IT Weekly


Feb 19, 2019

Every week we bring you more than 40+ relevant online sources that contain articles of interest to IT and DC Professionals at all levels

Browse by Technology
Browse by Year



Category Articles From 2014 Source Posted Date Age
Data Ten Huge Multi-Tenant Data Centers that Came Online in 2014 Data Center Knowledge 12/31/2014 1511
Bit bucket 3D Printing Medical Breakthroughs -- Including Dog Legs ComputerWorld 12/31/2014 1511
Security How Sony Used Old Tech to Function After Hack CIO Today 12/31/2014 1511
Security The Biggest Security Stories of 2014 Security InfoWatch 12/30/2014 1512
Management 5 Hyperscale Lessons for Mainstream Datacenters InformationWeek 12/30/2014 1512
Bit bucket Reclaim Your Schedule in 2015: 7 Tips InformationWeek 12/30/2014 1512
Technology IoT Market Growing Amid Privacy Concerns CIO Today 12/30/2014 1512
Connectivity Internet of Things Growing Despite Security Concerns CIO Today 12/30/2014 1512
Security 8 Tips to Improve Cyber Security In the New Year Network World 12/29/2014 1513
Cloud Retailer Takes Control of Its Cloud IT World 12/29/2014 1513
Data Big Data Industry Predictions 2015 Insurance Networking 12/29/2014 1513
Management New Data, Same Old Dumb Bosses: 3 Lessons InformationWeek 12/29/2014 1513
Cloud 9 Cloud Trends For 2015 InformationWeek 12/29/2014 1513
Bit bucket Mainframe Futures: Reading the Tea Leaves Information Management 12/29/2014 1513
Bit bucket A 2014 Lookback: Predictions vs. Reality Dark Reading 12/29/2014 1513
Security The Separation of Information Security & IT Bank Systems & Technology 12/29/2014 1513
Management 25 Must-Reads for IT Leaders in 2015 Insurance Networking 12/27/2014 1515
Technology 12 Life-Changing Social Media Resolutions ComputerWorld 12/27/2014 1515
Data The World's Biggest Data Breaches, in One Interactive Chart IT World 12/26/2014 1516
Connectivity The Internet of Things, Explained IT World 12/26/2014 1516
Data How to Recruit, Retain Analytics Talent Insurance Networking 12/26/2014 1516
Connectivity Top 10 Social Network Blunders of 2014 InformationWeek 12/26/2014 1516
Cloud Planning for the Future: Enterprise Cloud Trends in 2015 Data Center Knowledge 12/26/2014 1516
Bit bucket Top 10 Tech Conspiracy Theories of All Time ComputerWorld 12/25/2014 1517
Bit bucket Bloopers, Breakdowns, and Bad Jobs: The IT Chronicles InfoWorld 12/24/2014 1518
Data The Future of Data Scientists Information Management 12/24/2014 1518
Bit bucket Why Digital Forensics in Incident Response Matter More Now Dark Reading 12/24/2014 1518
Cloud The 10 Biggest Cloud Outages of 2014 CRN 12/24/2014 1518
Technology Court Reaffirms: Think Before you Email ComputerWorld 12/24/2014 1518
Technology Coke Cuts Voicemail: Sign of the Times, or Mistake? No Jitter 12/23/2014 1519
Administration Scaling Servers: A Cost Breakdown NetworkComputing 12/23/2014 1519
Bit bucket Computer Vision Finally Matches Primates' Ability IT World 12/23/2014 1519
Security 4 positive predictions for security in 2015 InfoWorld 12/23/2014 1519
Data Sports Analytics: The Extra Man Information Management 12/23/2014 1519
Technology Speech Recognition Technology Better than Human's Exists Information Management 12/23/2014 1519
Security What the Sony Breach Means for Security In 2015 CSO Online 12/23/2014 1519
Compliance The 10 Biggest Storage Stories Of 2014 CRN 12/23/2014 1519
Bit bucket Are Personality Assessments Effective Hiring Tools? Network World 12/22/2014 1520
Management 5 Lessons To Help Security Pros Craft a New Year's Resolution Network World 12/22/2014 1520
Bit bucket 2015's Most Ridiculous Tech Predictions NetworkComputing 12/22/2014 1520
Data 5 Big Data Technology Predictions for 2015 CIO 12/22/2014 1520
Management 3 Reasons Why Company Leaders Should be Worried About Mobile Surveillance Business 2 Community 12/20/2014 1522
Security What We Know about North Korea's Cyberarmy Network World 12/19/2014 1523
Bit bucket 10 Predictions for IT in 2015 Network World 12/19/2014 1523
Bit bucket 10 IT Roles to Target when Poaching Talent Network World 12/19/2014 1523
Technology It's Okay to Take a Breather from the Technology Maelstrom Insurance Networking 12/19/2014 1523
Connectivity 6 Aging Protocols That Could Cripple the Internet Network World 12/18/2014 1524
Bit bucket Only 1% of Consumers Feel Safe Using Mobile Paymets HelpNet Security 12/18/2014 1524
Data 8 Hadoop Big Data Predictions for 2015 Information Management 12/18/2014 1524
Bit bucket 5 Pitfalls to Avoid When Running Your SOC Dark Reading 12/18/2014 1524
Bit bucket Driver's License App on a Smartphone Raises Privacy Issues ComputerWorld 12/18/2014 1524
Bit bucket Getting Real about Information Governance ComputerWorld 12/18/2014 1524
Cloud 5 Warnings about Jurisdiction and Cloud Storage Business Solutions 12/18/2014 1524
Data 6 Essential Steps to Managed Backup Success Business Solutions 12/18/2014 1524
Data Sponsored Link - Superfast 60 Minute Data Center Service Delivery in Europe DEAC 12/17/2014 1525
Connectivity Sponsored Link - DEAC Superfast Data Center Services Maximize One of the Fastest Internet Connections in the World DEAC 12/17/2014 1525
Security 10 routes to IT job security TechRepublic 12/17/2014 1525
Bit bucket Did Alcatraz Escapees Survive? Computer Program Says they Might Have Network World 12/17/2014 1525
Bit bucket 16 of the Hottest IT Skills for 2015 CIO 12/17/2014 1525
Cloud Signs the Cloud Isn't Right for Your Business Business 2 Community 12/17/2014 1525
Data Big Data: Do You Have a Plan? Business 2 Community 12/17/2014 1525
Management Five Ways to Get Your IT Project Signed Off ZDnet 12/16/2014 1526
Bit bucket What Do Workers Everywhere Want Most? To Be Valued and Appreciated TLNT 12/16/2014 1526
Data Lessons Learned from Data Breaches Risk Management Monitor 12/16/2014 1526
Data How Predictive Analytics can Help Set Perfect Hotel Room Prices Network World 12/16/2014 1526
Bit bucket How Colleges are Failing Their Students Network World 12/16/2014 1526
Data 7 Devices that Make Your Data Vulnerable Network World 12/16/2014 1526
Bit bucket 1 In 5 Employees Going Rogue with Corporate Data HelpNet Security 12/16/2014 1526
Data The Theory of Data Trust Relativity Information Management 12/16/2014 1526
Security 10 Changes You Can Make to Achieve Security Serenity Now! CSO Online 12/16/2014 1526
Security Top 10 Security Risks of 2014 CRN 12/16/2014 1526
Technology Quantum Physics Used In Quest for Fraud-Proof Credit Cards ComputerWorld 12/16/2014 1526
Security Move Security from IT Up to Boardroom ComputerWeekly 12/16/2014 1526
Management How CIOs Can Prepare for Healthcare 'Data Tsunami' CIO 12/16/2014 1526
Administration Sponsored Link - Hot 12/Deal! Achieve Business Reliability Through Powerful Server Rental in European Data Centers DEAC 12/15/2014 1527
Management Drone Management: The Next Frontier Network World 12/15/2014 1527
Cloud Do You Know the Laws that Govern Personal Information In the Cloud? IT World 12/15/2014 1527
Bit bucket 10 Ways to Future-Proof Yourself Global Knowledge 12/15/2014 1527
Bit bucket Predictions for 2015 CSO Online 12/15/2014 1527
Bit bucket Q&A: How U.S. Companies can Overcome European Regulatory Hurdles CRN 12/15/2014 1527
Security Despite the Hype 'Encrypted' Does Not Equal 'Safe' Continuity Central 12/15/2014 1527
Security Blind Faith in Security Standards could Create Cyber Vulnerabilities Continuity Central 12/15/2014 1527
Security You Can't Always Stop a Breach: But You Should Always be Able to Spot One Continuity Central 12/15/2014 1527
Security Holding Masses of Data, Cybercriminals Face Hurdles Cashing Out ComputerWorld 12/15/2014 1527
Cloud Do You Know the Laws That Govern Personal Information In the Cloud? ComputerWorld 12/15/2014 1527
Bit bucket A Terabyte on a Postage Stamp: RRAM Heads into Commercialization ComputerWorld 12/15/2014 1527
Bit bucket Want to Stay Anonymous? Don't Wear a Camera CIO 12/15/2014 1527
Data How to Crash the Data Center with One Word InfoWorld 12/13/2014 1529
Bit bucket How to Configure a Golden Triangle TechRepublic 12/12/2014 1530
Bit bucket 9 Reasons Good Employees Leave -- and How You Can Prevent It Network World 12/12/2014 1530
Management The Top 3 Ways Congress could Help Fight Tenacious Cyber Threats IT World 12/12/2014 1530
Security Meet the FBI's Most Wanted Cyber Suspects IT News 12/12/2014 1530
Connectivity How to Bridge and Secure Air Gap Networks CSO Online 12/12/2014 1530
Data If You Build It: The Rise of the Mega Data Center CRN 12/12/2014 1530
Cloud Cloud Is Blurring Boundaries Between IT and Telecom Consultants CRN 12/12/2014 1530
Bit bucket What Effect Do You Have on People? TLNT 12/11/2014 1531
Management CIO: The Flaw in Your IT Strategy IT World Canada 12/11/2014 1531
Security Don't Trust That Lamp! How 12 Common Devices Can now Be Hacked IT World 12/11/2014 1531
Bit bucket Real Innovation, not False Bravado, Disrupts Markets InfoWorld 12/11/2014 1531
Technology Weird Science: The 10 Oddest Tech Stories of 2014 InfoWorld 12/11/2014 1531
Bit bucket How EPM Is Similar to Football Information Management 12/11/2014 1531
Data IT And End Users are Far Apart on Critical Data Access CSO Online 12/11/2014 1531
Management The Biggest Challenges Faced by CIOs/CISOs Heading into 2015 CSO Online 12/11/2014 1531
Cloud Cloud Security Still 'Disruptive' Trend in 2015 CIO Today 12/11/2014 1531
Management 3 Reasons It's Time To Outsource IT Support To A Managed Services Provider Business 2 Community 12/11/2014 1531
Management The Technology Shift of 1914: Lessons We Can Learn 100 Years Later Business 2 Community 12/11/2014 1531
Bit bucket 10 Admin Tasks to Knock Out by the End of the Year TechRepublic 12/10/2014 1532
Connectivity More Education Needed to Realize the Internet of Everything Network World 12/10/2014 1532
Administration Heat Your Home this Winter with... A Cloud Server Network World 12/10/2014 1532
Bit bucket Iowa to Put Driver's Licenses on Mobile Phones Network World 12/10/2014 1532
Management Strategic Architecture vs Quick Project Wins Information Management 12/10/2014 1532
Cloud California CIO Discusses State's Cloud first Policy Government Technology 12/10/2014 1532
Security Why the Board Of Directors (BoD) Will Go Off on Security In 2015 CSO Online 12/10/2014 1532
Bit bucket Hitachi Finger Vein Scanner could Secure Large Venues ComputerWorld 12/10/2014 1532
Management Orion's Lesson for IT: Test Your Systems, Then Test Again (And Again) ComputerWorld 12/10/2014 1532
Security The Human Factor a Key Challenge to Information Security, Say Experts ComputerWeekly 12/10/2014 1532
Data No NAND's Land: Flash Will NOT Take Over the Data Centre The Register 12/09/2014 1533
Bit bucket Father of Video Games Ralph Baer Dead at 92 Network World 12/09/2014 1533
Cloud No, You Can't Buy a Cloud at Best Buy InfoWorld 12/09/2014 1533
Security Security Group Plans for a Future Without Passwords ComputerWorld 12/09/2014 1533
Management Why Blades need Enterprise Management Software The Register 12/08/2014 1534
Management 10 Things End Business Users Should Ask when Making Tech Purchases TechRepublic 12/08/2014 1534
Technology 9 Social Media Trends to Watch In 2015 TechRepublic 12/08/2014 1534
Bit bucket Forgotten Subdomains Boost Risk of Account Hijacking, Other Attacks IT World 12/08/2014 1534
Data Power Company Plugs Data Center Directly into High-Voltage Grid IT World 12/08/2014 1534
Bit bucket Gigabit Speeds Over Telephone Wires Get Closer Thanks to New G.Fast Standard IT World 12/08/2014 1534
Technology Data from Wearable Devices Could Soon Land You in Jail IT World 12/08/2014 1534
Administration Fake Clouds: The Last Gasp of Client-Server InfoWorld 12/08/2014 1534
Administration The Beginning of the End of the Private Mail Server InfoWorld 12/08/2014 1534
Compliance Why You Need to Go Above & Beyond PCI Compliance Bank Systems & Technology 12/08/2014 1534
Storage Grueling Endurance Test Blows Away SSD Durability Fears IT World 12/05/2014 1537
Bit bucket Renewable Energy Trends Highlighted IT Web 12/05/2014 1537
Technology Working Conditions? Amazon's Robots have No Complaints InfoWorld 12/05/2014 1537
Security Should Chief Marketing Officers Be Involved in Security and Privacy Decisions? CSO Online 12/05/2014 1537
Technology Using Social Media to Recruit Better Tech Talent Network World 12/04/2014 1538
Connectivity Full Speed Ahead for 802.11ac Gigabit Wi-Fi Network World 12/04/2014 1538
Cloud Cloud Upstarts: too Cheap to Trust? Network World 12/04/2014 1538
Connectivity Best Practices ln Knowledge-Based Authentication (KBA) HelpNet Security 12/04/2014 1538
Bit bucket Storm or Spark: Choose Your Real-Time Weapon InfoWorld 12/04/2014 1538
Security Better Phishing Makes Email an Unclosable Hole in Security ComputerWorld 12/04/2014 1538
Bit bucket What Is SDN? The History of All Things SDN Virtualization Practice 12/03/2014 1539
Bit bucket Aussie Telcos Struggling with IPv6 Adoption IT News 12/03/2014 1539
Data Big Data Market Projected to Reach $76 Billion by 2020 Insurance Networking 12/03/2014 1539
Security Why FBI Is Wrong on Encryption Workaround InformationWeek 12/03/2014 1539
Cloud Cloud Storage: 8 Ways You're Wasting Money InformationWeek 12/03/2014 1539
Security Security Executives Reveal Their Holiday Wish Lists CSO Online 12/03/2014 1539
Administration The 10 Coolest Servers of 2014 CRN 12/03/2014 1539
Bit bucket Firms Losing Millions through Avoidable IT Outages v3 co uk 12/02/2014 1540
Bit bucket BYOD is Saving Serious Money for IT Network World 12/02/2014 1540
Management Facebook at Work: The pro and con considerations for CIOs IT World Canada 12/02/2014 1540
Security The Catastrophic State of Security in 2014 InfoWorld 12/02/2014 1540
Bit bucket Home Automation is a Solution In Search of a Problem InfoWorld 12/02/2014 1540
Bit bucket Leveraging the Kill Chain for Awesome Dark Reading 12/02/2014 1540
Security The Breach at Sony Pictures Is No Longer Just an IT Issue CSO Online 12/02/2014 1540
Bit bucket Making a Hash of Passwords ComputerWorld 12/02/2014 1540
Bit bucket IT Resume Makeover: Top 11 Tips from 2014 CIO 12/02/2014 1540
Bit bucket The 10 Biggest Killers of Employee Motivation TLNT 12/01/2014 1541
Bit bucket How to Get the Most Out of Your IT Talent Network World 12/01/2014 1541
Cloud Public Cloud Storage Can Be Efficient, But the Potential Is Still Limited Network World 12/01/2014 1541
Bit bucket SDN Tools Increase WAN Efficiency Network World 12/01/2014 1541
Cloud How to Get More Out of Your Virtualized and Cloud Environments Network World 12/01/2014 1541
Data How UPS Uses Analytics to Drive Down Costs (and No, it Doesn't Call it Big Data) Network World 12/01/2014 1541
Security What to Expect In the Unpredictable World of IT Security? HelpNet Security 12/01/2014 1541
Management Why You Need to Build Career Paths for Nonmanagers IT World 12/01/2014 1541
Connectivity Net Neutrality: Five Myths, and the Real Facts IT World 12/01/2014 1541
Bit bucket There's No Magic in PaaS, Only Trade-Offs InfoWorld 12/01/2014 1541
Bit bucket 9 Key Enterprise Tech Trends for 2015 And Beyond InfoWorld 12/01/2014 1541
Management 13 Insider Tips for Acing Your Job Interview InfoWorld 12/01/2014 1541
Management CIO Checklist: Ready for the Disrupted, Digital World? InformationWeek 12/01/2014 1541
Storage Bank of America Tech Chief Cathy Bessant: What I Believe InformationWeek 12/01/2014 1541
Connectivity Internet-Connected Things will Soon Outnumber People Government Technology 12/01/2014 1541
Bit bucket Eliminating Downtime: Six Key Considerations for Your Hosting Architecture Data Center Knowledge 12/01/2014 1541
Connectivity Internet Encryption As The New Normal Dark Reading 12/01/2014 1541
Security How I Became a CISO: Jonathan Trull, Qualys Dark Reading 12/01/2014 1541
Bit bucket 10 Deadliest Differences of State-Sponsored Attacks CSO Online 12/01/2014 1541
Connectivity 'Time Cloak' Could Revolutionize Fiber Networks ComputerWorld 12/01/2014 1541
Connectivity The 6 Requirements for Data Center Networks Business 2 Community 12/01/2014 1541
Data What Does Big Data Mean for Marketers? Business 2 Community 12/01/2014 1541
Data How to Navigate Big Data In Healthcare ComputerWorld 11/30/2014 1542
Bit bucket Ignoring Software Updates Exposes You Business 2 Community 11/30/2014 1542
Connectivity Internet of Things Will Create Unique Legal Scenarios Firms must Consider Now v3 co uk 11/28/2014 1544
Bit bucket Warning: Chinese E-Cigarettes may Damage Your PC's Health v3 co uk 11/28/2014 1544
Bit bucket The 3 Risks You Face When Employees are Traveling for You TLNT 11/28/2014 1544
Bit bucket Disney Animation Team Pushes Technical Boundaries with Big Hero 6 TechRepublic 11/28/2014 1544
Management 5 Ways PCI Will Be More Security-Conscious In 2015 IT World 11/28/2014 1544
Security 7 Commonly Overlooked Ways to Tighten Cyber Security InfoWorld 11/28/2014 1544
Cloud Sponsored Link - Make Your Life Easier with Fully-Customized DEAC Cloud Configurator - Find Out Your Price Now! DEAC 11/27/2014 1545
Data Sponsored Link - Tailored Solutions by European Data Center Operator DEAC DEAC 11/27/2014 1545
Technology Engineering and Technology Industries Face a Scrap Over Digital Skills v3 co uk 11/27/2014 1545
Bit bucket User Flexibility Without the Risk The Register 11/27/2014 1545
Bit bucket The Intelligent Knife that Helps Surgeons Sniff Out Cancer TechRepublic 11/26/2014 1546
Bit bucket It's Alive! The 3D Printing of Living Tissues TechOnline India 11/26/2014 1546
Connectivity Network Security Must Focus on Incident Response NetworkComputing 11/26/2014 1546
Connectivity Leveraging Network Intelligence and Deep Packet Inspection HelpNet Security 11/26/2014 1546
Management 8 Feel-Good Tales of Life In IT InfoWorld 11/26/2014 1546
Bit bucket Top Reasons for CSOs to Give Thanks CSO Online 11/26/2014 1546
Bit bucket Here's Why Hydrogen-Fueled Cars aren't Little Hindenburgs ComputerWorld 11/26/2014 1546
Connectivity The Internet of Things Far Bigger Than Anyone Realizes - Part 2 Business 2 Community 11/26/2014 1546
Data Don't Get Skunked in a Data Breach Business 2 Community 11/26/2014 1546
Management Don't Forget Charisma when Hiring an IT Leader TechRepublic 11/25/2014 1547
Security The Impact of Collaboration in Cyber Risk Insurance Risk Management Monitor 11/25/2014 1547
Data Home Depot Spent $43 Million on Data Breach In Just One Quarter PC World 11/25/2014 1547
Storage NASA Sets huge $5M Cubesat Competition Network World 11/25/2014 1547
Connectivity SDN Networking Followed by SDN Security Network World 11/25/2014 1547
Bit bucket 8 Tools to Manage Holiday Family Stress NetworkComputing 11/25/2014 1547
Security Thinking of Buying a Security Camera? Read this First InfoWorld 11/25/2014 1547
Bit bucket Corporate IT's Darwinian Challenge InformationWeek 11/25/2014 1547
Bit bucket You May Not Know It, but You Used A Supercomputer Today Data Center Knowledge 11/25/2014 1547
Data Context is Next Big Data Challenge Data Center Knowledge 11/25/2014 1547
Data Data Management vs. Data Loss Prevention: Vive La Difference! Dark Reading 11/25/2014 1547
Security 10 Ways Security Gurus Give Thanks Dark Reading 11/25/2014 1547
Storage Want A 100TB Disk Drive? You'll Have To Wait 'Til 2025 ComputerWorld 11/25/2014 1547
Storage NASA Creates First 3D Printed Object in Space ComputerWorld 11/25/2014 1547
Bit bucket Fidelity's Top IT Exec sees Potential In A.I. ComputerWorld 11/25/2014 1547
Management Why CIOs and CMOs Must Run Side by Side CIO 11/25/2014 1547
Security Thwarting Attackers with Threat Intelligence Network World 11/24/2014 1548
Bit bucket 14 Go-To Tools for Mac SysAdmins Network World 11/24/2014 1548
Security ENISA Guidelines on Cryptographic Solutions HelpNet Security 11/24/2014 1548
Security CISO Role is Gaining Traction: Survey IT World Canada 11/24/2014 1548
Connectivity Getting Started with Power-Line Networking IT World 11/24/2014 1548
Connectivity Net Neutrality: Too Much Spin, Not Enough Facts InformationWeek 11/24/2014 1548
Connectivity Network Security Needs Big Data ComputerWorld 11/24/2014 1548
Bit bucket 11 Job Search Mistakes that Can Kill Your Chances CIO 11/24/2014 1548
Management Health IT Success Hinges on CIO-Business Collaboration CIO 11/24/2014 1548
Data The Longer You Delay, the More the Data Decay Business 2 Community 11/23/2014 1549
Management Data Gravity: Charting the Future of Your Organization's Critical Information Business 2 Community 11/23/2014 1549
Technology Forget Your Robot Overlords: Watch Out For Lethal Autonomous Systems That Make Mistakes Network World 11/22/2014 1550
Management Lessons from MBIA: When Breaches Go Viral Risk Management Monitor 11/21/2014 1551
Bit bucket Molecular Flash Memory could Store Massive Data IT World 11/21/2014 1551
Cloud In a Cloud Outage, No One Can Hear You Scream InfoWorld 11/21/2014 1551
Bit bucket 6 Traits That Make a Great IT Candidate InformationWeek 11/21/2014 1551
Bit bucket 10 Holiday Party Attire Atrocities InformationWeek 11/21/2014 1551
Management 3 Lessons Hawaii Learned from Gamifying Government Government Technology 11/21/2014 1551
Management How CSOs Can Help CIOs Talk Security to the Board CIO 11/21/2014 1551
Connectivity The Internet of Things Far Bigger Than Anyone Realizes - Part 1 Business 2 Community 11/21/2014 1551
Cloud Buyer Beware: The Cloud Is Not A Magic Button Business 2 Community 11/21/2014 1551
Bit bucket You're doing BYOD Wrong: These Numbers Prove It Wall Street & Technology 11/20/2014 1552
Security NSA Chief Says Cyberattacks on Industrial Systems are His Top Concern Network World 11/20/2014 1552
Bit bucket 4 Ways Your Competitors are Stealing Your IT Talent Network World 11/20/2014 1552
Management Don't Wrap Your Organization too Tight with Metrics Insurance Networking 11/20/2014 1552
Management Bank CEOs Fear Data-Driven Decisions Information Management 11/20/2014 1552
Management Good Leaders Need to Have Good Manners, Too TLNT 11/19/2014 1553
Bit bucket New Cruise Ship a Floating Heaven for Tech Geeks Network World 11/19/2014 1553
Connectivity Net Neutrality: It's Regulation for the Public Good, Not Government Takeover Network World 11/19/2014 1553
Bit bucket RAID Redefined NetworkComputing 11/19/2014 1553
Bit bucket Time to Secure the Web? EFF Says HTTPS Can Soon Be the Norm InfoWorld 11/19/2014 1553
Bit bucket 7 Important Tech Regulatory Issues in 2015 InformationWeek 11/19/2014 1553
Bit bucket Coming by 2023, An Exascale Supercomputer In the U.S. ComputerWorld 11/19/2014 1553
Data Sponsored Link - European Data Center Operator DEAC Launches In US, UK and German Markets DEAC 11/18/2014 1554
Technology Five Big Social Media Red Flags to Avoid From Potential Hires TLNT 11/18/2014 1554
Bit bucket Adapt to the End of 'Imperial IT' or Risk Becoming Irrelevant TechRepublic 11/18/2014 1554
Cloud Cloud Computing's Not-so-Secret Mission Network World 11/18/2014 1554
Technology 11 Top Science & Technology Research Labs NetworkComputing 11/18/2014 1554
Security How to Lose Customers with Excessive Security InfoWorld 11/18/2014 1554
Bit bucket Tech Hygiene: 10 Bad Habits to Break InformationWeek 11/18/2014 1554
Bit bucket Time for Data-Driven Intuition Information Management 11/18/2014 1554
Management What are the Keys to Effective Leadership? Government Technology 11/18/2014 1554
Bit bucket How to Communicate Effectively at Work Forbes 11/18/2014 1554
Security Five Security Developments We can Be Thankful for in 2014 CSO Online 11/18/2014 1554
Management Growing a Business: Double, Double, Toil and Trouble ComputerWorld 11/18/2014 1554
Security Getting Your Board's Buy-In on Cybersecurity ComputerWorld 11/18/2014 1554
Cloud IT Needs to Stop Pretending It's Not Responsible for Cloud Security ComputerWorld 11/18/2014 1554
Management How to Be the CIO of Tomorrow CIO 11/18/2014 1554
Bit bucket The 10 Mightiest Supercomputers on the Planet Network World 11/17/2014 1555
Connectivity Encrypt Everything, Urges Internet Architecture Board Network World 11/17/2014 1555
Data 100 Gbps Headed for the Data Center NetworkComputing 11/17/2014 1555
Bit bucket How 40 Tech Companies Got their Names IT World 11/17/2014 1555
Administration The Seven Flavors of Virtualization Insurance Networking 11/17/2014 1555
Connectivity Net Neutrality Is as Simple as Freedom vs. Monopoly InfoWorld 11/17/2014 1555
Security 10 Security Mistakes that Will get You Fired InfoWorld 11/17/2014 1555
Bit bucket IT's 10 Fastest-Growing Paychecks InformationWeek 11/17/2014 1555
Bit bucket Why We Must Move to IPv6 InformationWeek 11/17/2014 1555
Data Nine Steps to Unlock Big Data's Hidden Value Information Management 11/17/2014 1555
Bit bucket Is Rogue IT Really a Problem? Dark Reading 11/17/2014 1555
Security The Top Infosec Issues of 2014 CSO Online 11/17/2014 1555
Cloud Enterprises Moving Big Data Workloads to Public Cloud ComputerWorld 11/17/2014 1555
Technology Is Enterprise IT a Social Media Leisure Suit? CIO 11/17/2014 1555
Bit bucket Information Overload: Beyond Better Filters Business 2 Community 11/17/2014 1555
Bit bucket Consumers Warming to Alternative Payments Bank Systems & Technology 11/17/2014 1555
Management 7 Enterprise-Grade Gadgets Built for Business Network World 11/15/2014 1557
Management 4 Rounds of Interviews? It Shows how Screwed Up Your Hiring Process Is TLNT 11/14/2014 1558
Connectivity DARPA Wants to Toughen-Up WAN Edge Networking, Security Network World 11/14/2014 1558
Bit bucket 7 Ways IT Can Do a Better Job of Listening To Users InfoWorld 11/14/2014 1558
Security Rethinking Security with a System of 'Checks & Balances' Dark Reading 11/14/2014 1558
Bit bucket After This Judge's Ruling, Do You Finally See Value in Passwords? CSO Online 11/14/2014 1558
Bit bucket Privacy Is the New Killer App ComputerWorld 11/14/2014 1558
Bit bucket Enterprise Hybrid Drives: Who Manages the Flash? NetworkComputing 11/13/2014 1559
Management 8 Lessons from Rosetta Comet Mission InformationWeek 11/13/2014 1559
Cloud Heating Your House with Cloud Computing InformationWeek 11/13/2014 1559
Security The Enemy Who is Us: DoD Puts Contractors on Notice for Insider Threats Dark Reading 11/13/2014 1559
Bit bucket Holiday Gift Guide 2014: 25 Gadgets that Make Great Gifts CRN 11/13/2014 1559
Data Room to Grow: Tips for Data Center Capacity Planning ComputerWorld 11/13/2014 1559
Bit bucket Taking Aim at Passwords Bank Systems & Technology 11/13/2014 1559
Cloud Enterprise Exposure to Cloud Apps Rises, Security Controls Spread Thin Wall Street & Technology 11/12/2014 1560
Bit bucket A Guide to the Top Mobile Payments Options Network World 11/12/2014 1560
Storage Are Converged Systems Right for You? NetworkComputing 11/12/2014 1560
Management What Software Project Managers can Learn from NASA IT World 11/12/2014 1560
Security What Happens When Enterprises Promote Employees with Low Security Iqs? CSO Online 11/12/2014 1560
Bit bucket Control over Personal Info Nearly Dead ComputerWorld 11/12/2014 1560
Data What CIOs Can Learn from the Biggest Data Breaches CIO 11/12/2014 1560
Bit bucket 'Twisted Light' Beamed across Vienna BBC 11/12/2014 1560
Cloud 2014: The Year the Cloud Killed the Datacenter ZDnet 11/11/2014 1561
Bit bucket Understanding IPv6: Solicited-Node Multicast in Action NetworkComputing 11/11/2014 1561
Compliance IT Compliance Strategies for Mainframe Applications NetworkComputing 11/11/2014 1561
Bit bucket Only 47% of IT Pros Are Confident in their Hardware Configurations HelpNet Security 11/11/2014 1561
Bit bucket Vigilance and the Enterprise of Things HelpNet Security 11/11/2014 1561
Bit bucket Vigilance and the Enterprise of Things (EoT) HelpNet Security 11/11/2014 1561
Compliance 9 Tips for Maintaining PCI Compliance IT World Canada 11/11/2014 1561
Cloud You Should Listen to that Annoying Cloud Skeptic InfoWorld 11/11/2014 1561
Bit bucket 10 Smart Tech Toys for Kids InformationWeek 11/11/2014 1561
Cloud Salvation Army Finds Refuge, Recovery In The Cloud InformationWeek 11/11/2014 1561
Bit bucket Are Fingerprints Pins or Physical Artifacts? CSO Online 11/11/2014 1561
Bit bucket Seagate Preps for 30TB Laser-Assisted Hard Drives ComputerWorld 11/11/2014 1561
Technology Robotic Spiders May Someday Build Satellites in Space ComputerWorld 11/11/2014 1561
Bit bucket Military Vets Excel in IT, Companies Find ComputerWorld 11/11/2014 1561
Compliance Software-Defined Storage: A Reality Check NetworkComputing 11/10/2014 1562
Connectivity Internet of Things to Reach 30 Billion Devices in 2020 HelpNet Security 11/10/2014 1562
Bit bucket A Holistic Approach to Protecting Intellectual Property HelpNet Security 11/10/2014 1562
Security Aligning Risk Analysis and IT Security Spending HelpNet Security 11/10/2014 1562
Security Data Breaches: 8 Tips for Board-Level Discussions InformationWeek 11/10/2014 1562
Data Big Data Survey: Trouble Brewing for IT InformationWeek 11/10/2014 1562
Bit bucket Enter the Digital Risk Officer (DRO) Dark Reading 11/10/2014 1562
Security How I Became a CISO: Jennings Aske, Nuance Communications Dark Reading 11/10/2014 1562
Data Build vs. Buy: What's the Best Solution for My App Analytics? Business 2 Community 11/09/2014 1563
Storage Why Solid-State Disks are Winning The Argument The Register 11/07/2014 1565
Connectivity Proactive Network Management: The Basics NetworkComputing 11/07/2014 1565
Storage Converged Ethernet vs. More Links NetworkComputing 11/07/2014 1565
Data Overcoming Big Data security obstacles HelpNet Security 11/07/2014 1565
Bit bucket IT Talent Shortage: Ugly Truths InformationWeek 11/07/2014 1565
Bit bucket Leveraging Three Tiers of Health Data Information Management 11/07/2014 1565
Connectivity Where do Big Data, Internet of Things Intersect? Information Management 11/07/2014 1565
Cloud 3 IT Practices that Add Risk to Cloud Dark Reading 11/07/2014 1565
Management Answer These 3 Questions If You Want to Get Your Security Projects Funded CSO Online 11/07/2014 1565
Bit bucket Scientists Connect Two Human Brains at Different Locations Business 2 Community 11/07/2014 1565
Bit bucket Flash Memory: Blurring the Line Between SLC and MLC NetworkComputing 11/06/2014 1566
Data Big Data: A Backup Nightmare? NetworkComputing 11/06/2014 1566
Management 4 Pillars of Successful Enterprise Mobility Strategy InformationWeek 11/06/2014 1566
Bit bucket IT Hiring Process: 8 Survival Tips InformationWeek 11/06/2014 1566
Security From Malware to Breach Dark Reading 11/06/2014 1566
Technology 12 Surprising Ways Personal Technology Betrays your Privacy CSO Online 11/06/2014 1566
Security The Bash Security Flaw: Why Everyone should Take Notice Business 2 Community 11/06/2014 1566
Cloud Midsize Businesses Have Most to Lose in the Cloud Business 2 Community 11/06/2014 1566
Connectivity The Internet of Things: 7 Scary Security Scenarios TechOnline India 11/05/2014 1567
Bit bucket Differentiating Between BC and DR Storage Newsletter 11/05/2014 1567
Management Email and Stress in the Workplace Risk Management Monitor 11/05/2014 1567
Connectivity The Internet of Fishy Things Network World 11/05/2014 1567
Bit bucket Experts: Don't Use Apple Pay, CurrentC Until Crooks Get a Shot at Them IT World 11/05/2014 1567
Bit bucket The Principal's Doug Fick: A Customer Advocate Insurance & Technology 11/05/2014 1567
Cloud MBaaS Shoot-Out: 5 Clouds for Building Mobile Apps InfoWorld 11/05/2014 1567
Management CDOs Replace CIOs? I'm Not Buying It InformationWeek 11/05/2014 1567
Bit bucket The Best Secure Messaging Apps that Protect You from Surveillance ComputerWorld 11/05/2014 1567
Bit bucket Having Great Talent does not Always Guarantee Great Results TLNT 11/04/2014 1568
Cloud Make or Break Your Cloud Migration NetworkComputing 11/04/2014 1568
Technology You're Sending too Much Email InformationWeek 11/04/2014 1568
Security Popular Messaging Apps Fail EFF's Security Review ComputerWorld 11/04/2014 1568
Management The MSP Myth That is Holding Your Business Back Business 2 Community 11/04/2014 1568
Bit bucket NLRB Revisits the Definition of an Independent Contractor TLNT 11/03/2014 1569
Technology 10 Talented Robot Arms & Hands TechOnline India 11/03/2014 1569
Security 6 Things We Learned from this Year's Security Breaches Network World 11/03/2014 1569
Management 8 Strategies to Fund Your New Business Network World 11/03/2014 1569
Bit bucket Trouble is Brewing in Mobile Payments InfoWorld 11/03/2014 1569
Administration 9 Cutting-Edge Programming Languages Worth Learning Now InfoWorld 11/03/2014 1569
Cloud IT Is Losing the Battle on Security In the Cloud InformationWeek 11/03/2014 1569
Bit bucket 8 Scariest Comments Your Boss can Make InformationWeek 11/03/2014 1569
Bit bucket 9 IT Job Hunt Tips for Beginners InformationWeek 11/03/2014 1569
Technology Preparing for a Quantum Leap in Transportation Technology Government Technology 11/03/2014 1569
Data The View from a High-Value Data Breach Target Dark Reading 11/03/2014 1569
Data Preparing for a Data Breach: Think 'Stop, Drop & Roll' Dark Reading 11/03/2014 1569
Cloud Live Data Used to Highlight Cloud-Based Risks CSO Online 11/03/2014 1569
Management A CIO Fights to Keep His Tech Options Open ComputerWorld 11/03/2014 1569
Bit bucket Researchers Push 255 Tbps over Multi-Core Fiber Cabling Installation & Maintenance 11/03/2014 1569
Bit bucket 6 Ways to Attract and Retain Female IT Talent Network World 10/31/2014 1572
Security Why IoT Security & Privacy Are Critical NetworkComputing 10/31/2014 1572
Connectivity Not Reading your Wireless Bill Could Cost You IT World 10/31/2014 1572
Cloud SSD Storage is the Future of the Cloud InfoWorld 10/31/2014 1572
Technology Selective Wipe: The Secret to Getting Users to Report Lost Mobile Devices InfoWorld 10/31/2014 1572
Management 69% of IT decision makers feel their CEOs do not take security seriously: Study InformationWeek 10/31/2014 1572
Technology Has Email Peaked? InformationWeek 10/31/2014 1572
Security Your 2015 IT Security Plan: What You Need to Know Information Management 10/31/2014 1572
Management Number of New IT Outsourcing Deals Hits All-Time High CIO 10/31/2014 1572
Data Gartner: Analytics is Top Business Priority Information Management 10/30/2014 1573
Data Defining Data Scientists & Their Tools Information Management 10/30/2014 1573
Management Hurricane Fails to Stir Bacardi's Business Continuity Plan CSO Online 10/30/2014 1573
Data How to Figure Out if a Data Breach Is a Hoax NetworkComputing 10/29/2014 1574
Technology Horrible Social Media Misfires Network World 10/29/2014 1574
Management 6 Ways to Maximize Your IT Training Budget Network World 10/29/2014 1574
Security Some IT Pros Still Turn Off Security Features for Performance: McAfee IT World Canada 10/29/2014 1574
Bit bucket IT investments: 5 common mistakes InformationWeek 10/29/2014 1574
Data Keep Calm & Verify: How to Spot a Fake Online Data Dump Dark Reading 10/29/2014 1574
Connectivity Verizon Bans Domestic Surveillance and Net Neutrality Articles from Tech News Site ComputerWorld 10/29/2014 1574
Data What's Lurking in Your Virtualized Data Center Storage Newsletter 10/28/2014 1575
Compliance Nanotechnology to Create Next-Gen Holograms for Storage Storage Newsletter 10/28/2014 1575
Storage Technique for HAMR Media Promises Improved Writeability for Next-Gen HDDs Storage Newsletter 10/28/2014 1575
Bit bucket When are You Coming Home? Five Practical Tips to Realizing Work/Life Balance Project Management Advisor 10/28/2014 1575
Bit bucket Getting Chipped: Why I Will Live with an NFC Chip Implant for a Year Network World 10/28/2014 1575
Bit bucket 6 Ways to Stop Criminal Attackers in their Tracks Network World 10/28/2014 1575
Bit bucket When it Comes to Mobile, IT Is Out of Touch Network World 10/28/2014 1575
Bit bucket WAN Challenges Demand an SDN Upgrade NetworkComputing 10/28/2014 1575
Bit bucket Mobile Dev Divide Could be Red Flag for IT InfoWorld 10/28/2014 1575
Security The Big One: The Makings of a Global Cyber Attack InfoWorld 10/28/2014 1575
Data Most Businesses Do Not Understand Risks of Data Breaches, Study Finds ComputerWeekly 10/28/2014 1575
Cloud Did You Believe In Any of These Cloud Computing Myths? ComputerWeekly 10/28/2014 1575
Bit bucket Hiring Just for Skills Can Be a Big Mistake TLNT 10/27/2014 1576
Data What to Look for In a Data Center Backup Generator TechRepublic 10/27/2014 1576
Bit bucket Five Things You Need to Know Before Building an IBM Watson App TechRepublic 10/27/2014 1576
Bit bucket 255 Terabits a Second: New Fiber Speed Record? Network World 10/27/2014 1576
Bit bucket Will RDMA over Ethernet Eclipse Infiniband? NetworkComputing 10/27/2014 1576
Data For Big Raises in IT, Look To Mobile, Security, Big Data IT World 10/27/2014 1576
Bit bucket 10 Outlandish Resume Lies that Can Kill Your Job Chances IT World 10/27/2014 1576
Data Big Data Wars: How Technology Could Tip the Mid-Term Elections IT World 10/27/2014 1576
Management Gartner's Top 10 Strategic Tech Trends for 2015 Insurance Networking 10/27/2014 1576
Bit bucket So You Plan to Buy a Core System ... Now What? Insurance Networking 10/27/2014 1576
Bit bucket IT Contracting: 5 Tips For Success InformationWeek 10/27/2014 1576
Technology 8 Robots Making Waves InformationWeek 10/27/2014 1576
Technology A Simple Formula for Usable Risk Intelligence Dark Reading 10/27/2014 1576
Security How I Became a CISO: Janet Levesque, RSA Dark Reading 10/27/2014 1576
Administration Shellshock Attacks Mail Servers ZDnet 10/27/2014 1576
Management 7 Mobile Marketing Stats Every Local Business Should Know Business 2 Community 10/26/2014 1577
Cloud Moving to a Cloud: What Workloads Should I Move to a Cloud Environment? Business 2 Community 10/26/2014 1577
Bit bucket Top 10 IT Skills Based on Increases in Demand InfoWorld 10/25/2014 1578
Administration Disaster as CryptoWall Encrypts US Firm's Entire Server Installation Network World 10/24/2014 1579
Data Beware the Electro-Magnetic Data Center Threat NetworkComputing 10/24/2014 1579
Cloud The Management Gap Between You and Cloud Apps NetworkComputing 10/24/2014 1579
Cloud 100 Million Cloud File Analysis Reveals Shadow Data Threat HelpNet Security 10/24/2014 1579
Cloud 100 Million Cloud File ANALYSIS reveals Shadow Data Threat HelpNet Security 10/24/2014 1579
Technology 40% of Enterprise Employees Use Personal Devices for Work HelpNet Security 10/24/2014 1579
Bit bucket The Top 10 Keyboard Shortcuts in Word and Excel That Help You Work Faster IT World 10/24/2014 1579
Connectivity Neural Networks Draw on Context to Improve Machine Translations IT World 10/24/2014 1579
Bit bucket IT Certifications: Discover Where the Value Lies IT World 10/24/2014 1579
Security Clueless FBI Sabotages its Own Anti-Encryption Campaign InfoWorld 10/24/2014 1579
Cloud It's Pointless to Define Cloud Computing InfoWorld 10/24/2014 1579
Management Why CIOs Should Be More Involved in Acquisitions InformationWeek 10/24/2014 1579
Bit bucket It's the End of Innovation as We Know It Information Management 10/24/2014 1579
Data Big Data Digest: Rise of the Think-Bots ComputerWorld 10/24/2014 1579
Bit bucket Do It Right the First Time: The IT Infrastructure Mistake You Can't Afford to Make Business 2 Community 10/24/2014 1579
Data Learnings from the Hollywood Data Leaks Business 2 Community 10/24/2014 1579
Data Making Rewards Count: Turning Data into Profit Bank Systems & Technology 10/24/2014 1579
Data There's a Lot More to Backup Than You Thought The Register 10/23/2014 1580
Data Why You Keep Failing at Big Data (Hint... It's Your Vendors' Fault) TechRepublic 10/23/2014 1580
Cloud NIST Spotlights Five Actors in the Cloud TechRepublic 10/23/2014 1580
Security Insider Threats Still Pose Major Problems for Enterprises TechRepublic 10/23/2014 1580
Bit bucket DNS is Ubiquitous And It's Easily Abused to Halt Service Or Steal Data Network World 10/23/2014 1580
Bit bucket SDN Education: 9 Ways to Learn NetworkComputing 10/23/2014 1580
Security Security Pros Forgetting the Basics, Complains Expert IT World Canada 10/23/2014 1580
Management Why BI Projects Fail -- And How to Succeed Instead InfoWorld 10/23/2014 1580
Management Succession Planning: Why IT Leaders Should Groom their Replacements Government Technology 10/23/2014 1580
Cloud Snead: NSA Revelations Have Chilling Effect on Cloud Growth in U.S. Data Center Knowledge 10/23/2014 1580
Security 10 Things IT Probably Doesn't Know about Cyber Insurance Dark Reading 10/23/2014 1580
Data 8 Big Trends in Big Data Analytics ComputerWorld 10/23/2014 1580
Bit bucket Hidden Camera Fingerprints Link Photos to Individuals ZDnet 10/22/2014 1581
Management Business Travel Risks Risk Management Monitor 10/22/2014 1581
Connectivity Need to Improve Your Network Security? Try Studying Fungus IT World 10/22/2014 1581
Bit bucket We Didn't Nuke Your Files; We, er, Mislaid Them InfoWorld 10/22/2014 1581
Security Why Outlawing Encryption is Wrong InformationWeek 10/22/2014 1581
Data Analytics for the Rest Of Us ComputerWorld 10/22/2014 1581
Bit bucket IPv6 Picks up Steam ZDnet 10/21/2014 1582
Cloud Cloud Security: Think You're Blocking Staff Access to Certain Sites? Think Again ZDnet 10/21/2014 1582
Data Chief Data Officers: Organization Strategy & Cultural Change Wall Street & Technology 10/21/2014 1582
Connectivity NFV can Avoid Buying Network Bulk NetworkComputing 10/21/2014 1582
Bit bucket Think Before You Share that File HelpNet Security 10/21/2014 1582
Security 5 Non-Traditional Hiring Tips for InfoSec IT World 10/21/2014 1582
Technology Skip the Hub; Your Mobile Device is Your IoT Gateway InfoWorld 10/21/2014 1582
Cloud 7 Questions to Ask When Delivering Cloud Apps InformationWeek 10/21/2014 1582
Data Survey: Big Data Delivers the Goods Information Management 10/21/2014 1582
Connectivity What Does the FCC's Authority on Net Neutrality Really Mean? Government Technology 10/21/2014 1582
Bit bucket Six Scary IT Certification Exams Global Knowledge 10/21/2014 1582
Bit bucket World's First 3D Full-Body Scanning Booth to Create Custom You Figurines ComputerWorld 10/21/2014 1582
Bit bucket Keep Calm and Plug the Holes ComputerWorld 10/21/2014 1582
Management 11 Ways to Re-Energize Your IT Career ComputerWorld 10/21/2014 1582
Compliance Researcher Creates Proof-of-Concept Worm for Network-Attached Storage Devices Network World 10/20/2014 1583
Security FBI Again Claims it's Going Dark Thanks to Encryption Network World 10/20/2014 1583
Management Learning Lessons Through Security Struggles NetworkComputing 10/20/2014 1583
Cloud Building Cloud Computing Skills NetworkComputing 10/20/2014 1583
Bit bucket Peering Into the Future Of IT IT World Canada 10/20/2014 1583
Bit bucket Is your Ethernet fast enough? Four new speeds are in the works InfoWorld 10/20/2014 1583
Bit bucket You Break It, You Build It -- Better than Before InfoWorld 10/20/2014 1583
Cloud Cloud ROI: 6 Takeaways to Consider InformationWeek 10/20/2014 1583
Connectivity Internet of Things Will Turn Networks Inside-Out InformationWeek 10/20/2014 1583
Bit bucket From Her to Watson, and What's Next? Information Management 10/20/2014 1583
Data Chief Data Officers Battle Complexity, Complacency: Wells' Thomas Information Management 10/20/2014 1583
Bit bucket FBI Facial Recognition System Gives Officers an Investigative Lead Government Technology 10/20/2014 1583
Security Why You Shouldn't Count on General Liability to Cover Cyber Risk Dark Reading 10/20/2014 1583
Security Insider Threats: Breaching the Human Barrier Dark Reading 10/20/2014 1583
Security 14 of the Scariest Things Hacked CSO Online 10/20/2014 1583
Bit bucket Can a Phone Replace Your Wallet? cnet 10/20/2014 1583
Bit bucket Envious of Fiber Broadband? Help Is On the Way for Copper Users Network World 10/17/2014 1586
Bit bucket MasterCard Demos a Prototype Contactless Card with a Fingerprint Sensor Network World 10/17/2014 1586
Bit bucket SDN Limitations NetworkComputing 10/17/2014 1586
Cloud You Can Rise with Public Clouds or Sink With Private InfoWorld 10/17/2014 1586
Management 3 Common & Costly CIO Mistakes InformationWeek 10/17/2014 1586
Bit bucket IT Is Slow? Not Our Fault InformationWeek 10/17/2014 1586
Technology Company Reputations at Risk as Social Media Revolutionizes Breaking News Continuity Central 10/17/2014 1586
Data Why Data Centers can be Massive, But Not Gigantic ComputerWorld 10/17/2014 1586
Cloud IT Customers Win Big in the Cloud Pricing Wars TechRepublic 10/16/2014 1587
Security Ransomware Threats a Concern Risk Management Monitor 10/16/2014 1587
Bit bucket Life as an IT Contractor Network World 10/16/2014 1587
Cloud Cloud-Based Disaster Recovery: Choose Wisely NetworkComputing 10/16/2014 1587
Bit bucket White-Box Switches: Beware Of Hidden Costs NetworkComputing 10/16/2014 1587
Bit bucket 12 Things I Hate about Hadoop InfoWorld 10/16/2014 1587
Bit bucket 11 Feature-Rich Keyboard Replacements for Android and iOS InfoWorld 10/16/2014 1587