IT Weekly


Feb 19, 2019

Every week we bring you more than 40+ relevant online sources that contain articles of interest to IT and DC Professionals at all levels

Browse by Technology
Browse by Year



Category Articles From 2015 Source Posted Date Age
Bit bucket 6 Signs Containers Will Gain Ground in 2016 InfoWorld 12/31/2015 1146
Management Top Priorities for State CIOs: 2016 InformationWeek 12/31/2015 1146
Security Micro-Segmentation: Split and Smear Security NetworkComputing 12/30/2015 1147
Cloud 6 Changes to Expect in Data Security, Cloud and Mobile Tech Insurance Networking 12/30/2015 1147
Cloud When You Wish Upon a Cloud: 3 Cloud Hopes for 2015 InfoWorld 12/30/2015 1147
Data 5 Essential Steps for Increasing Data Security With IaaS Information Management 12/30/2015 1147
Management There's an 'Invisible' Trait That Makes Leaders More Effective - Here's How to Develop It Business Insider 12/30/2015 1147
Compliance 3 Compliance Trends Community Banks Should Watch in 2015 Bank Systems & Technology 12/30/2015 1147
Management 10 Outsourcing Trends to Watch In 2016 Network World 12/29/2015 1148
Cloud 3 Cloud Resolutions for 2016 InfoWorld 12/29/2015 1148
Bit bucket 2015: The Year Mobile become Boring InfoWorld 12/29/2015 1148
Cloud Cloud, Data Security Remain Top Concerns Heading into 2016 Information Management 12/29/2015 1148
Bit bucket Getting Surveys to Say Most Anything You Want Information Management 12/29/2015 1148
Data Why So Many Organizations Struggle with Data Management Insurance Networking 12/28/2015 1149
Data 10 Big Data Predictions for 2016 Revisited Information Management 12/26/2015 1151
Data 15 Chief Data Officer Job Requirements Information Management 12/26/2015 1151
Compliance 2015: The Year Storage Was Rocked to Its Foundations The Register 12/25/2015 1152
Bit bucket Firms Must Ensure Shared Service Suppliers have 'Sufficient Financial Resources' The Register 12/24/2015 1153
Technology Weird Science: 10 Strange Tech Stories from 2015 InfoWorld 12/24/2015 1153
Management How to Justify Your Cybersecurity Budget by Calculating ROI Information Management 12/24/2015 1153
Connectivity How to Find Any Device's IP Address, MAC Address, and Other Network Connection Details How To Geek 12/24/2015 1153
Security Information Security -- Don't Let the Apparent Complexity Intimidate You ComputerWorld 12/24/2015 1153
Connectivity Wi-Fi's Whipping Boy Complex Network World 12/23/2015 1154
Bit bucket Work in Finance or Accounting? Watch Out for 'Whaling' Attacks Network World 12/23/2015 1154
Bit bucket Tech Predictions for 2016: What I Expect to Happen, and What I Hope Will Happen Network World 12/23/2015 1154
Bit bucket Technical Debt: Hot to Assess It and Manage It Network World 12/23/2015 1154
Cloud Three Ways To Use the Cloud to Regain Control Over Network Endpoints Network World 12/23/2015 1154
Bit bucket He Sees You When You're Sleeping and When You're Awake Via Unsecured IP Cameras Network World 12/23/2015 1154
Connectivity 2016 Prediction: Businesses Begin to Abandon Social Networking Network World 12/23/2015 1154
Cloud Netsuite CEO: The Cloud Is the Last Computing Architecture IT World 12/23/2015 1154
Data Using Advanced Analytics to Sniff Out Spoofing Information Management 12/23/2015 1154
Data Backup with Brains: The Growing Importance of Analytics for Business Resiliency ComputerWorld 12/23/2015 1154
Connectivity Software Defined Networks - Ready and Waiting to Transform the Future of Networking Business 2 Community 12/23/2015 1154
Technology How the Robot Revolution is Going to Change How We See, Feel, and Talk TechRepublic 12/22/2015 1155
Bit bucket What We Learned About 5G in 2015 Network World 12/22/2015 1155
Compliance Storage Considerations When You're Virtualizing the Last 20% of Your Systems Network World 12/22/2015 1155
Security Can Collaborative Security Work? Network World 12/22/2015 1155
Management Interview Questions To Throw You Off Guard Network World 12/22/2015 1155
Management 3 Tips for Successful 'Stay' Interviews Network World 12/22/2015 1155
Bit bucket HTTP Error Code 451 will Signal Online Censorship HelpNet Security 12/22/2015 1155
Security 5 Information Security Trends that Will Dominate 2016 Network World 12/21/2015 1156
Connectivity Battle Over LTE in Wi-Fi Bands May Soon be Resolved Network World 12/21/2015 1156
Connectivity Network World's 20 Best Products of 2015 Network World 12/21/2015 1156
Administration Cloud, Virtualization Take Toll on Data Centers InfoWorld 12/21/2015 1156
Data Structuring Your Data Team: 9 Best Practices InformationWeek 12/21/2015 1156
Bit bucket 5 Conversation Habits of Charismatic People Fast Company 12/21/2015 1156
Data Getting to the True Data Center Cost Data Center Knowledge 12/21/2015 1156
Data The 10 Biggest Data Breaches of 2015 CRN 12/21/2015 1156
Management Ten Steps to a Great Business Continuity Exercise Continuity Central 12/21/2015 1156
Bit bucket Be Brief: Don't Get Lost In the Weeds with Tech Debriefings TechRepublic 12/18/2015 1159
Security Should You buy Cyber Insurance? Network World 12/18/2015 1159
Management The 10 Most Important Lessons IT Learned in 2015 TechRepublic 12/17/2015 1160
Cloud Public Cloud vs. On-Premises, Which is More Secure? Network World 12/17/2015 1160
Security Creating a Cybersecurity Center of Excellence Network World 12/17/2015 1160
Bit bucket The Weirdest, Wackiest and Coolest Sci/Tech Stories of 2015 Network World 12/17/2015 1160
Bit bucket 10 'Star Wars' Technologies that Are Almost Here InfoWorld 12/17/2015 1160
Bit bucket The 4 Big Things I Learned from the Worst Boss I Ever Had TLNT 12/17/2015 1160
Bit bucket The State of IT for 2016 Business 2 Community 12/17/2015 1160
Management 13 Best Free Project Management Software Programs 2016 TechWorld 12/16/2015 1161
Cloud Rain Clouds Ahead: 10 Bold Predictions for the Cloud Industry In 2016 Network World 12/16/2015 1161
Connectivity 5 Fundamental Requirements for High-Performing Networks NetworkComputing 12/16/2015 1161
Cloud How Green is Your Cloud? InfoWorld 12/16/2015 1161
Data 10 Data Security Trends That Will Impact You in 2016 Information Management 12/16/2015 1161
Bit bucket How To Be the Person Who Never Misses a Deadline Fast Company 12/16/2015 1161
Management 5 Reasons that Most Leaders Fail as Communicators TLNT 12/16/2015 1161
Security Top 15 Security Predictions for 2016 CSO Online 12/16/2015 1161
Technology 10 Technology Driven hard Trends Shaping 2016 Business 2 Community 12/16/2015 1161
Bit bucket Hybrid Prevailing Over All-Flash Arrays Storage Newsletter 12/15/2015 1162
Bit bucket 2015's Top Tech Pictures from Reuters Network World 12/15/2015 1162
Security Rackspace CSO on Security: It's Time to Go Back to the Fundamentals HelpNet Security 12/15/2015 1162
Security Data Breaches will Affect 1.5 Billion People by 2020 InfoWorld 12/15/2015 1162
Security Why Identity Is the New Security InfoWorld 12/15/2015 1162
Cloud 3 Key Cloud Trends for 2016 InfoWorld 12/15/2015 1162
Administration Data Virtualization: The Missing Link In the Devops Tool Chain InfoWorld 12/15/2015 1162
Bit bucket Advice From Former Apple and LinkedIn Employees on Landing Your Dream Job Fast Company 12/15/2015 1162
Bit bucket How to Make Every Single Meeting You Attend Useful Fast Company 12/15/2015 1162
Bit bucket The End of Passwords? Dark Reading 12/15/2015 1162
Security The CISO's New Best Friend & New Boss Dark Reading 12/15/2015 1162
Security What Security Pros Want for the New Year CSO Online 12/15/2015 1162
Security 2016 Cyber Security Predictions Continuity Central 12/15/2015 1162
Technology Quantum Computing May Be Moving Out of Science Fiction ComputerWorld 12/15/2015 1162
Management How CIOs Should Evaluate Startups - Tips from Four IT Leaders CIO 12/15/2015 1162
Bit bucket What's Ahead for SDN in 2016 NetworkComputing 12/14/2015 1163
Bit bucket MPLS Guide: What Enterprise Architects Need to Know NetworkComputing 12/14/2015 1163
Cloud The Mega-Clouds Are Coming for Your Data Center InfoWorld 12/14/2015 1163
Security Maximum Security: Essential Tools for Everyday Encryption InfoWorld 12/14/2015 1163
Data 14 Ways IoT Will Change Big Data and Business Forever InformationWeek 12/14/2015 1163
Security 5 Security Tips for 2016 That Could Save Your Job Information Management 12/14/2015 1163
Data Predictive Analytics Requires a Customer-Obsessed Innovation Culture Information Management 12/14/2015 1163
Bit bucket 6 Creativity Habits for People Who Think They're not Creative Fast Company 12/14/2015 1163
Bit bucket The Four Trends That Will Change the Way We Work by 2021 Fast Company 12/14/2015 1163
Bit bucket 10 Things YOU Do that Sabotage Successful Change TLNT 12/14/2015 1163
Bit bucket 6 Sneak Peeks that Give You a Taste of What CES Will Be All About ComputerWorld 12/14/2015 1163
Technology Social Media Addiction is a Bigger Problem Than You Think ComputerWorld 12/14/2015 1163
Management Signs a Project Manager Should Be Worried About Outsourcing Business 2 Community 12/14/2015 1163
Compliance Ghosts of Tech Past: Photos of Data Storage from the 1950s - 1980s TechRepublic 12/13/2015 1164
Cloud Successfully Staffing the Cloud Government Technology 12/13/2015 1164
Management How Do You Use Data? 1,500 Business Professionals Weigh In Business 2 Community 12/13/2015 1164
Bit bucket 10 Hot IT Job Skills for 2016 InfoWorld 12/11/2015 1166
Data 5 Trends that Will Drive Big Data in 2016 Information Management 12/11/2015 1166
Management 4 Career Mistakes You Should Make in Your 20s Fast Company 12/11/2015 1166
Technology Those Devices Hidden in Your Closet CAN Hurt You ComputerWorld 12/11/2015 1166
Management The Right Way to Reorg: 4 Tips for Avoiding Reorganizational Purgatory TechRepublic 12/10/2015 1167
Security Companies Scramble to Fix Lack of Encryption On Mobile Apps InfoWorld 12/10/2015 1167
Management The Lizard Squad: Cyber Weapon or Business? Dark Reading 12/10/2015 1167
Data Move Over CISO: The Chief Data Officer May be Sharing Part of Your Job ComputerWorld 12/10/2015 1167
Cloud How Goldman Sachs and Bank of America Use the Cloud And Containers Network World 12/09/2015 1168
Data Data Analytics Is the New Black InfoWorld 12/04/2015 1173
Compliance The 10 Coolest Storage Startups of 2015 CRN 12/04/2015 1173
Administration The Future of Virtualization: Don't Forget the So-Called 'Old' Network World 12/03/2015 1174
Connectivity 7 WiFi Killers that May Surprise You NetworkComputing 12/03/2015 1174
Storage Consumer SSDs and Hard Drive Prices are Nearing Parity Network World 12/02/2015 1175
Technology Quantum Dots Could Bridge Gap Between Electronic and Quantum Computers Network World 12/02/2015 1175
Management "The Little Things" That the Best Leaders Make Sure They Do TLNT 12/02/2015 1175
Bit bucket Forecast 2016: 5 Disruptors to Keep on Your Radar ComputerWorld 12/02/2015 1175
Bit bucket Energy Hybrid: Battery Meets Super Capacitor Science Daily 12/01/2015 1176
Bit bucket 13 Things Mentally Strong People don't Do Success 12/01/2015 1176
Management How CIOs can Ensure M&A Projects Pay Off Network World 12/01/2015 1176
Security Why You Should Lawyer Up Before a Cyberattack Network World 12/01/2015 1176
Bit bucket 4 Do's and Don'ts for Safer Holiday Computing InfoWorld 12/01/2015 1176
Bit bucket Is Your IT Infrastructure Ready for ECM Software? Business 2 Community 12/01/2015 1176
Data FBI Can Demand Web History, Phone Location Data Without a Warrant ZDnet 11/30/2015 1177
Bit bucket The Hidden Pitfalls of Going Freelance In IT InfoWorld 11/30/2015 1177
Security What is Encryption, and Why Are People Afraid of It? How To Geek 11/30/2015 1177
Bit bucket Dear Politicians, You Cannot Create a One-Way Panopticon ZDnet 11/29/2015 1178
Security 2016: A Systems Security Disaster Network World 11/29/2015 1178
Bit bucket Buy Now Or Wait? The Tech Products That Will Likely Drop In Price Business 2 Community 11/28/2015 1179
Data Cyberwar Part 3: Marketing Data Collection Threatens All InformationWeek 11/27/2015 1180
Cloud Can You Trust Your Cloud Vendor's Employees? InformationWeek 11/27/2015 1180
Bit bucket Data, Lawyers, and IT: How They're Connected InformationWeek 11/27/2015 1180
Data Big Data & the Law of Diminishing Returns InformationWeek 11/27/2015 1180
Management Four Ways an Attacker Can Infiltrate an Organization by Diverting Security Solutions HelpNet Security 11/26/2015 1181
Bit bucket 2015 Geek Gadget Gift Guide InfoWorld 11/26/2015 1181
Security Cyberwar Part 2: Government Hacks Threaten Private Sector InformationWeek 11/26/2015 1181
Data 8 Ways You're Failing at Data Science InformationWeek 11/26/2015 1181
Bit bucket Scientists Single Out Individual Photons from a Pulse Of Light Science Daily 11/25/2015 1182
Bit bucket 8 Technologies We're Thankful For InformationWeek 11/25/2015 1182
Security Cyberwar Part 1: What IT Can Do to Survive InformationWeek 11/25/2015 1182
Management Prediction Will Replace Prevention as Top Security Strategy Information Management 11/25/2015 1182
Security How Lockheed Martin, Cisco and PWC Manage Cybersecurity Network World 11/24/2015 1183
Cloud 3 Types of Private Clouds: Which One's Right for You? Network World 11/24/2015 1183
Connectivity 8 Enterprise WiFi Shortcomings NetworkComputing 11/24/2015 1183
Connectivity 5 Tips for Using Public Wi-Fi Securely InfoWorld 11/24/2015 1183
Data The Role of KPIs in Managing Big Data Information Management 11/24/2015 1183
Data 5 Data Trends that Will Impact You in 2016 Information Management 11/24/2015 1183
Bit bucket Information of Everything' Among Top Tech Trends for 2016 Information Management 11/24/2015 1183
Management How to Deal with Jerks In the Workplace Fast Company 11/24/2015 1183
Management A Few Lessons on Leadership We Can Take from Ronda Rousey's Surprise Knockout TLNT 11/24/2015 1183
Security Avoiding Security Issues When Recycling Hardware ComputerWeekly 11/24/2015 1183
Data Data Scientists and the Practice of Data Science Business 2 Community 11/24/2015 1183
Connectivity Want to Defend Your Network? Profile the Person Attacking It The Register 11/23/2015 1184
Security How Cyber Insurance Actually Works The Register 11/23/2015 1184
Bit bucket 10 Affordable Cities that Offer Good IT Jobs Network World 11/23/2015 1184
Connectivity The 12 Basic Truths of Networking Network World 11/23/2015 1184
Security Stop the Anti-Encryption Propaganda Now InfoWorld 11/23/2015 1184
Security IT Security's Greatest Fear: Fear Itself Information Management 11/23/2015 1184
Data People and Culture Critical to Top Analytics Success Information Management 11/23/2015 1184
Data Most Execs Fooling Themselves on Big Data Capabilities Information Management 11/23/2015 1184
Bit bucket To MDM or Not to MDM? That Is the Question... Information Management 11/23/2015 1184
Bit bucket 6 Steps to Make a Great Impression at Your New Job Fast Company 11/23/2015 1184
Bit bucket Why Companies should Embrace Intelligent Disobedience Fast Company 11/23/2015 1184
Data 5 Things You Need to Know About Legally Transferring Data Out of Europe ComputerWorld 11/23/2015 1184
Bit bucket Fight for Your Right to Repair ComputerWorld 11/23/2015 1184
Security Debate Over Encryption Rages on as More Terror Attacks Feared CIO Today 11/23/2015 1184
Bit bucket 5 Signs You're Mismanaging BYOD Business 2 Community 11/22/2015 1185
Bit bucket 5 IT Industry Predictions For 2016 From Forrester and IDC Network World 11/20/2015 1187
Security The 'Need' to Control Encryption and The Big Lie Network World 11/20/2015 1187
Security Encryption is Not the Enemy InfoWorld 11/20/2015 1187
Cloud No, Containers Are Not the Future of the Cloud InfoWorld 11/20/2015 1187
Management What Security Leaders Need to Know about Breach Communication CSO Online 11/20/2015 1187
Cloud 6 Storage Solutions for Cloud-Based Archiving CRN 11/20/2015 1187
Management How 4 Organizations Connect Veterans to IT Jobs Network World 11/19/2015 1188
Bit bucket Eight More Years of Leap-Second Problems Loom as Governments Punt Decision to 2023 Network World 11/19/2015 1188
Data The Worst Data Disasters from 2015 HelpNet Security 11/19/2015 1188
Data Mobile Users Continue to Put Personal and Corporate Data At Risk HelpNet Security 11/19/2015 1188
Data Understanding a New Security Market: User Behavior Analytics HelpNet Security 11/19/2015 1188
Bit bucket Having Fun with HTTP Status Codes InfoWorld 11/19/2015 1188
Connectivity Tips from a Hacker to Improve Network Security Information Management 11/19/2015 1188
Data Mastering the Finer Points of Big Data Success Information Management 11/19/2015 1188
Management CISOs Learn 5 Tough Lessons about Conveying Security Risks CSO Online 11/19/2015 1188
Management 4 Things CEOs Can Learn from Project Teams CIO 11/19/2015 1188
Technology Facebook Building A 100-Gigabit Switch to Keep Up with Video, VR Traffic CIO 11/19/2015 1188
Management 6 Ways to Nail the Job Interview CIO 11/19/2015 1188
Cloud CIO Insight: Trainline CTO On Firm's Journey to the Cloud And Analytics Future v3 co uk 11/18/2015 1189
Security 10 Dumb Security Mistakes Sys Admins make Network World 11/18/2015 1189
Cloud How to Use SANless Clusters to Protect SQL In the Cloud Network World 11/18/2015 1189
Technology 5 Email Helpers You Need to Install Right Now Network World 11/18/2015 1189
Security Inside the Largely Unexplored World of Mainframe Security HelpNet Security 11/18/2015 1189
Security Insider Threats: 10 Ways to Protect Your Data InformationWeek 11/18/2015 1189
Data Want to Hire the Best and the Brightest? Use an Algorithm Information Management 11/18/2015 1189
Management Security and Privacy Need to be Core to IoT Design, Say Industry Leaders ComputerWeekly 11/18/2015 1189
Management Why the CIA Wanting Encryption Backdoors Is a Failure Of Leadership, Not Intelligence ZDnet 11/17/2015 1190
Bit bucket Five Apps for Benchmarking Your Hardware TechRepublic 11/17/2015 1190
Bit bucket Follow These 9 Steps to Ask for What You Want (and Actually Get It) Success 11/17/2015 1190
Data Managing The Data Deluge For National Security Analysts Science Daily 11/17/2015 1190
Bit bucket Cheaper, Higher Performing LEDs Science Daily 11/17/2015 1190
Management Organizations Sloppy about Securing Privileged Accounts Network World 11/17/2015 1190
Connectivity Network Security Primer: What is Access Control? Network World 11/17/2015 1190
Security Pros And Cons of Anonymous Waging a Hacking War on ISIS Network World 11/17/2015 1190
Security How to Deal With the Blind Spots In Your Security Created by SSL Encrypted Traffic Network World 11/17/2015 1190
Compliance The top 6 Governance, Risk and Compliance certifications Network World 11/17/2015 1190
Bit bucket 12 Travel-Friendly Tech Gifts You'll Want to Take With You Network World 11/17/2015 1190
Connectivity VLAN Implementation Guide: The Basics NetworkComputing 11/17/2015 1190
Data Why aren't Insurers Doing More with Their Data Strategy? Insurance Networking 11/17/2015 1190
Bit bucket 7 Keys to Better Risk Assessment InfoWorld 11/17/2015 1190
Security After Paris: Liberty Demands Unlimited Encryption InfoWorld 11/17/2015 1190
Bit bucket The Eyes Have It When It Comes to Biometric Accuracy Information Management 11/17/2015 1190
Data 2016 Predictions: All That Data Will Finally Drive Business Action Information Management 11/17/2015 1190
Cloud How Tesco Bank has Adopted AWS Cloud as 'Business as Usual' in Eight Months ComputerWorld UK 11/17/2015 1190
Bit bucket Three BYOD Scenarios that Require Remote Wipe Business 2 Community 11/17/2015 1190
Data Drop the Obsession with Big Data, Zero Days and Just... Help the Business The Register 11/16/2015 1191
Bit bucket Anonymous Just Might Make All the Difference In Attacking ISIS Network World 11/16/2015 1191
Bit bucket The 10 Mightiest Supercomputers In the World Network World 11/16/2015 1191
Management 9 Research Projects that Could Transform the Enterprise InfoWorld 11/16/2015 1191
Data Customer Analytics Key to Top 10 Critical Business Success Factors Information Management 11/16/2015 1191
Bit bucket How to Get People to Agree With You Fast Company 11/16/2015 1191
Security Security Issues Cause Some to be Named Top Tech Turkeys Of 2015 CSO Online 11/16/2015 1191
Cloud 15 Cool Cloud Companies and Their Even Cooler Products CRN 11/16/2015 1191
Bit bucket The Top 3d Printers According to Make Magazine ComputerWorld 11/16/2015 1191
Bit bucket How to Solve today's Top Three Virtual Environment Challenges Network World 11/13/2015 1194
Connectivity When It Comes to Enterprise Network Security, Less is More Network World 11/13/2015 1194
Connectivity Internet of Things: 5 Real-World Reasons It's not Going Away NetworkComputing 11/13/2015 1194
Security The Dark Side of Layered Security CSO Online 11/13/2015 1194
Bit bucket Apple History: First Photos of Vast Collection ZDnet 11/12/2015 1195
Cloud The Private Cloud Offers a Good Use Case for Object Storage The Register 11/12/2015 1195
Security Self-Encrypting Drives are Hardly Any Better than Software-Based Encryption Network World 11/12/2015 1195
Data 6 Ways Big Data is Driving Personalized Medicine Revolution InformationWeek 11/12/2015 1195
Connectivity Don't Bother: Why You don't Want to Wirelessly Charge Your Smartphone How To Geek 11/12/2015 1195
Security Six Reasons Why Boards of Directors Must Be Engaged in Cybersecurity CSO Online 11/12/2015 1195
Management Half of U.S. Businesses Have No Formal BYOD Policy for Security ComputerWorld 11/12/2015 1195
Management 4 Ways CIOs can Speak Better CFO CIO 11/12/2015 1195
Bit bucket Top 10 Priorities for a Successful Hadoop Implementation TechRepublic 11/11/2015 1196
Bit bucket 30-plus Eye-Popping Black Friday 2015 Tech Deals Network World 11/11/2015 1196
Cloud 11 Top IaaS Cloud Computing Certifications Network World 11/11/2015 1196
Management 10 Skills CIOs Need to Survive, Thrive In 2016 InformationWeek 11/11/2015 1196
Bit bucket Categorizing Numeric Variables -- a Cautionary Tale Information Management 11/11/2015 1196
Security 7 Tips to Becoming a Successful CISO CSO Online 11/11/2015 1196
Technology 6 Exciting Technology Trends that Will Dominate 2016 Business 2 Community 11/11/2015 1196
Administration How to Avoid a Data Center Overrun with Idle Servers Network World 11/10/2015 1197
Data 10 Reasons Data Centers Fail NetworkComputing 11/10/2015 1197
Connectivity Is 'Private' Enterprise WiFi Obsolete? InformationWeek 11/10/2015 1197
Security The Biggest Misconception about Information Security Information Management 11/10/2015 1197
Bit bucket 5 Ways To Tell If You're a Micromanager Fast Company 11/10/2015 1197
Security Why Threat Intelligence Feels Like A Game Of Connect Four Dark Reading 11/10/2015 1197
Bit bucket 10 Riskiest Applications that Have Passed their Expiration Dates CSO Online 11/10/2015 1197
Bit bucket How Secure Can Your Router Get? ComputerWorld 11/10/2015 1197
Management Think Your IT Project Is a Disaster? These'll Make You Feel Better ComputerWorld 11/10/2015 1197
Data How Big Data Is Changing the Database Landscape for Good ComputerWorld 11/10/2015 1197
Bit bucket Carbon Nanotubes In a Race Against Time to Replace Silicon ComputerWorld 11/10/2015 1197
Data Keep Sensitive Data Safe With These 5 Secure USB Drives ZDnet 11/09/2015 1198
Compliance Flash Storage: Is There a Tipping Point Anytime Soon? ZDnet 11/09/2015 1198
Connectivity 7 Ways Hackers can Use Wi-Fi Against You Network World 11/09/2015 1198
Cloud Cloud-Knackered Disease: The Effects of the Data Breach Epidemic Network World 11/09/2015 1198
Storage 10 Reasons Why Phishing Attacks are Nastier Than Ever Network World 11/09/2015 1198
Security The Transformative Technology Security Nightmare HelpNet Security 11/09/2015 1198
Security Need for Cyber-Insurance Heats Up, But the Market Remains Immature IT World 11/09/2015 1198
Bit bucket US Regulator Shoots down 'Do Not Track' Requirement IT News 11/09/2015 1198
Security Wine Cellars, Security, and Standards: Vint Cerf on IoT InfoWorld 11/09/2015 1198
Data Big Data Investments Pay Off Big, but Oh Those Costs Information Management 11/09/2015 1198
Bit bucket Hiring Wisdom: Top 10 Ways to Guarantee You Hire the Wrong Person TLNT 11/09/2015 1198
Cloud 8 Biggest Cloud Mistakes Companies Make NetworkComputing 11/08/2015 1199
Bit bucket 10 Things the New Star Trek Series Needs InformationWeek 11/08/2015 1199
Data The Impact Data Has on Making Informed Marketing Decisions Business 2 Community 11/08/2015 1199
Data What Good Data can Do Business 2 Community 11/08/2015 1199
Data Are You Overlooking Tokenization as a Data Security Measure? Network World 11/06/2015 1201
Management Most Employees are Not Malicious, But Their Carelessness Can be Just As Damaging HelpNet Security 11/06/2015 1201
Bit bucket What Can You Do When You Can't chmod chmod? IT World 11/06/2015 1201
Compliance WA Auditors Guess Govt Database Passwords on First Attempt IT News 11/06/2015 1201
Technology Toyota Creates $1 Billion AI, Robotics Institute in US InformationWeek 11/06/2015 1201
Data What the Boardroom Thinks about Data Breach Liability Dark Reading 11/06/2015 1201
Security What Flu Season Can Teach Us about Fighting Cyberattacks Dark Reading 11/06/2015 1201
Connectivity U.S. Readies for Space Storms that Could Crash Critical Networks ComputerWorld 11/06/2015 1201
Data These Data Centers are Insanely Gorgeous TechRepublic 11/05/2015 1202
Management 007 Tips for Keeping Your Business as Secure s MI6 Network World 11/05/2015 1202
Management IT Vendor Risk Management: Improving but Still Inadequate Network World 11/05/2015 1202
Cloud Considering the Hybrid Cloud? Here's What You'll Need to Consider Network World 11/05/2015 1202
Connectivity 8 Open Networking Terms to Know NetworkComputing 11/05/2015 1202
Cloud Business Leaders Increasingly Drive Cloud Migration HelpNet Security 11/05/2015 1202
Technology Can Artificial Intelligence Influence Human Behavior? A Trial will Find Out IT World 11/05/2015 1202
Bit bucket Five Things You Should Know about Unlicensed LTE IT World 11/05/2015 1202
Bit bucket 14 Hidden Tips & Tricks to Make the Most of Your New iPhone 6s IT World 11/05/2015 1202
Bit bucket 14 Strange but True Tech Facts You (Probably) Don't Know IT World 11/05/2015 1202
Data Do Data Big, or Die in 2016, Warns Big Data Veteran Information Management 11/05/2015 1202
Data America's Big Data Obesity Problem Information Management 11/05/2015 1202
Security How to Not Get Fired as CISO CSO Online 11/05/2015 1202
Bit bucket Longer-Lasting, 3D Solid-State Batteries could Displace Lithium-Ion ComputerWorld 11/05/2015 1202
Bit bucket TPP Revealed: What The Trade Deal Means For Online Copyright ComputerWorld 11/05/2015 1202
Data Data Quality Comes before Data Visualization Business 2 Community 11/05/2015 1202
Bit bucket The International Space Station: Reveling at 15 Network World 11/04/2015 1203
Cloud You Moved to the Cloud ... The Internet's Down. Now What? Network World 11/04/2015 1203
Bit bucket Improving Customer Experiences (CX): 10 Ways IT can Help InformationWeek 11/04/2015 1203
Data The Big Data Odyssey Information Management 11/04/2015 1203
Data 7 Factors Limiting Benefits of Big Data in Healthcare Information Management 11/04/2015 1203
Storage 5 Disaster Recovery Options: Balancing the Pros and Cons, Objectives, and Cost Disaster Recovery Journal 11/04/2015 1203
Data BYOD 2015: Data Loss, Data Leaks & Data Breaches Dark Reading 11/04/2015 1203
Security Five Moves for Every New CISO's Playbook CSO Online 11/04/2015 1203
Bit bucket Quick As a Flash: NVMe Will Have You in Tiers The Register 11/03/2015 1204
Bit bucket The Top 10 Apps that Companies Hate Network World 11/03/2015 1204
Bit bucket 14 DRaaS Vendors that Will Rescue You In a Pinch Network World 11/03/2015 1204
Bit bucket The Sorry State of Certificate Revocation InfoWorld 11/03/2015 1204
Cloud In The Cloud, Beware the Sinking Ships InfoWorld 11/03/2015 1204
Bit bucket 8 Ways to Leverage Location Services Network World 11/02/2015 1205
Data The 4 Commandments of Basic Data Security InfoWorld 11/02/2015 1205
Bit bucket Ways to Quit Sitting: 8 Unique Desk Options InformationWeek 11/02/2015 1205
Management Despite Best Intentions, Most Organizations Misinterpret, Misuse Data Information Management 11/02/2015 1205
Bit bucket Three Words to Improve Disaster Outcomes Emergency Management 11/02/2015 1205
Bit bucket IPv6 and the Growing DDoS Danger Dark Reading 11/02/2015 1205
Bit bucket Drone Registration Recommendations Handed to FAA ComputerWorld 11/02/2015 1205
Bit bucket Don't Throw Out that Old Phone - Turn It Into a Privacy Device ComputerWorld 11/02/2015 1205
Connectivity Tips to Keep Your Organization's Network and Data Safe Business 2 Community 11/02/2015 1205
Bit bucket The Answer to Wasted IT Investment: Spend, Spend, Spend! Network World 10/31/2015 1207
Bit bucket 20 Terrifying PC Horror Games to Play with the Lights Off InfoWorld 10/31/2015 1207
Security 7 Elements of Modern Endpoint Security Dark Reading 10/31/2015 1207
Bit bucket We Are Entering the Data-Aware Infrastructure Era The Register 10/30/2015 1208
Bit bucket Have A Plan A, and Plan B - Just Don't Go Down With the Ship The Register 10/30/2015 1208
Bit bucket Scientists Get First Glimpse of Conductivity that Could Break Size Barriers for Memory Science Daily 10/30/2015 1208
Bit bucket 7-Eleven Takes a Big Gulp of Customer Data Network World 10/30/2015 1208
Bit bucket Beware the 'Black Swans' In Your Supply Chain Network World 10/30/2015 1208
Bit bucket 5 Dead Operating Systems, and What Their Ghosts Can Tell Us IT World 10/30/2015 1208
Bit bucket 10 Scariest Bosses: a Survival Guide InformationWeek 10/30/2015 1208
Data 14 Creepy Ways to Use Big Data InformationWeek 10/30/2015 1208
Data Big Data and Machine Learning Lessons from Google Photos Information Management 10/30/2015 1208
Data Operationalize Predictive Analytics for Significant Business Impact Information Management 10/30/2015 1208
Compliance How Flash has Directly Caused Storage Industry Consolidation eWeek 10/30/2015 1208
Security The Dawn of Lights-Out Security Dark Reading 10/30/2015 1208
Bit bucket Fluffy Carbon Electrodes Bring Lithium-Air Batteries Closer to Reality ComputerWorld 10/30/2015 1208
Bit bucket Farming on Mars? The Martian Raises Questions about Soil Science Daily 10/29/2015 1209
Compliance Tackling Big Data: Storage and Transfer Science Daily 10/29/2015 1209
Data Parks Canada CIO Maps Out the Agency's Long-Term Data Management Strategy IT World Canada 10/29/2015 1209
Connectivity Harder than Herding Cats: Networks Seek International Agreement on New Mobile Spectrum IT World 10/29/2015 1209
Administration Why Client-Server Must Die InfoWorld 10/29/2015 1209
Data How to Advance an Organization's Data Culture Information Management 10/29/2015 1209
Management Many Organizations Ignore Full Value of Customer Data, says Gartner Information Management 10/29/2015 1209
Security Machine Learning is Cybersecurity's Latest Pipe Dream Dark Reading 10/29/2015 1209
Security 6 Tips for Your Security Awareness Training Network World 10/28/2015 1210
Bit bucket Best-Dressed Techies? Retail Startup Designs Khakis and T-Shirts for IT Network World 10/28/2015 1210
Storage SSD Pricing Vs. HDD Costs NetworkComputing 10/28/2015 1210
Bit bucket Social Experiment: 200 USB Flash Drives Left in Public Locations HelpNet Security 10/28/2015 1210
Bit bucket Why IBM Bought the Weather Channel: My Quick Thoughts Information Management 10/28/2015 1210
Management The Global CISO: Why U.S. Leaders must Think Beyond Borders Dark Reading 10/28/2015 1210
Operations Honda Unveils Hydrogen-Powered Car with 400-Mile Range ComputerWorld 10/28/2015 1210
Bit bucket Sonic Tractor Beam Moves Stuff with Sound Science Daily 10/27/2015 1211
Bit bucket LTE-U: A Quick Explainer Network World 10/27/2015 1211
Management Are your IT Certifications Killing Your Career? Network World 10/27/2015 1211
Security Judge Suggests DOJ Wants Apple to Work for Government by Unlocking Encrypted iPhone Network World 10/27/2015 1211
Cloud 10 Riskiest Cloud Services IT World 10/27/2015 1211
Cloud Pekin Insurance to Move Its Legacy Systems to the Cloud Insurance Networking 10/27/2015 1211
Security Encryption Is Under Siege. Move to SHA-2 Now! InfoWorld 10/27/2015 1211
Compliance 5 Bitter Truths about Software-Defined Storage InfoWorld 10/27/2015 1211
Bit bucket How to Stick It to Craigslist Scammers InfoWorld 10/27/2015 1211
Cloud Personal vs. Corporate Cloud Apps: Who Wins on Security? Information Management 10/27/2015 1211
Management Bad News is Good News for Security Budgets But Not Skills Dark Reading 10/27/2015 1211
Bit bucket Five Predictions for the EU-U.S. Safe Harbor Showdown ComputerWorld 10/27/2015 1211
Operations Operations Costs Are the Achilles' Heel of NoSQL ComputerWorld 10/27/2015 1211
Data The Rise of Big Data Marketplaces ComputerWorld 10/27/2015 1211
Management 6 Business Lessons of Rock, Paper, Scissors CIO 10/27/2015 1211
Cloud CIO Insight: DVLA CTO on Overhauling Monolithic IT Infrastructure for the Cloud Era v3 co uk 10/26/2015 1212
Management How Long Does It Take for Employees to be Security Conscious? Network World 10/26/2015 1212
Connectivity 7 Basic Network Security Mistakes You're Probably Making NetworkComputing 10/26/2015 1212
Bit bucket From Start to Finish, Inside a PayPal Phishing Scam IT World 10/26/2015 1212
Bit bucket Australia Goes Hi-Tech to Tame Shark Attack Fears IT World 10/26/2015 1212
Data 7 Steps to IoT Data Security InfoWorld 10/26/2015 1212
Bit bucket How to Thrive In the Coming Tech Gig Economy InfoWorld 10/26/2015 1212
Bit bucket A Little Hardware Goes a Long, Long Way InfoWorld 10/26/2015 1212
Bit bucket BNY Mellon Transforms IT One Step At a Time InformationWeek 10/26/2015 1212
Data Majority of Doctors Lack Important Electronic Data on Their Patients Information Management 10/26/2015 1212
Data Poaching On the Rise for Big Data Pros Information Management 10/26/2015 1212
Management Top 10 CIO Concerns for 2016 Information Management 10/26/2015 1212
Data Top 10 Pure Big Data Companies Information Management 10/26/2015 1212
Management New Approaches to Vendor Risk Management Dark Reading 10/26/2015 1212
Data Why Your Company needs Data Analytics Business 2 Community 10/25/2015 1213
Bit bucket Capacitor Breakthrough Science Daily 10/24/2015 1214
Bit bucket Hiring Good Tech People: Where to Start? Network World 10/24/2015 1214
Technology Scalable Quantum Computer Design Science Daily 10/23/2015 1215
Cloud Five Ways Shadow IT in the Cloud Hurts Your Enterprise Network World 10/23/2015 1215
Cloud Turning to Cloud-Based Analytics to Manage IT Asset Costs Network World 10/23/2015 1215
Bit bucket Nearly Everyone Dislikes CISA, So Congress will Make it Law InfoWorld 10/23/2015 1215
Bit bucket You've Been Attacked. now What? Dark Reading 10/23/2015 1215
Management Tales of the Tape: 6 LTO-7 Technology Strategies CRN 10/23/2015 1215
Security Are Wearables Worth the Cybersecurity Risk in the Enterprise? Network World 10/22/2015 1216
Security 7 Big Threats to Innovation and How to Overcome Them Network World 10/22/2015 1216
Cloud U.S. CIO Tells IT Leaders to Trust the Cloud Network World 10/22/2015 1216
Bit bucket How to Become an Independent IT Consultant Network World 10/22/2015 1216
Bit bucket Wait, We Have to Expedite That! Information Management 10/22/2015 1216
Security 5 Steps for Effective Threat Monitoring Dark Reading 10/22/2015 1216
Bit bucket Don't Overdo with Biometrics, Expert Warns ComputerWorld 10/22/2015 1216
Technology Back to the Future Day: A look at our Technology in 2045 ZDnet 10/21/2015 1217
Bit bucket Researchers Warn Computer Clocks can be Easily Scrambled Network World 10/21/2015 1217
Bit bucket Malvertising - The new Silent Killer? Network World 10/21/2015 1217
Bit bucket How to Unleash the Potential of Your B Players Network World 10/21/2015 1217
Administration 9 Tools to Help You Manage Your Pet Servers IT World 10/21/2015 1217
Bit bucket The Three Speeds of Insurance IT: Fast, Super-Fast, and Hyper-Fast Insurance Networking 10/21/2015 1217
Cloud A Move to the Cloud Is No Simple Calculation InfoWorld 10/21/2015 1217
Security Free Web Security Certificates coming Soon InformationWeek 10/21/2015 1217
Bit bucket The Secret to Sounding Smart? Using Simple Language Fast Company 10/21/2015 1217
Bit bucket The Good Things You Can Learn from Bad People TLNT 10/21/2015 1217
Cloud Navigating New Security Architectures for Cloud Data Centers Dark Reading 10/21/2015 1217
Security Passing the Sniff Test: Security Metrics and Measures Dark Reading 10/21/2015 1217
Security Boards are Getting More Involved in Cybersecurity, But is It Enough? CSO Online 10/21/2015 1217
Security What It Takes to Be a Successful CISO CSO Online 10/21/2015 1217
Management Day in the life of a social CIO: LPL Financial's Victor Fetter CIO 10/21/2015 1217
Technology Our Intuitive AI Outperforms (most) Puny Humans, Claims MIT The Register 10/20/2015 1218
Data Lotus F1: 38C? Sand in Your Vblocks? Must be Building A Data Center in Bahrain Again The Register 10/20/2015 1218
Bit bucket What's Hot in Driverless Cars? Network World 10/20/2015 1218
Cloud How a Tea Kettle Can Kill Your Cloud Network World 10/20/2015 1218
Cloud How Higher Ed IT Is Staying Ahead of the Cloud Computing Curve Network World 10/20/2015 1218
Technology 2015 Technology Industry Graveyard Network World 10/20/2015 1218
Connectivity Why Everyone Should Care about Two-Factor Authentication HelpNet Security 10/20/2015 1218
Connectivity Strengthen Your Network Security with Passive DNS InfoWorld 10/20/2015 1218
Cloud Hybrid Cloud: 7 Ways It's the Best of Both Worlds InformationWeek 10/20/2015 1218
Security What's a Blockchain? And Is it Heading for Prime Time? IDG Connect 10/20/2015 1218
Security Building a Winning Security Team from the Top Down Dark Reading 10/20/2015 1218
Security Crypto Researchers: Time to Use Something Better than 1024-Bit Encryption Network World 10/19/2015 1219
Bit bucket When Mobile and Mainframes Mix, the Results are Spectacular Network World 10/19/2015 1219
Cloud Meet the Real Architects of Tomorrow's Enterprise Cloud InfoWorld 10/19/2015 1219
Management Data-Driven Endpoint Management Explained Information Management 10/19/2015 1219
Data Predictive Analytics Business Case is Simpler Than You Think Information Management 10/19/2015 1219
Bit bucket It Doesn't Pay to Joke Around About the FMLA - Or Employees Who Request It TLNT 10/19/2015 1219
Cloud Enterprises Are Leaving Cloud Security Policies to Chance Dark Reading 10/19/2015 1219
Cloud IT Departments Must Transform In the Face of the Cloud Revolution ComputerWorld 10/19/2015 1219
Bit bucket How Managing Employee Stress Leads to a Healthier Company CIO 10/19/2015 1219
Cloud Demystifying Cloud Storage: 6 Reasons Your Business should Use It Business 2 Community 10/19/2015 1219
Connectivity 5 New Networking Requirements Driven by Internet of Things and Big Data Business 2 Community 10/19/2015 1219
Bit bucket FAQ: The FCC's Upcoming Broadcast-TV Spectrum Auction IT World 10/17/2015 1221
Bit bucket Before Adding Solid-State Drives, Right-Size Your Infrastructure using Workload Profiling Network World 10/16/2015 1222
Bit bucket BYOD is as Entrenched (and Complicated) as Ever Network World 10/16/2015 1222
Technology Six Key Challenges Loom over Car Communication Technology Network World 10/16/2015 1222
Management The National Film Board's CTO Offers a Close-up Look at its Digital Archiving Project IT World Canada 10/16/2015 1222
Data Big Data's Impact on Insurance Modeling Information Management 10/16/2015 1222
Connectivity The Internet of Things: It's All about Trust Dark Reading 10/16/2015 1222
Connectivity The Internet of Things: It's All About Trust Dark Reading 10/16/2015 1222
Bit bucket From 55 Cents to $1,200: The Value Chain for Stolen Data Dark Reading 10/16/2015 1222
Cloud Who Is Responsible for Security In the Cloud CSO Online 10/16/2015 1222
Bit bucket Why We need Behavior-Centric Detection And Response CSO Online 10/16/2015 1222
Connectivity IoT is Here and Mobile Networks Will Never Be the Same Network World 10/15/2015 1223
Connectivity Can Myriad Wireless Networks Connect as One Fast, Secure System? Network World 10/15/2015 1223
Cloud The Cloud Changes IT Culture, Demands new Tech Skills Network World 10/15/2015 1223
Security Existing Security Standards do not Sufficiently Address IoT HelpNet Security 10/15/2015 1223
Data Mind Your Analytics - Or Get Ready for Ethical Hot Water IT World 10/15/2015 1223
Data The 10 Best Paying Big Data Career Skills Insurance Networking 10/15/2015 1223
Bit bucket An Atypical Approach to DNS Dark Reading 10/15/2015 1223
Security Why Visibility and Control Are Critical for Container Security Network World 10/15/2015 1223
Compliance Where Will Storage Go Over the Next 15 Years? We Rub Our Crystal Ball The Channel Register 10/15/2015 1223
Technology Technology Scares the Hell Out of People, University Survey Finds Network World 10/14/2015 1224
Bit bucket 8 Tips for Running a Successful Remote Meeting Network World 10/14/2015 1224
Data Is Big Data Success Eluding You? IT World Canada 10/14/2015 1224
Bit bucket Secret to Successful Teams: Lead Them with Laughter InformationWeek 10/14/2015 1224
Data Big Data Analytics Raises Ethical Risks Information Management 10/14/2015 1224
Connectivity Vint Cerf and 260 Experts Give FCC a Plan to Secure Wi-Fi Routers ComputerWorld 10/14/2015 1224
Data ESPN Analytics Chief: Using Data to Call the Shots Business 2 Community 10/14/2015 1224
Bit bucket Toward Clearer, Cheaper Imaging of Ultrafast Phenomena Science Daily 10/13/2015 1225
Compliance Data Storage of the Future: Scientists Crack Secret of Making Stable, Dynamic Skyrmions Science Daily 10/13/2015 1225
Bit bucket DARPA wants Vanishing Drones Network World 10/13/2015 1225
Management 5 Practical Project Management Certifications Network World 10/13/2015 1225
Security SANS: 20 Critical Security Controls You Need to Add IT World 10/13/2015 1225
Security The Most Important Security Question to Ask Users InfoWorld 10/13/2015 1225
Cloud A Better Approach to Cloud Encryption InfoWorld 10/13/2015 1225
Security Prolific Cybercrime Gang favors Legit Login Credentials Dark Reading 10/13/2015 1225
Bit bucket Is There a White-Box Switch In Your Future? (Video) Network World 10/12/2015 1226
Cloud Has the NSA Balkanized the Cloud Market? Network World 10/12/2015 1226
Bit bucket 10 New Words You Need to Know in Silicon Valley Network World 10/12/2015 1226
Bit bucket Dancing on the Grave of Flash Network World 10/12/2015 1226
Connectivity Don't Sink Your Network HelpNet Security 10/12/2015 1226
Connectivity The ROI of IoT: How to Make the Internet of Things Benefit Your Bottom Line IT Business Canada 10/12/2015 1226
Bit bucket Court Finds It Only Takes One Incident to Have a Hostile Work Environment TLNT 10/12/2015 1226
Bit bucket Ideas are Better than Ideology ComputerWorld 10/12/2015 1226
Connectivity Encryption and Surveillance: The Unstoppable Force and the Immovable Object of the Internet Age ZDnet 10/11/2015 1227
Storage NASA's Mars Journey: Next Steps for Mankind InformationWeek 10/11/2015 1227
Data How to Prevent Improper Use of Big Data Analytics? CIOL 10/10/2015 1228
Data Predictive Analytics Are the Future of Big Data v3 co uk 10/09/2015 1229
Connectivity How to Choose the Right Mobile Hotspot Network World 10/09/2015 1229
Cloud 7 Warnings to Heed Before a Cloud Migration Network World 10/09/2015 1229
Bit bucket Adidas to 3D Print Custom Insoles in Sneakers IT World 10/09/2015 1229
Bit bucket 10 Enthralling Visions for the Future of Computing InfoWorld 10/09/2015 1229
Bit bucket Teach Your Execs Well: Stop Phishing in the C-Suite InfoWorld 10/09/2015 1229
Data NASA's Apollo Archive: 10 Fascinating Images InformationWeek 10/09/2015 1229
Cloud What You should Know About Using Third-Party Cloud Management Tools Data Center Knowledge 10/09/2015 1229
Bit bucket Data Deletion: A Disconnect Between Perception and Reality Dark Reading 10/09/2015 1229
Cloud 20 Steps: How to Know You're Ready for the Cloud Network World 10/08/2015 1230
Bit bucket Dispelling the Myths of Hybrid Hosting Network World 10/08/2015 1230
Cloud 5 Tips on Cloud Migration from Those Who Know (With Video) Network World 10/08/2015 1230
Technology Pen-Testing Drone Searches for Unsecured Devices HelpNet Security 10/08/2015 1230
Security Cybersecurity is Being Taken Seriously Around the Globe HelpNet Security 10/08/2015 1230
Cloud CIOs Describe the 'Perfect Storms' That Drove Them to Cloud Computing IT World Canada 10/08/2015 1230
Data Big Data Makes a Difference At Penn Medicine IT World 10/08/2015 1230
Bit bucket Corporate VPNs in the Bullseye Dark Reading 10/08/2015 1230
Security From Gatehouse to Boardroom: The Changing Role of IT Security Continuity Central 10/08/2015 1230
Security U.S. Won't Seek Law to Ban Encryption ComputerWorld 10/08/2015 1230
Data Theoretical Computer Science Provides Answers to Data Privacy Problem Science Daily 10/07/2015 1231
Security Former NSA Chief Undercuts FBI's Desire For Encryption Backdoors Network World 10/07/2015 1231
Bit bucket The 13 Things the Perfect Laptop Has to Have Network World 10/07/2015 1231
Data Gartner: Risk, Relentless Data Center Demand, Open Source and Other Tech Trends IT Needs To Know Network World 10/07/2015 1231
Bit bucket IT Monitoring & the Five Stages of Grief NetworkComputing 10/07/2015 1231
Security What Will the CISOs of 2020 Look Like? CSO Online 10/07/2015 1231
Security Survey Says Enterprises are Stepping Up their Security Game CSO Online 10/07/2015 1231
Bit bucket 18 Tough Certifications that Are Worth the Effort CRN 10/07/2015 1231
Bit bucket Out of Focus: The Multitasking Dilemma ComputerWorld 10/07/2015 1231
Connectivity Worries Mount over Upcoming LTE-U Deployments Hurting Wi-Fi Network World 10/06/2015 1232
Security When It Comes to Security, Trust but Verify Network World 10/06/2015 1232
Management Gartner: Top 10 Strategic Predictions that Could Shake Up IT Network World 10/06/2015 1232