network. When everything is connected, security is only as strong as the weakest node on the network.
Answering the White House's call for input on artificial intelligence, IBM argues the technology should be designed to assist people rather than replace them.
By supplying their own encryption keys, organizations can reduce the chance that an outside party will be able to gain access to their data, at least while it's at rest. Now Google's cloud platform offers the option.
Data theft is rampant, and companies don't seem to know what to do to stop it, according to a recent study. This infographic breaks it down for IT professionals.
A study of Uber drivers finds that the company's algorithms amount to managerial control. However, it's not clear whether Uber's arrangement with its drivers can be applied to other organizations, including IT-oriented industries.
With UberCENTRAL, the ride-sharing service aims to provide companies with a way to pay for customers' transportation.