IT Weekly

NEWSLETTER

Dec 11, 2018


Every week we bring you more than 40+ relevant online sources that contain articles of interest to IT and DC Professionals at all levels
Header


Browse by Technology
Browse by Year

Header

Header

Header
Category Articles From 2015 Source Posted Date Age
Bit bucket 6 Signs Containers Will Gain Ground in 2016 InfoWorld 12/31/2015 1076
Management Top Priorities for State CIOs: 2016 InformationWeek 12/31/2015 1076
Security Micro-Segmentation: Split and Smear Security NetworkComputing 12/30/2015 1077
Cloud 6 Changes to Expect in Data Security, Cloud and Mobile Tech Insurance Networking 12/30/2015 1077
Cloud When You Wish Upon a Cloud: 3 Cloud Hopes for 2015 InfoWorld 12/30/2015 1077
Data 5 Essential Steps for Increasing Data Security With IaaS Information Management 12/30/2015 1077
Management There's an 'Invisible' Trait That Makes Leaders More Effective - Here's How to Develop It Business Insider 12/30/2015 1077
Compliance 3 Compliance Trends Community Banks Should Watch in 2015 Bank Systems & Technology 12/30/2015 1077
Management 10 Outsourcing Trends to Watch In 2016 Network World 12/29/2015 1078
Cloud 3 Cloud Resolutions for 2016 InfoWorld 12/29/2015 1078
Bit bucket 2015: The Year Mobile become Boring InfoWorld 12/29/2015 1078
Cloud Cloud, Data Security Remain Top Concerns Heading into 2016 Information Management 12/29/2015 1078
Bit bucket Getting Surveys to Say Most Anything You Want Information Management 12/29/2015 1078
Data Why So Many Organizations Struggle with Data Management Insurance Networking 12/28/2015 1079
Data 10 Big Data Predictions for 2016 Revisited Information Management 12/26/2015 1081
Data 15 Chief Data Officer Job Requirements Information Management 12/26/2015 1081
Compliance 2015: The Year Storage Was Rocked to Its Foundations The Register 12/25/2015 1082
Bit bucket Firms Must Ensure Shared Service Suppliers have 'Sufficient Financial Resources' The Register 12/24/2015 1083
Technology Weird Science: 10 Strange Tech Stories from 2015 InfoWorld 12/24/2015 1083
Management How to Justify Your Cybersecurity Budget by Calculating ROI Information Management 12/24/2015 1083
Connectivity How to Find Any Device's IP Address, MAC Address, and Other Network Connection Details How To Geek 12/24/2015 1083
Security Information Security -- Don't Let the Apparent Complexity Intimidate You ComputerWorld 12/24/2015 1083
Connectivity Wi-Fi's Whipping Boy Complex Network World 12/23/2015 1084
Bit bucket Work in Finance or Accounting? Watch Out for 'Whaling' Attacks Network World 12/23/2015 1084
Bit bucket Tech Predictions for 2016: What I Expect to Happen, and What I Hope Will Happen Network World 12/23/2015 1084
Bit bucket Technical Debt: Hot to Assess It and Manage It Network World 12/23/2015 1084
Cloud Three Ways To Use the Cloud to Regain Control Over Network Endpoints Network World 12/23/2015 1084
Bit bucket He Sees You When You're Sleeping and When You're Awake Via Unsecured IP Cameras Network World 12/23/2015 1084
Connectivity 2016 Prediction: Businesses Begin to Abandon Social Networking Network World 12/23/2015 1084
Cloud Netsuite CEO: The Cloud Is the Last Computing Architecture IT World 12/23/2015 1084
Data Using Advanced Analytics to Sniff Out Spoofing Information Management 12/23/2015 1084
Data Backup with Brains: The Growing Importance of Analytics for Business Resiliency ComputerWorld 12/23/2015 1084
Connectivity Software Defined Networks - Ready and Waiting to Transform the Future of Networking Business 2 Community 12/23/2015 1084
Technology How the Robot Revolution is Going to Change How We See, Feel, and Talk TechRepublic 12/22/2015 1085
Bit bucket What We Learned About 5G in 2015 Network World 12/22/2015 1085
Compliance Storage Considerations When You're Virtualizing the Last 20% of Your Systems Network World 12/22/2015 1085
Security Can Collaborative Security Work? Network World 12/22/2015 1085
Management Interview Questions To Throw You Off Guard Network World 12/22/2015 1085
Management 3 Tips for Successful 'Stay' Interviews Network World 12/22/2015 1085
Bit bucket HTTP Error Code 451 will Signal Online Censorship HelpNet Security 12/22/2015 1085
Security 5 Information Security Trends that Will Dominate 2016 Network World 12/21/2015 1086
Connectivity Battle Over LTE in Wi-Fi Bands May Soon be Resolved Network World 12/21/2015 1086
Connectivity Network World's 20 Best Products of 2015 Network World 12/21/2015 1086
Administration Cloud, Virtualization Take Toll on Data Centers InfoWorld 12/21/2015 1086
Data Structuring Your Data Team: 9 Best Practices InformationWeek 12/21/2015 1086
Bit bucket 5 Conversation Habits of Charismatic People Fast Company 12/21/2015 1086
Data Getting to the True Data Center Cost Data Center Knowledge 12/21/2015 1086
Data The 10 Biggest Data Breaches of 2015 CRN 12/21/2015 1086
Management Ten Steps to a Great Business Continuity Exercise Continuity Central 12/21/2015 1086
Bit bucket Be Brief: Don't Get Lost In the Weeds with Tech Debriefings TechRepublic 12/18/2015 1089
Security Should You buy Cyber Insurance? Network World 12/18/2015 1089
Management The 10 Most Important Lessons IT Learned in 2015 TechRepublic 12/17/2015 1090
Cloud Public Cloud vs. On-Premises, Which is More Secure? Network World 12/17/2015 1090
Security Creating a Cybersecurity Center of Excellence Network World 12/17/2015 1090
Bit bucket The Weirdest, Wackiest and Coolest Sci/Tech Stories of 2015 Network World 12/17/2015 1090
Bit bucket 10 'Star Wars' Technologies that Are Almost Here InfoWorld 12/17/2015 1090
Bit bucket The 4 Big Things I Learned from the Worst Boss I Ever Had TLNT 12/17/2015 1090
Bit bucket The State of IT for 2016 Business 2 Community 12/17/2015 1090
Management 13 Best Free Project Management Software Programs 2016 TechWorld 12/16/2015 1091
Cloud Rain Clouds Ahead: 10 Bold Predictions for the Cloud Industry In 2016 Network World 12/16/2015 1091
Connectivity 5 Fundamental Requirements for High-Performing Networks NetworkComputing 12/16/2015 1091
Cloud How Green is Your Cloud? InfoWorld 12/16/2015 1091
Data 10 Data Security Trends That Will Impact You in 2016 Information Management 12/16/2015 1091
Bit bucket How To Be the Person Who Never Misses a Deadline Fast Company 12/16/2015 1091
Management 5 Reasons that Most Leaders Fail as Communicators TLNT 12/16/2015 1091
Security Top 15 Security Predictions for 2016 CSO Online 12/16/2015 1091
Technology 10 Technology Driven hard Trends Shaping 2016 Business 2 Community 12/16/2015 1091
Bit bucket Hybrid Prevailing Over All-Flash Arrays Storage Newsletter 12/15/2015 1092
Bit bucket 2015's Top Tech Pictures from Reuters Network World 12/15/2015 1092
Security Rackspace CSO on Security: It's Time to Go Back to the Fundamentals HelpNet Security 12/15/2015 1092
Security Data Breaches will Affect 1.5 Billion People by 2020 InfoWorld 12/15/2015 1092
Security Why Identity Is the New Security InfoWorld 12/15/2015 1092
Cloud 3 Key Cloud Trends for 2016 InfoWorld 12/15/2015 1092
Administration Data Virtualization: The Missing Link In the Devops Tool Chain InfoWorld 12/15/2015 1092
Bit bucket Advice From Former Apple and LinkedIn Employees on Landing Your Dream Job Fast Company 12/15/2015 1092
Bit bucket How to Make Every Single Meeting You Attend Useful Fast Company 12/15/2015 1092
Bit bucket The End of Passwords? Dark Reading 12/15/2015 1092
Security The CISO's New Best Friend & New Boss Dark Reading 12/15/2015 1092
Security What Security Pros Want for the New Year CSO Online 12/15/2015 1092
Security 2016 Cyber Security Predictions Continuity Central 12/15/2015 1092
Technology Quantum Computing May Be Moving Out of Science Fiction ComputerWorld 12/15/2015 1092
Management How CIOs Should Evaluate Startups - Tips from Four IT Leaders CIO 12/15/2015 1092
Bit bucket What's Ahead for SDN in 2016 NetworkComputing 12/14/2015 1093
Bit bucket MPLS Guide: What Enterprise Architects Need to Know NetworkComputing 12/14/2015 1093
Cloud The Mega-Clouds Are Coming for Your Data Center InfoWorld 12/14/2015 1093
Security Maximum Security: Essential Tools for Everyday Encryption InfoWorld 12/14/2015 1093
Data 14 Ways IoT Will Change Big Data and Business Forever InformationWeek 12/14/2015 1093
Security 5 Security Tips for 2016 That Could Save Your Job Information Management 12/14/2015 1093
Data Predictive Analytics Requires a Customer-Obsessed Innovation Culture Information Management 12/14/2015 1093
Bit bucket 6 Creativity Habits for People Who Think They're not Creative Fast Company 12/14/2015 1093
Bit bucket The Four Trends That Will Change the Way We Work by 2021 Fast Company 12/14/2015 1093
Bit bucket 10 Things YOU Do that Sabotage Successful Change TLNT 12/14/2015 1093
Bit bucket 6 Sneak Peeks that Give You a Taste of What CES Will Be All About ComputerWorld 12/14/2015 1093
Technology Social Media Addiction is a Bigger Problem Than You Think ComputerWorld 12/14/2015 1093
Management Signs a Project Manager Should Be Worried About Outsourcing Business 2 Community 12/14/2015 1093
Compliance Ghosts of Tech Past: Photos of Data Storage from the 1950s - 1980s TechRepublic 12/13/2015 1094
Cloud Successfully Staffing the Cloud Government Technology 12/13/2015 1094
Management How Do You Use Data? 1,500 Business Professionals Weigh In Business 2 Community 12/13/2015 1094
Bit bucket 10 Hot IT Job Skills for 2016 InfoWorld 12/11/2015 1096
Data 5 Trends that Will Drive Big Data in 2016 Information Management 12/11/2015 1096
Management 4 Career Mistakes You Should Make in Your 20s Fast Company 12/11/2015 1096
Technology Those Devices Hidden in Your Closet CAN Hurt You ComputerWorld 12/11/2015 1096
Management The Right Way to Reorg: 4 Tips for Avoiding Reorganizational Purgatory TechRepublic 12/10/2015 1097
Security Companies Scramble to Fix Lack of Encryption On Mobile Apps InfoWorld 12/10/2015 1097
Management The Lizard Squad: Cyber Weapon or Business? Dark Reading 12/10/2015 1097
Data Move Over CISO: The Chief Data Officer May be Sharing Part of Your Job ComputerWorld 12/10/2015 1097
Cloud How Goldman Sachs and Bank of America Use the Cloud And Containers Network World 12/09/2015 1098
Data Data Analytics Is the New Black InfoWorld 12/04/2015 1103
Compliance The 10 Coolest Storage Startups of 2015 CRN 12/04/2015 1103
Administration The Future of Virtualization: Don't Forget the So-Called 'Old' Network World 12/03/2015 1104
Connectivity 7 WiFi Killers that May Surprise You NetworkComputing 12/03/2015 1104
Storage Consumer SSDs and Hard Drive Prices are Nearing Parity Network World 12/02/2015 1105
Technology Quantum Dots Could Bridge Gap Between Electronic and Quantum Computers Network World 12/02/2015 1105
Management "The Little Things" That the Best Leaders Make Sure They Do TLNT 12/02/2015 1105
Bit bucket Forecast 2016: 5 Disruptors to Keep on Your Radar ComputerWorld 12/02/2015 1105
Bit bucket Energy Hybrid: Battery Meets Super Capacitor Science Daily 12/01/2015 1106
Bit bucket 13 Things Mentally Strong People don't Do Success 12/01/2015 1106
Management How CIOs can Ensure M&A Projects Pay Off Network World 12/01/2015 1106
Security Why You Should Lawyer Up Before a Cyberattack Network World 12/01/2015 1106
Bit bucket 4 Do's and Don'ts for Safer Holiday Computing InfoWorld 12/01/2015 1106
Bit bucket Is Your IT Infrastructure Ready for ECM Software? Business 2 Community 12/01/2015 1106
Data FBI Can Demand Web History, Phone Location Data Without a Warrant ZDnet 11/30/2015 1107
Bit bucket The Hidden Pitfalls of Going Freelance In IT InfoWorld 11/30/2015 1107
Security What is Encryption, and Why Are People Afraid of It? How To Geek 11/30/2015 1107
Bit bucket Dear Politicians, You Cannot Create a One-Way Panopticon ZDnet 11/29/2015 1108
Security 2016: A Systems Security Disaster Network World 11/29/2015 1108
Bit bucket Buy Now Or Wait? The Tech Products That Will Likely Drop In Price Business 2 Community 11/28/2015 1109
Data Cyberwar Part 3: Marketing Data Collection Threatens All InformationWeek 11/27/2015 1110
Cloud Can You Trust Your Cloud Vendor's Employees? InformationWeek 11/27/2015 1110
Bit bucket Data, Lawyers, and IT: How They're Connected InformationWeek 11/27/2015 1110
Data Big Data & the Law of Diminishing Returns InformationWeek 11/27/2015 1110
Management Four Ways an Attacker Can Infiltrate an Organization by Diverting Security Solutions HelpNet Security 11/26/2015 1111
Bit bucket 2015 Geek Gadget Gift Guide InfoWorld 11/26/2015 1111
Security Cyberwar Part 2: Government Hacks Threaten Private Sector InformationWeek 11/26/2015 1111
Data 8 Ways You're Failing at Data Science InformationWeek 11/26/2015 1111
Bit bucket Scientists Single Out Individual Photons from a Pulse Of Light Science Daily 11/25/2015 1112
Bit bucket 8 Technologies We're Thankful For InformationWeek 11/25/2015 1112
Security Cyberwar Part 1: What IT Can Do to Survive InformationWeek 11/25/2015 1112
Management Prediction Will Replace Prevention as Top Security Strategy Information Management 11/25/2015 1112
Security How Lockheed Martin, Cisco and PWC Manage Cybersecurity Network World 11/24/2015 1113
Cloud 3 Types of Private Clouds: Which One's Right for You? Network World 11/24/2015 1113
Connectivity 8 Enterprise WiFi Shortcomings NetworkComputing 11/24/2015 1113
Connectivity 5 Tips for Using Public Wi-Fi Securely InfoWorld 11/24/2015 1113
Data The Role of KPIs in Managing Big Data Information Management 11/24/2015 1113
Data 5 Data Trends that Will Impact You in 2016 Information Management 11/24/2015 1113
Bit bucket Information of Everything' Among Top Tech Trends for 2016 Information Management 11/24/2015 1113
Management How to Deal with Jerks In the Workplace Fast Company 11/24/2015 1113
Management A Few Lessons on Leadership We Can Take from Ronda Rousey's Surprise Knockout TLNT 11/24/2015 1113
Security Avoiding Security Issues When Recycling Hardware ComputerWeekly 11/24/2015 1113
Data Data Scientists and the Practice of Data Science Business 2 Community 11/24/2015 1113
Connectivity Want to Defend Your Network? Profile the Person Attacking It The Register 11/23/2015 1114
Security How Cyber Insurance Actually Works The Register 11/23/2015 1114
Bit bucket 10 Affordable Cities that Offer Good IT Jobs Network World 11/23/2015 1114
Connectivity The 12 Basic Truths of Networking Network World 11/23/2015 1114
Security Stop the Anti-Encryption Propaganda Now InfoWorld 11/23/2015 1114
Security IT Security's Greatest Fear: Fear Itself Information Management 11/23/2015 1114
Data People and Culture Critical to Top Analytics Success Information Management 11/23/2015 1114
Data Most Execs Fooling Themselves on Big Data Capabilities Information Management 11/23/2015 1114
Bit bucket To MDM or Not to MDM? That Is the Question... Information Management 11/23/2015 1114
Bit bucket 6 Steps to Make a Great Impression at Your New Job Fast Company 11/23/2015 1114
Bit bucket Why Companies should Embrace Intelligent Disobedience Fast Company 11/23/2015 1114
Data 5 Things You Need to Know About Legally Transferring Data Out of Europe ComputerWorld 11/23/2015 1114
Bit bucket Fight for Your Right to Repair ComputerWorld 11/23/2015 1114
Security Debate Over Encryption Rages on as More Terror Attacks Feared CIO Today 11/23/2015 1114
Bit bucket 5 Signs You're Mismanaging BYOD Business 2 Community 11/22/2015 1115
Bit bucket 5 IT Industry Predictions For 2016 From Forrester and IDC Network World 11/20/2015 1117
Security The 'Need' to Control Encryption and The Big Lie Network World 11/20/2015 1117
Security Encryption is Not the Enemy InfoWorld 11/20/2015 1117
Cloud No, Containers Are Not the Future of the Cloud InfoWorld 11/20/2015 1117
Management What Security Leaders Need to Know about Breach Communication CSO Online 11/20/2015 1117
Cloud 6 Storage Solutions for Cloud-Based Archiving CRN 11/20/2015 1117
Management How 4 Organizations Connect Veterans to IT Jobs Network World 11/19/2015 1118
Bit bucket Eight More Years of Leap-Second Problems Loom as Governments Punt Decision to 2023 Network World 11/19/2015 1118
Data The Worst Data Disasters from 2015 HelpNet Security 11/19/2015 1118
Data Mobile Users Continue to Put Personal and Corporate Data At Risk HelpNet Security 11/19/2015 1118
Data Understanding a New Security Market: User Behavior Analytics HelpNet Security 11/19/2015 1118
Bit bucket Having Fun with HTTP Status Codes InfoWorld 11/19/2015 1118
Connectivity Tips from a Hacker to Improve Network Security Information Management 11/19/2015 1118
Data Mastering the Finer Points of Big Data Success Information Management 11/19/2015 1118
Management CISOs Learn 5 Tough Lessons about Conveying Security Risks CSO Online 11/19/2015 1118
Management 4 Things CEOs Can Learn from Project Teams CIO 11/19/2015 1118
Technology Facebook Building A 100-Gigabit Switch to Keep Up with Video, VR Traffic CIO 11/19/2015 1118
Management 6 Ways to Nail the Job Interview CIO 11/19/2015 1118
Cloud CIO Insight: Trainline CTO On Firm's Journey to the Cloud And Analytics Future v3 co uk 11/18/2015 1119
Security 10 Dumb Security Mistakes Sys Admins make Network World 11/18/2015 1119
Cloud How to Use SANless Clusters to Protect SQL In the Cloud Network World 11/18/2015 1119
Technology 5 Email Helpers You Need to Install Right Now Network World 11/18/2015 1119
Security Inside the Largely Unexplored World of Mainframe Security HelpNet Security 11/18/2015 1119
Security Insider Threats: 10 Ways to Protect Your Data InformationWeek 11/18/2015 1119
Data Want to Hire the Best and the Brightest? Use an Algorithm Information Management 11/18/2015 1119
Management Security and Privacy Need to be Core to IoT Design, Say Industry Leaders ComputerWeekly 11/18/2015 1119
Management Why the CIA Wanting Encryption Backdoors Is a Failure Of Leadership, Not Intelligence ZDnet 11/17/2015 1120
Bit bucket Five Apps for Benchmarking Your Hardware TechRepublic 11/17/2015 1120
Bit bucket Follow These 9 Steps to Ask for What You Want (and Actually Get It) Success 11/17/2015 1120
Data Managing The Data Deluge For National Security Analysts Science Daily 11/17/2015 1120
Bit bucket Cheaper, Higher Performing LEDs Science Daily 11/17/2015 1120
Management Organizations Sloppy about Securing Privileged Accounts Network World 11/17/2015 1120
Connectivity Network Security Primer: What is Access Control? Network World 11/17/2015 1120
Security Pros And Cons of Anonymous Waging a Hacking War on ISIS Network World 11/17/2015 1120
Security How to Deal With the Blind Spots In Your Security Created by SSL Encrypted Traffic Network World 11/17/2015 1120
Compliance The top 6 Governance, Risk and Compliance certifications Network World 11/17/2015 1120
Bit bucket 12 Travel-Friendly Tech Gifts You'll Want to Take With You Network World 11/17/2015 1120
Connectivity VLAN Implementation Guide: The Basics NetworkComputing 11/17/2015 1120
Data Why aren't Insurers Doing More with Their Data Strategy? Insurance Networking 11/17/2015 1120
Bit bucket 7 Keys to Better Risk Assessment InfoWorld 11/17/2015 1120
Security After Paris: Liberty Demands Unlimited Encryption InfoWorld 11/17/2015 1120
Bit bucket The Eyes Have It When It Comes to Biometric Accuracy Information Management 11/17/2015 1120
Data 2016 Predictions: All That Data Will Finally Drive Business Action Information Management 11/17/2015 1120
Cloud How Tesco Bank has Adopted AWS Cloud as 'Business as Usual' in Eight Months ComputerWorld UK 11/17/2015 1120
Bit bucket Three BYOD Scenarios that Require Remote Wipe Business 2 Community 11/17/2015 1120
Data Drop the Obsession with Big Data, Zero Days and Just... Help the Business The Register 11/16/2015 1121
Bit bucket Anonymous Just Might Make All the Difference In Attacking ISIS Network World 11/16/2015 1121
Bit bucket The 10 Mightiest Supercomputers In the World Network World 11/16/2015 1121
Management 9 Research Projects that Could Transform the Enterprise InfoWorld 11/16/2015 1121
Data Customer Analytics Key to Top 10 Critical Business Success Factors Information Management 11/16/2015 1121
Bit bucket How to Get People to Agree With You Fast Company 11/16/2015 1121
Security Security Issues Cause Some to be Named Top Tech Turkeys Of 2015 CSO Online 11/16/2015 1121
Cloud 15 Cool Cloud Companies and Their Even Cooler Products CRN 11/16/2015 1121
Bit bucket The Top 3d Printers According to Make Magazine ComputerWorld 11/16/2015 1121
Bit bucket How to Solve today's Top Three Virtual Environment Challenges Network World 11/13/2015 1124
Connectivity When It Comes to Enterprise Network Security, Less is More Network World 11/13/2015 1124
Connectivity Internet of Things: 5 Real-World Reasons It's not Going Away NetworkComputing 11/13/2015 1124
Security The Dark Side of Layered Security CSO Online 11/13/2015 1124
Bit bucket Apple History: First Photos of Vast Collection ZDnet 11/12/2015 1125
Cloud The Private Cloud Offers a Good Use Case for Object Storage The Register 11/12/2015 1125
Security Self-Encrypting Drives are Hardly Any Better than Software-Based Encryption Network World 11/12/2015 1125
Data 6 Ways Big Data is Driving Personalized Medicine Revolution InformationWeek 11/12/2015 1125
Connectivity Don't Bother: Why You don't Want to Wirelessly Charge Your Smartphone How To Geek 11/12/2015 1125
Security Six Reasons Why Boards of Directors Must Be Engaged in Cybersecurity CSO Online 11/12/2015 1125
Management Half of U.S. Businesses Have No Formal BYOD Policy for Security ComputerWorld 11/12/2015 1125
Management 4 Ways CIOs can Speak Better CFO CIO 11/12/2015 1125
Bit bucket Top 10 Priorities for a Successful Hadoop Implementation TechRepublic 11/11/2015 1126
Bit bucket 30-plus Eye-Popping Black Friday 2015 Tech Deals Network World 11/11/2015 1126
Cloud 11 Top IaaS Cloud Computing Certifications Network World 11/11/2015 1126
Management 10 Skills CIOs Need to Survive, Thrive In 2016 InformationWeek 11/11/2015 1126
Bit bucket Categorizing Numeric Variables -- a Cautionary Tale Information Management 11/11/2015 1126
Security 7 Tips to Becoming a Successful CISO CSO Online 11/11/2015 1126
Technology 6 Exciting Technology Trends that Will Dominate 2016 Business 2 Community 11/11/2015 1126
Administration How to Avoid a Data Center Overrun with Idle Servers Network World 11/10/2015 1127
Data 10 Reasons Data Centers Fail NetworkComputing 11/10/2015 1127
Connectivity Is 'Private' Enterprise WiFi Obsolete? InformationWeek 11/10/2015 1127
Security The Biggest Misconception about Information Security Information Management 11/10/2015 1127
Bit bucket 5 Ways To Tell If You're a Micromanager Fast Company 11/10/2015 1127
Security Why Threat Intelligence Feels Like A Game Of Connect Four Dark Reading 11/10/2015 1127
Bit bucket 10 Riskiest Applications that Have Passed their Expiration Dates CSO Online 11/10/2015 1127
Bit bucket How Secure Can Your Router Get? ComputerWorld 11/10/2015 1127
Management Think Your IT Project Is a Disaster? These'll Make You Feel Better ComputerWorld 11/10/2015 1127
Data How Big Data Is Changing the Database Landscape for Good ComputerWorld 11/10/2015 1127
Bit bucket Carbon Nanotubes In a Race Against Time to Replace Silicon ComputerWorld 11/10/2015 1127
Data Keep Sensitive Data Safe With These 5 Secure USB Drives ZDnet 11/09/2015 1128
Compliance Flash Storage: Is There a Tipping Point Anytime Soon? ZDnet 11/09/2015 1128
Connectivity 7 Ways Hackers can Use Wi-Fi Against You Network World 11/09/2015 1128
Cloud Cloud-Knackered Disease: The Effects of the Data Breach Epidemic Network World 11/09/2015 1128
Storage 10 Reasons Why Phishing Attacks are Nastier Than Ever Network World 11/09/2015 1128
Security The Transformative Technology Security Nightmare HelpNet Security 11/09/2015 1128
Security Need for Cyber-Insurance Heats Up, But the Market Remains Immature IT World 11/09/2015 1128
Bit bucket US Regulator Shoots down 'Do Not Track' Requirement IT News 11/09/2015 1128
Security Wine Cellars, Security, and Standards: Vint Cerf on IoT InfoWorld 11/09/2015 1128
Data Big Data Investments Pay Off Big, but Oh Those Costs Information Management 11/09/2015 1128
Bit bucket Hiring Wisdom: Top 10 Ways to Guarantee You Hire the Wrong Person TLNT 11/09/2015 1128
Cloud 8 Biggest Cloud Mistakes Companies Make NetworkComputing 11/08/2015 1129
Bit bucket 10 Things the New Star Trek Series Needs InformationWeek 11/08/2015 1129
Data The Impact Data Has on Making Informed Marketing Decisions Business 2 Community 11/08/2015 1129
Data What Good Data can Do Business 2 Community 11/08/2015 1129
Data Are You Overlooking Tokenization as a Data Security Measure? Network World 11/06/2015 1131
Management Most Employees are Not Malicious, But Their Carelessness Can be Just As Damaging HelpNet Security 11/06/2015 1131
Bit bucket What Can You Do When You Can't chmod chmod? IT World 11/06/2015 1131
Compliance WA Auditors Guess Govt Database Passwords on First Attempt IT News 11/06/2015 1131
Technology Toyota Creates $1 Billion AI, Robotics Institute in US InformationWeek 11/06/2015 1131
Data What the Boardroom Thinks about Data Breach Liability Dark Reading 11/06/2015 1131
Security What Flu Season Can Teach Us about Fighting Cyberattacks Dark Reading 11/06/2015 1131
Connectivity U.S. Readies for Space Storms that Could Crash Critical Networks ComputerWorld 11/06/2015 1131
Data These Data Centers are Insanely Gorgeous TechRepublic 11/05/2015 1132
Management 007 Tips for Keeping Your Business as Secure s MI6 Network World 11/05/2015 1132
Management IT Vendor Risk Management: Improving but Still Inadequate Network World 11/05/2015 1132
Cloud Considering the Hybrid Cloud? Here's What You'll Need to Consider Network World 11/05/2015 1132
Connectivity 8 Open Networking Terms to Know NetworkComputing 11/05/2015 1132
Cloud Business Leaders Increasingly Drive Cloud Migration HelpNet Security 11/05/2015 1132
Technology Can Artificial Intelligence Influence Human Behavior? A Trial will Find Out IT World 11/05/2015 1132
Bit bucket Five Things You Should Know about Unlicensed LTE IT World 11/05/2015 1132
Bit bucket 14 Hidden Tips & Tricks to Make the Most of Your New iPhone 6s IT World 11/05/2015 1132
Bit bucket 14 Strange but True Tech Facts You (Probably) Don't Know IT World 11/05/2015 1132
Data Do Data Big, or Die in 2016, Warns Big Data Veteran Information Management 11/05/2015 1132
Data America's Big Data Obesity Problem Information Management 11/05/2015 1132
Security How to Not Get Fired as CISO CSO Online 11/05/2015 1132
Bit bucket Longer-Lasting, 3D Solid-State Batteries could Displace Lithium-Ion ComputerWorld 11/05/2015 1132
Bit bucket TPP Revealed: What The Trade Deal Means For Online Copyright ComputerWorld 11/05/2015 1132
Data Data Quality Comes before Data Visualization Business 2 Community 11/05/2015 1132
Bit bucket The International Space Station: Reveling at 15 Network World 11/04/2015 1133
Cloud You Moved to the Cloud ... The Internet's Down. Now What? Network World 11/04/2015 1133
Bit bucket Improving Customer Experiences (CX): 10 Ways IT can Help InformationWeek 11/04/2015 1133
Data The Big Data Odyssey Information Management 11/04/2015 1133
Data 7 Factors Limiting Benefits of Big Data in Healthcare Information Management 11/04/2015 1133
Storage 5 Disaster Recovery Options: Balancing the Pros and Cons, Objectives, and Cost Disaster Recovery Journal 11/04/2015 1133
Data BYOD 2015: Data Loss, Data Leaks & Data Breaches Dark Reading 11/04/2015 1133
Security Five Moves for Every New CISO's Playbook CSO Online 11/04/2015 1133
Bit bucket Quick As a Flash: NVMe Will Have You in Tiers The Register 11/03/2015 1134
Bit bucket The Top 10 Apps that Companies Hate Network World 11/03/2015 1134
Bit bucket 14 DRaaS Vendors that Will Rescue You In a Pinch Network World 11/03/2015 1134
Bit bucket The Sorry State of Certificate Revocation InfoWorld 11/03/2015 1134
Cloud In The Cloud, Beware the Sinking Ships InfoWorld 11/03/2015 1134
Bit bucket 8 Ways to Leverage Location Services Network World 11/02/2015 1135
Data The 4 Commandments of Basic Data Security InfoWorld 11/02/2015 1135
Bit bucket Ways to Quit Sitting: 8 Unique Desk Options InformationWeek 11/02/2015 1135
Management Despite Best Intentions, Most Organizations Misinterpret, Misuse Data Information Management 11/02/2015 1135
Bit bucket Three Words to Improve Disaster Outcomes Emergency Management 11/02/2015 1135
Bit bucket IPv6 and the Growing DDoS Danger Dark Reading 11/02/2015 1135
Bit bucket Drone Registration Recommendations Handed to FAA ComputerWorld 11/02/2015 1135
Bit bucket Don't Throw Out that Old Phone - Turn It Into a Privacy Device ComputerWorld 11/02/2015 1135
Connectivity Tips to Keep Your Organization's Network and Data Safe Business 2 Community 11/02/2015 1135
Bit bucket The Answer to Wasted IT Investment: Spend, Spend, Spend! Network World 10/31/2015 1137
Bit bucket 20 Terrifying PC Horror Games to Play with the Lights Off InfoWorld 10/31/2015 1137
Security 7 Elements of Modern Endpoint Security Dark Reading 10/31/2015 1137
Bit bucket We Are Entering the Data-Aware Infrastructure Era The Register 10/30/2015 1138
Bit bucket Have A Plan A, and Plan B - Just Don't Go Down With the Ship The Register 10/30/2015 1138
Bit bucket Scientists Get First Glimpse of Conductivity that Could Break Size Barriers for Memory Science Daily 10/30/2015 1138
Bit bucket 7-Eleven Takes a Big Gulp of Customer Data Network World 10/30/2015 1138
Bit bucket Beware the 'Black Swans' In Your Supply Chain Network World 10/30/2015 1138
Bit bucket 5 Dead Operating Systems, and What Their Ghosts Can Tell Us IT World 10/30/2015 1138
Bit bucket 10 Scariest Bosses: a Survival Guide InformationWeek 10/30/2015 1138
Data 14 Creepy Ways to Use Big Data InformationWeek 10/30/2015 1138
Data Big Data and Machine Learning Lessons from Google Photos Information Management 10/30/2015 1138
Data Operationalize Predictive Analytics for Significant Business Impact Information Management 10/30/2015 1138
Compliance How Flash has Directly Caused Storage Industry Consolidation eWeek 10/30/2015 1138
Security The Dawn of Lights-Out Security Dark Reading 10/30/2015 1138
Bit bucket Fluffy Carbon Electrodes Bring Lithium-Air Batteries Closer to Reality ComputerWorld 10/30/2015 1138
Bit bucket Farming on Mars? The Martian Raises Questions about Soil Science Daily 10/29/2015 1139
Compliance Tackling Big Data: Storage and Transfer Science Daily 10/29/2015 1139
Data Parks Canada CIO Maps Out the Agency's Long-Term Data Management Strategy IT World Canada 10/29/2015 1139
Connectivity Harder than Herding Cats: Networks Seek International Agreement on New Mobile Spectrum IT World 10/29/2015 1139
Administration Why Client-Server Must Die InfoWorld 10/29/2015 1139
Data How to Advance an Organization's Data Culture Information Management 10/29/2015 1139
Management Many Organizations Ignore Full Value of Customer Data, says Gartner Information Management 10/29/2015 1139
Security Machine Learning is Cybersecurity's Latest Pipe Dream Dark Reading 10/29/2015 1139
Security 6 Tips for Your Security Awareness Training Network World 10/28/2015 1140
Bit bucket Best-Dressed Techies? Retail Startup Designs Khakis and T-Shirts for IT Network World 10/28/2015 1140
Storage SSD Pricing Vs. HDD Costs NetworkComputing 10/28/2015 1140
Bit bucket Social Experiment: 200 USB Flash Drives Left in Public Locations HelpNet Security 10/28/2015 1140
Bit bucket Why IBM Bought the Weather Channel: My Quick Thoughts Information Management 10/28/2015 1140
Management The Global CISO: Why U.S. Leaders must Think Beyond Borders Dark Reading 10/28/2015 1140
Operations Honda Unveils Hydrogen-Powered Car with 400-Mile Range ComputerWorld 10/28/2015 1140
Bit bucket Sonic Tractor Beam Moves Stuff with Sound Science Daily 10/27/2015 1141
Bit bucket LTE-U: A Quick Explainer Network World 10/27/2015 1141
Management Are your IT Certifications Killing Your Career? Network World 10/27/2015 1141
Security Judge Suggests DOJ Wants Apple to Work for Government by Unlocking Encrypted iPhone Network World 10/27/2015 1141
Cloud 10 Riskiest Cloud Services IT World 10/27/2015 1141
Cloud Pekin Insurance to Move Its Legacy Systems to the Cloud Insurance Networking 10/27/2015 1141
Security Encryption Is Under Siege. Move to SHA-2 Now! InfoWorld 10/27/2015 1141
Compliance 5 Bitter Truths about Software-Defined Storage InfoWorld 10/27/2015 1141
Bit bucket How to Stick It to Craigslist Scammers InfoWorld 10/27/2015 1141
Cloud Personal vs. Corporate Cloud Apps: Who Wins on Security? Information Management 10/27/2015 1141
Management Bad News is Good News for Security Budgets But Not Skills Dark Reading 10/27/2015 1141
Bit bucket Five Predictions for the EU-U.S. Safe Harbor Showdown ComputerWorld 10/27/2015 1141
Operations Operations Costs Are the Achilles' Heel of NoSQL ComputerWorld 10/27/2015 1141
Data The Rise of Big Data Marketplaces ComputerWorld 10/27/2015 1141
Management 6 Business Lessons of Rock, Paper, Scissors CIO 10/27/2015 1141
Cloud CIO Insight: DVLA CTO on Overhauling Monolithic IT Infrastructure for the Cloud Era v3 co uk 10/26/2015 1142
Management How Long Does It Take for Employees to be Security Conscious? Network World 10/26/2015 1142
Connectivity 7 Basic Network Security Mistakes You're Probably Making NetworkComputing 10/26/2015 1142
Bit bucket From Start to Finish, Inside a PayPal Phishing Scam IT World 10/26/2015 1142
Bit bucket Australia Goes Hi-Tech to Tame Shark Attack Fears IT World 10/26/2015 1142
Data 7 Steps to IoT Data Security InfoWorld 10/26/2015 1142
Bit bucket How to Thrive In the Coming Tech Gig Economy InfoWorld 10/26/2015 1142
Bit bucket A Little Hardware Goes a Long, Long Way InfoWorld 10/26/2015 1142
Bit bucket BNY Mellon Transforms IT One Step At a Time InformationWeek 10/26/2015 1142
Data Majority of Doctors Lack Important Electronic Data on Their Patients Information Management 10/26/2015 1142
Data Poaching On the Rise for Big Data Pros Information Management 10/26/2015 1142
Management Top 10 CIO Concerns for 2016 Information Management 10/26/2015 1142
Data Top 10 Pure Big Data Companies Information Management 10/26/2015 1142
Management New Approaches to Vendor Risk Management Dark Reading 10/26/2015 1142
Data Why Your Company needs Data Analytics Business 2 Community 10/25/2015 1143
Bit bucket Capacitor Breakthrough Science Daily 10/24/2015 1144
Bit bucket Hiring Good Tech People: Where to Start? Network World 10/24/2015 1144
Technology Scalable Quantum Computer Design Science Daily 10/23/2015 1145
Cloud Five Ways Shadow IT in the Cloud Hurts Your Enterprise Network World 10/23/2015 1145
Cloud Turning to Cloud-Based Analytics to Manage IT Asset Costs Network World 10/23/2015 1145
Bit bucket Nearly Everyone Dislikes CISA, So Congress will Make it Law InfoWorld 10/23/2015 1145
Bit bucket You've Been Attacked. now What? Dark Reading 10/23/2015 1145
Management Tales of the Tape: 6 LTO-7 Technology Strategies CRN 10/23/2015 1145
Security Are Wearables Worth the Cybersecurity Risk in the Enterprise? Network World 10/22/2015 1146
Security 7 Big Threats to Innovation and How to Overcome Them Network World 10/22/2015 1146
Cloud U.S. CIO Tells IT Leaders to Trust the Cloud Network World 10/22/2015 1146
Bit bucket How to Become an Independent IT Consultant Network World 10/22/2015 1146
Bit bucket Wait, We Have to Expedite That! Information Management 10/22/2015 1146
Security 5 Steps for Effective Threat Monitoring Dark Reading 10/22/2015 1146
Bit bucket Don't Overdo with Biometrics, Expert Warns ComputerWorld 10/22/2015 1146
Technology Back to the Future Day: A look at our Technology in 2045 ZDnet 10/21/2015 1147
Bit bucket Researchers Warn Computer Clocks can be Easily Scrambled Network World 10/21/2015 1147
Bit bucket Malvertising - The new Silent Killer? Network World 10/21/2015 1147
Bit bucket How to Unleash the Potential of Your B Players Network World 10/21/2015 1147
Administration 9 Tools to Help You Manage Your Pet Servers IT World 10/21/2015 1147
Bit bucket The Three Speeds of Insurance IT: Fast, Super-Fast, and Hyper-Fast Insurance Networking 10/21/2015 1147
Cloud A Move to the Cloud Is No Simple Calculation InfoWorld 10/21/2015 1147
Security Free Web Security Certificates coming Soon InformationWeek 10/21/2015 1147
Bit bucket The Secret to Sounding Smart? Using Simple Language Fast Company 10/21/2015 1147
Bit bucket The Good Things You Can Learn from Bad People TLNT 10/21/2015 1147
Cloud Navigating New Security Architectures for Cloud Data Centers Dark Reading 10/21/2015 1147
Security Passing the Sniff Test: Security Metrics and Measures Dark Reading 10/21/2015 1147
Security Boards are Getting More Involved in Cybersecurity, But is It Enough? CSO Online 10/21/2015 1147
Security What It Takes to Be a Successful CISO CSO Online 10/21/2015 1147
Management Day in the life of a social CIO: LPL Financial's Victor Fetter CIO 10/21/2015 1147
Technology Our Intuitive AI Outperforms (most) Puny Humans, Claims MIT The Register 10/20/2015 1148
Data Lotus F1: 38C? Sand in Your Vblocks? Must be Building A Data Center in Bahrain Again The Register 10/20/2015 1148
Bit bucket What's Hot in Driverless Cars? Network World 10/20/2015 1148
Cloud How a Tea Kettle Can Kill Your Cloud Network World 10/20/2015 1148
Cloud How Higher Ed IT Is Staying Ahead of the Cloud Computing Curve Network World 10/20/2015 1148
Technology 2015 Technology Industry Graveyard Network World 10/20/2015 1148
Connectivity Why Everyone Should Care about Two-Factor Authentication HelpNet Security 10/20/2015 1148
Connectivity Strengthen Your Network Security with Passive DNS InfoWorld 10/20/2015 1148
Cloud Hybrid Cloud: 7 Ways It's the Best of Both Worlds InformationWeek 10/20/2015 1148
Security What's a Blockchain? And Is it Heading for Prime Time? IDG Connect 10/20/2015 1148
Security Building a Winning Security Team from the Top Down Dark Reading 10/20/2015 1148
Security Crypto Researchers: Time to Use Something Better than 1024-Bit Encryption Network World 10/19/2015 1149
Bit bucket When Mobile and Mainframes Mix, the Results are Spectacular Network World 10/19/2015 1149
Cloud Meet the Real Architects of Tomorrow's Enterprise Cloud InfoWorld 10/19/2015 1149
Management Data-Driven Endpoint Management Explained Information Management 10/19/2015 1149
Data Predictive Analytics Business Case is Simpler Than You Think Information Management 10/19/2015 1149
Bit bucket It Doesn't Pay to Joke Around About the FMLA - Or Employees Who Request It TLNT 10/19/2015 1149
Cloud Enterprises Are Leaving Cloud Security Policies to Chance Dark Reading 10/19/2015 1149
Cloud IT Departments Must Transform In the Face of the Cloud Revolution ComputerWorld 10/19/2015 1149
Bit bucket How Managing Employee Stress Leads to a Healthier Company CIO 10/19/2015 1149
Cloud Demystifying Cloud Storage: 6 Reasons Your Business should Use It Business 2 Community 10/19/2015 1149
Connectivity 5 New Networking Requirements Driven by Internet of Things and Big Data Business 2 Community 10/19/2015 1149
Bit bucket FAQ: The FCC's Upcoming Broadcast-TV Spectrum Auction IT World 10/17/2015 1151
Bit bucket Before Adding Solid-State Drives, Right-Size Your Infrastructure using Workload Profiling Network World 10/16/2015 1152
Bit bucket BYOD is as Entrenched (and Complicated) as Ever Network World 10/16/2015 1152
Technology Six Key Challenges Loom over Car Communication Technology Network World 10/16/2015 1152
Management The National Film Board's CTO Offers a Close-up Look at its Digital Archiving Project IT World Canada 10/16/2015 1152
Data Big Data's Impact on Insurance Modeling Information Management 10/16/2015 1152
Connectivity The Internet of Things: It's All about Trust Dark Reading 10/16/2015 1152
Connectivity The Internet of Things: It's All About Trust Dark Reading 10/16/2015 1152
Bit bucket From 55 Cents to $1,200: The Value Chain for Stolen Data Dark Reading 10/16/2015 1152
Cloud Who Is Responsible for Security In the Cloud CSO Online 10/16/2015 1152
Bit bucket Why We need Behavior-Centric Detection And Response CSO Online 10/16/2015 1152
Connectivity IoT is Here and Mobile Networks Will Never Be the Same Network World 10/15/2015 1153
Connectivity Can Myriad Wireless Networks Connect as One Fast, Secure System? Network World 10/15/2015 1153
Cloud The Cloud Changes IT Culture, Demands new Tech Skills Network World 10/15/2015 1153
Security Existing Security Standards do not Sufficiently Address IoT HelpNet Security 10/15/2015 1153
Data Mind Your Analytics - Or Get Ready for Ethical Hot Water IT World 10/15/2015 1153
Data The 10 Best Paying Big Data Career Skills Insurance Networking 10/15/2015 1153
Bit bucket An Atypical Approach to DNS Dark Reading 10/15/2015 1153
Security Why Visibility and Control Are Critical for Container Security Network World 10/15/2015 1153
Compliance Where Will Storage Go Over the Next 15 Years? We Rub Our Crystal Ball The Channel Register 10/15/2015 1153
Technology Technology Scares the Hell Out of People, University Survey Finds Network World 10/14/2015 1154
Bit bucket 8 Tips for Running a Successful Remote Meeting Network World 10/14/2015 1154
Data Is Big Data Success Eluding You? IT World Canada 10/14/2015 1154
Bit bucket Secret to Successful Teams: Lead Them with Laughter InformationWeek 10/14/2015 1154
Data Big Data Analytics Raises Ethical Risks Information Management 10/14/2015 1154
Connectivity Vint Cerf and 260 Experts Give FCC a Plan to Secure Wi-Fi Routers ComputerWorld 10/14/2015 1154
Data ESPN Analytics Chief: Using Data to Call the Shots Business 2 Community 10/14/2015 1154
Bit bucket Toward Clearer, Cheaper Imaging of Ultrafast Phenomena Science Daily 10/13/2015 1155
Compliance Data Storage of the Future: Scientists Crack Secret of Making Stable, Dynamic Skyrmions Science Daily 10/13/2015 1155
Bit bucket DARPA wants Vanishing Drones Network World 10/13/2015 1155
Management 5 Practical Project Management Certifications Network World 10/13/2015 1155
Security SANS: 20 Critical Security Controls You Need to Add IT World 10/13/2015 1155
Security The Most Important Security Question to Ask Users InfoWorld 10/13/2015 1155
Cloud A Better Approach to Cloud Encryption InfoWorld 10/13/2015 1155
Security Prolific Cybercrime Gang favors Legit Login Credentials Dark Reading 10/13/2015 1155
Bit bucket Is There a White-Box Switch In Your Future? (Video) Network World 10/12/2015 1156
Cloud Has the NSA Balkanized the Cloud Market? Network World 10/12/2015 1156
Bit bucket 10 New Words You Need to Know in Silicon Valley Network World 10/12/2015 1156
Bit bucket Dancing on the Grave of Flash Network World 10/12/2015 1156
Connectivity Don't Sink Your Network HelpNet Security 10/12/2015 1156
Connectivity The ROI of IoT: How to Make the Internet of Things Benefit Your Bottom Line IT Business Canada 10/12/2015 1156
Bit bucket Court Finds It Only Takes One Incident to Have a Hostile Work Environment TLNT 10/12/2015 1156
Bit bucket Ideas are Better than Ideology ComputerWorld 10/12/2015 1156
Connectivity Encryption and Surveillance: The Unstoppable Force and the Immovable Object of the Internet Age ZDnet 10/11/2015 1157
Storage NASA's Mars Journey: Next Steps for Mankind InformationWeek 10/11/2015 1157
Data How to Prevent Improper Use of Big Data Analytics? CIOL 10/10/2015 1158
Data Predictive Analytics Are the Future of Big Data v3 co uk 10/09/2015 1159
Connectivity How to Choose the Right Mobile Hotspot Network World 10/09/2015 1159
Cloud 7 Warnings to Heed Before a Cloud Migration Network World 10/09/2015 1159
Bit bucket Adidas to 3D Print Custom Insoles in Sneakers IT World 10/09/2015 1159
Bit bucket 10 Enthralling Visions for the Future of Computing InfoWorld 10/09/2015 1159
Bit bucket Teach Your Execs Well: Stop Phishing in the C-Suite InfoWorld 10/09/2015 1159
Data NASA's Apollo Archive: 10 Fascinating Images InformationWeek 10/09/2015 1159
Cloud What You should Know About Using Third-Party Cloud Management Tools Data Center Knowledge 10/09/2015 1159
Bit bucket Data Deletion: A Disconnect Between Perception and Reality Dark Reading 10/09/2015 1159
Cloud 20 Steps: How to Know You're Ready for the Cloud Network World 10/08/2015 1160
Bit bucket Dispelling the Myths of Hybrid Hosting Network World 10/08/2015 1160
Cloud 5 Tips on Cloud Migration from Those Who Know (With Video) Network World 10/08/2015 1160
Technology Pen-Testing Drone Searches for Unsecured Devices HelpNet Security 10/08/2015 1160
Security Cybersecurity is Being Taken Seriously Around the Globe HelpNet Security 10/08/2015 1160
Cloud CIOs Describe the 'Perfect Storms' That Drove Them to Cloud Computing IT World Canada 10/08/2015 1160
Data Big Data Makes a Difference At Penn Medicine IT World 10/08/2015 1160
Bit bucket Corporate VPNs in the Bullseye Dark Reading 10/08/2015 1160
Security From Gatehouse to Boardroom: The Changing Role of IT Security Continuity Central 10/08/2015 1160
Security U.S. Won't Seek Law to Ban Encryption ComputerWorld 10/08/2015 1160
Data Theoretical Computer Science Provides Answers to Data Privacy Problem Science Daily 10/07/2015 1161
Security Former NSA Chief Undercuts FBI's Desire For Encryption Backdoors Network World 10/07/2015 1161
Bit bucket The 13 Things the Perfect Laptop Has to Have Network World 10/07/2015 1161
Data Gartner: Risk, Relentless Data Center Demand, Open Source and Other Tech Trends IT Needs To Know Network World 10/07/2015 1161
Bit bucket IT Monitoring & the Five Stages of Grief NetworkComputing 10/07/2015 1161
Security What Will the CISOs of 2020 Look Like? CSO Online 10/07/2015 1161
Security Survey Says Enterprises are Stepping Up their Security Game CSO Online 10/07/2015 1161
Bit bucket 18 Tough Certifications that Are Worth the Effort CRN 10/07/2015 1161
Bit bucket Out of Focus: The Multitasking Dilemma ComputerWorld 10/07/2015 1161
Connectivity Worries Mount over Upcoming LTE-U Deployments Hurting Wi-Fi Network World 10/06/2015 1162
Security When It Comes to Security, Trust but Verify Network World 10/06/2015 1162
Management Gartner: Top 10 Strategic Predictions that Could Shake Up IT Network World 10/06/2015 1162