IT Weekly

NEWSLETTER

Dec 11, 2018


Every week we bring you more than 40+ relevant online sources that contain articles of interest to IT and DC Professionals at all levels
Header


Browse by Technology
Browse by Year

Header

Header

Header
Category Articles From 2016 Source Posted Date Age
Security 5 Signs We're Finally Getting Our Act Together on Security Network World 12/29/2016 712
Bit bucket 5 Key Technologies to Double Down on Now InfoWorld 12/29/2016 712
Data The Year of Big Data: What to Expect in 2017 Information Management 12/29/2016 712
Security The Reporting Line of the CISO is Key to Success Business 2 Community 12/29/2016 712
Data 7 Reasons Why Data Visualization is Better than Your Best Excel Charts and Graphs Business 2 Community 12/29/2016 712
Bit bucket 9 Technologies that IT Needed but Didn't Get in 2016 Network World 12/28/2016 713
Connectivity 5 Reasons to Automate Your Network Network World 12/28/2016 713
Data What to Do If Your Data is Taken Hostage IT World 12/28/2016 713
Data How to Make Sure Your Data Doesn't Crash and Burn IT World 12/28/2016 713
Security Encryption in 2016: Small Victories Add Up InfoWorld 12/28/2016 713
Cloud Cloud Computing Explained: SaaS, PaaS, and IaaS Business 2 Community 12/28/2016 713
Connectivity Will Networks and Security Converge In 2017? Network World 12/27/2016 714
Connectivity First Look: Wave 2 Wi-Fi Access Points Show Promise Network World 12/27/2016 714
Management Machine Learning: From Science Project to Business Plan InfoWorld 12/27/2016 714
Security 6 Top IT Security Trends for 2017 Information Management 12/27/2016 714
Security 8 Boldest Security Predictions for 2017 Dark Reading 12/27/2016 714
Security Corporate Boards aren't Prepared for Cyberattacks Network World 12/26/2016 715
Security Corporate Boards Aren't Prepared For Cyberattacks Network World 12/26/2016 715
Technology Weird Science! 10 Strangest Tech Stories of 2016 IT World 12/26/2016 715
Connectivity Google and Facebook: It's Your Job to Fix a Broken Internet InfoWorld 12/26/2016 715
Technology Tips for New Tech Devices ComputerWorld 12/26/2016 715
Compliance Object Storage Product Survey 2016: The Big Six ComputerWeekly 12/26/2016 715
Bit bucket DoJ: What does it Take to Prosecute Federal Computer Crimes? Network World 12/25/2016 716
Bit bucket Systems Admin Role isn't Dead Network World 12/23/2016 718
Bit bucket New Accounting Standards Change the Rules of IT Leasing IT World 12/23/2016 718
Security What Fake News Means for IT-and How IT Security Can Help Fight It CSO Online 12/23/2016 718
Management The 10 Best Business Lessons of 2016 Fast Company 12/22/2016 719
Technology The Future of Robotics: 10 Predictions for 2017 and Beyond ZDnet 12/22/2016 719
Security Encryption Backdoors are Against US National Interest, say Lawmakers ZDnet 12/22/2016 719
Cloud Predicting the End of Cloud Computing Network World 12/22/2016 719
Storage NASA's "Human Computers" and the Hidden Figures Movie Story Network World 12/22/2016 719
Bit bucket Why Monitoring Needs to be Reinvented Network World 12/22/2016 719
Bit bucket Event-Driven Infrastructure and the Move to Higher Worlds Network World 12/22/2016 719
Connectivity 5 WiFi Networking Predictions for 2017 NetworkComputing 12/22/2016 719
Security 2017 may be the year of the battle over encryption, again IT World Canada 12/22/2016 719
Technology Experts Split On How Soon Quantum Computing Is Coming, But Say We Should Start Preparing Now IT World 12/22/2016 719
Administration Serverless Architecture - Too Good to Be True? Business 2 Community 12/22/2016 719
Bit bucket The 3 Layers of Data Business 2 Community 12/22/2016 719
Data Hackers and Passwords: Your Guide to Data Breaches cnet 12/21/2016 720
Bit bucket The Weirdest, Wackiest and Coolest Sci/Tech Stories of 2016 Network World 12/21/2016 720
Compliance Storage Industry: 9 Hot Trends for 2017 NetworkComputing 12/21/2016 720
Data Security Analytics: Don't Let Your Data Lake Turn into a Data Swamp Dark Reading 12/21/2016 720
Bit bucket 10 Absolute Best Games of 2016 ComputerWorld 12/21/2016 720
Data What Can Data Visualization Learn from Punks? ComputerWorld 12/21/2016 720
Compliance 5 Reasons Why Internal Audit May Be the Best Place for the Risk Manager to Sit LinkedIn 12/20/2016 721
Security All Email Should be Encrypted Computing Now 12/20/2016 721
Bit bucket 5 Steps to Personal Greatness Success 12/20/2016 721
Bit bucket The Ethernet Ecosystem Today Is Driven by Applications, Not Speed Alone Network World 12/20/2016 721
Bit bucket Use Virtual Containers to Isolate Ransomware Network World 12/20/2016 721
Bit bucket Identity verification: The New Turing Test Network World 12/20/2016 721
Technology IoT Could be Our Downfall Network World 12/20/2016 721
Management Real Edge Computing will Enable New Business Models Network World 12/20/2016 721
Cloud How to Create a Cloud Security Strategy IT World Canada 12/20/2016 721
Management Why Every CIO Needs To Be a Hands-on Leader to Succeed IT World 12/20/2016 721
Security Maybe Security Isn't Going to Get Better After All InfoWorld 12/20/2016 721
Cloud Your Cloud Strategy must Include No-Cloud Options InfoWorld 12/20/2016 721
Bit bucket Innovation Is a Team Sport InformationWeek 12/20/2016 721
Cloud How Cloudy is the Data Center's Future? Data Center Knowledge 12/20/2016 721
Cloud 20 Questions Security Pros Should Ask Themselves Before Moving to the Cloud Dark Reading 12/20/2016 721
Cloud The Top Five Cloud Trends for 2017 Continuity Central 12/20/2016 721
Security Commercial Drones: 2017's new Terrorism Threat Continuity Central 12/20/2016 721
Bit bucket Virtual Reality is Actually Here ComputerWorld 12/20/2016 721
Data Deadlines for Investigating and Reporting Data Breaches HelpNet Security 12/19/2016 722
Bit bucket The End of Passwords? Not in the Near Future TechRepublic 12/19/2016 722
Data The New Rulers of the Cybersecurity Realm: Automation, Analytics Artificial Intelligence Network World 12/19/2016 722
Data 5 most Common Data Privacy Misconceptions Network World 12/19/2016 722
Bit bucket 5 Enterprise Technologies that Will Shake Things Up in 2017 Network World 12/19/2016 722
Connectivity Network Troubleshooting from the User Perspective NetworkComputing 12/19/2016 722
Management What It Takes to be a Great Project Manager IT World 12/19/2016 722
Security What 2017 Has in Store for Cybersecurity IT World 12/19/2016 722
Bit bucket AI Is Late: 3 Things to Accelerate It InformationWeek 12/19/2016 722
Security Vulnerabilities and Exploits: What You Need to Know Business 2 Community 12/19/2016 722
Bit bucket The 5 Biggest Tech Trends of 2016 ZDnet 12/18/2016 723
Management Why Projects Fail: Project Management Lessons Business 2 Community 12/18/2016 723
Bit bucket How to Tell a Great Story without Rambling Endlessly Fast Company 12/17/2016 724
Bit bucket World's Smallest Radio Receiver has Building Blocks the Size of Two Atoms Science Daily 12/16/2016 725
Bit bucket The Next Wave Of IT: Where Do We Go from Here? ZDnet 12/16/2016 725
Data Worm on the Sensor: What Happens When IoT Data is Bad? Network World 12/16/2016 725
Bit bucket The Gifts You Didn't get: InfoWorld's 2016 Geek Gadget Guide IT World 12/16/2016 725
Management 12 Predictions for 2017 That Will Shape Your Business Business 2 Community 12/16/2016 725
Data Data Wrangling & The Future of Big Data Business 2 Community 12/16/0216 725
Data Technique Shrinks Data Sets for Easier Analysis Science Daily 12/15/2016 726
Bit bucket What's Next after Hyperconvergence? The Register 12/15/2016 726
Security 4 Ways Your Company can Avoid Yahoo-Level Stupidity in Enterprise Security TechRepublic 12/15/2016 726
Bit bucket 3 Areas of Hybrid Infrastructure Your Company Should Prioritize in 2017 TechRepublic 12/15/2016 726
Security Five Ways Cybersecurity is Nothing like the Way Hollywood Portrays It Network World 12/15/2016 726
Management Walking Dead can Teach You Valuable Security Lessons IT World 12/15/2016 726
Bit bucket Improving Your IT Resilience and Disaster Recovery Capability Continuity Central 12/15/2016 726
Technology Top 20 Technology-Driven Hard Trends Shaping the Future Business 2 Community 12/15/2016 726
Security ENISA Says Crypto Backdoors are a Bad Idea HelpNet Security 12/14/2016 727
Bit bucket 4 Real-Life Ways People Shut Down Interruptions for Good Fast Company 12/14/2016 727
Management 10 CEOs Share Their Secrets to Keeping Employees Motivated (and Happy) in December Fast Company 12/14/2016 727
Cloud 10 Examples of the AWS Path of Disruption Network World 12/14/2016 727
Security Top 15 Security Predictions for 2017 IT World 12/14/2016 727
Bit bucket Knowing the Manager You Really Are ComputerWorld 12/14/2016 727
Bit bucket BYOD: Large Firms Need Clarity from the Top, Not Ambiguity or Denial Business 2 Community 12/14/2016 727
Data Why Data Decays so Fast? Business 2 Community 12/14/2016 727
Bit bucket Hands-Free Just As Distracting as Handheld Mobile Phone Use Behind the Wheel Science Daily 12/13/2016 728
Management The New CISO Imperative: Solving the Information Management Paradox HelpNet Security 12/13/2016 728
Management How Emotionally Intelligent Bosses Resolve Conflicts Fast Company 12/13/2016 728
Management Time Management Experts Share Their Secrets for Staying Productive During the Holidays Fast Company 12/13/2016 728
Management Trump to Meet with Key US Tech Leaders: 6 Questions That Need to Be Answered TechRepublic 12/13/2016 728
Management 4 Tips for Managing a Diverse Project Team TechRepublic 12/13/2016 728
Bit bucket 10 Mistakes to Avoid When Troubleshooting IT Problems TechRepublic 12/13/2016 728
Bit bucket A Deep and Diverse Menu: VPNs for Any Needs Network World 12/13/2016 728
Connectivity 8 Ways the Network Will Change in 2017 NetworkComputing 12/13/2016 728
Connectivity The Internet of Things: When Bigger is Not Better Dark Reading 12/13/2016 728
Security 91% of Cyberattacks Start With a Phishing Email Dark Reading 12/13/2016 728
Connectivity Five Networking Trends for 2017 Continuity Central 12/13/2016 728
Technology Dear Engineers: Please Build Friendly Robots ComputerWorld 12/13/2016 728
Data 4 Statistics that Show Why We Must Bridge the Gap between Collecting Customer Data & Actually Using It Business 2 Community 12/13/2016 728
Bit bucket At the Edge of a Cognitive Space Science Daily 12/12/2016 729
Management 12 Tips for Implementing Secure Business Practices HelpNet Security 12/12/2016 729
Bit bucket Reducing Wan Complexity with SD-WAN Segmentation Network World 12/12/2016 729
Connectivity The Beginning of the End for Enterprise Network VLANs Network World 12/12/2016 729
Bit bucket Should You Buy an SD-WAN Service? Network World 12/12/2016 729
Management JetBlue CIO Drives Innovation through IT's 'Toolkit' IT World 12/12/2016 729
Security 5 Enterprise-Related Things You Can Do with Blockchain Technology Today InfoWorld 12/12/2016 729
Management The Non-IT CIO: Information Over Infrastructure InformationWeek 12/12/2016 729
Bit bucket Flash or SDS? Finding the Right Path for Your Infrastructure Information Management 12/12/2016 729
Data 12 Top Data and IT Trends to Expect in 2017 Information Management 12/12/2016 729
Connectivity What's Naughty & Nice about the Internet of Things Dark Reading 12/12/2016 729
Technology Disaster Recovery Testing: Technology Systems to Test DR ComputerWeekly 12/12/2016 729
Bit bucket 7 Technologies Shaking up Insurance Agents Insurance Networking 12/10/2016 731
Technology Six Tips For Practicing Safe Social Media HelpNet Security 12/09/2016 732
Security Why CISOs Succeed and Why They Leave Network World 12/09/2016 732
Data Managing the Hybrid Data Center NetworkComputing 12/09/2016 732
Technology The Future of AI Is Humans + Machines IT World 12/09/2016 732
Bit bucket How this Analyst Targeted a Phisher IT World 12/09/2016 732
Data Harnessing the Power of Social Media Analytics IT Web 12/09/2016 732
Cloud It's Not the Cloud, It's You Data Center Dynamics 12/09/2016 732
Security Why Video Game Publishers must Adopt Enforceable Security Standards Dark Reading 12/09/2016 732
Operations Your Own Motion could One Day Power Your Cell Phone ComputerWorld 12/09/2016 732
Management 10 Brain Teasing Questions to Ask When Interviewing IT Professionals TechRepublic 12/08/2016 733
Technology High Performance Graphene Photodetectors set Speed Record Science Daily 12/08/2016 733
Management Three Career Lessons My Micromanaging Boss Didn't Mean to Teach Me Fast Company 12/08/2016 733
Technology Bluetooth 5 Launched with Focus on IoT v3 co uk 12/08/2016 733
Bit bucket The Amazing Women Behind Hidden Figures Who Made the US Space Program Possible TechRepublic 12/08/2016 733
Security 7 Ways to Tighten Enterprise Social Media Security Network World 12/08/2016 733
Devops The DevOps Engineer Is an Optical Illusion InformationWeek 12/08/2016 733
Data 13 Top-Paying Database Skills for 2017 Information Management 12/08/2016 733
Devops Google Will Be Powered Completely by Clean Energy Next Year Data Center Knowledge 12/08/2016 733
Bit bucket From Carna to Mirai: Recovering from a Lost Opportunity Dark Reading 12/08/2016 733
Bit bucket Moore's Law Lives on with Speedy 7nm Mobile Chips Coming in 2018 ComputerWorld 12/08/2016 733
Bit bucket New Invention to Inspire New Night-Vision Specs Science Daily 12/07/2016 734
Technology The Early IoT Gets the Worm HelpNet Security 12/07/2016 734
Bit bucket Worried About Identity Theft? Then You Should Avoid these Password Pitfalls TechRepublic 12/07/2016 734
Bit bucket Just One Autonomous Car will Use 4,000 GB Of Data/Day Network World 12/07/2016 734
Administration Serverless: The Next Step in Cloud Computing's Evolution Network World 12/07/2016 734
Technology Which IoT Applications Work Best with Fog Computing? Network World 12/07/2016 734
Compliance 7 Ways Flash Storage is Gaining Momentum NetworkComputing 12/07/2016 734
Security Playing Cyber Defense is Not Enough to Win IT World 12/07/2016 734
Security Corporations Cite Reputational Damage as Biggest Cyber Risk Dark Reading 12/07/2016 734
Technology Biometric Technology Is Not a Cure-All for Password Woes Dark Reading 12/07/2016 734
Bit bucket 10 Hottest Tech Skills for 2017 ComputerWorld 12/07/2016 734
Compliance The Evolution of Datacenter Storage: from DAS to Hyperconverged and Distributed Business 2 Community 12/07/2016 734
Data Is Big Data Creating Big Problems for Marketing? Business 2 Community 12/07/2016 734
Data The Future of the Data Centre Is Within The Register 12/06/2016 735
Bit bucket Electric Cars That Charge in Minutes TechWorld 12/06/2016 735
Connectivity Companies Increasingly Looking for Hackers to Attack Their Networks Network World 12/06/2016 735
Security Common Security Mistakes in Collaboration Tools IT World 12/06/2016 735
Cloud Moving Truckloads of Data to the Cloud IT Web 12/06/2016 735
Security Web Gateways: 5 Big Security Challenges Dark Reading 12/06/2016 735
Bit bucket Say Goodbye to the MS-DOS Command Prompt ComputerWorld 12/06/2016 735
Technology Robots vs Cyborgs: Why AI is Really Just Intelligence Amplification Business 2 Community 12/06/2016 735
Security DDoS Trends, DNS Survey Signal Warnings to Infosec Pros IT World Canada 12/05/2016 736
Security Intentional or Not, Insider Threats are Real HelpNet Security 12/05/2016 736
Connectivity Most Email Authentication Implementations Fail HelpNet Security 12/05/2016 736
Management Beyond the Thank-You Note: Four Things to Do After Your Job Interview Fast Company 12/05/2016 736
Compliance R&D: Ultrahigh Density Optical Storage Researched at Kazan University Storage Newsletter 12/05/2016 736
Administration 7 Linux Predictions for 2017 Network World 12/05/2016 736
Bit bucket Microservices: The Infrastructure Impact NetworkComputing 12/05/2016 736
Cloud Security Pros Most Worried about Clouds, Mobile IT World 12/05/2016 736
Data Assembling a Top-Notch Insurance Analytics Team Insurance Networking 12/05/2016 736
Cloud Capital One Rides the Cloud to Tech Company Transformation ComputerWorld 12/05/2016 736
Security The Biggest Threat to Artificial Intelligence: Human Stupidity ZDnet 12/04/2016 737
Bit bucket How to Shoot a Drone Out of the Sky ComputerWorld 12/03/2016 738
Management Embrace Shadow IT, Says Panel of CIOs v3 co uk 12/02/2016 739
Security The Human Firewall: Why People are Critical to Email Security Dark Reading 12/02/2016 739
Bit bucket Imagine Every Mistake You Can Make With a New Software Rollout... The Register 12/01/2016 740
Security Best Practices for Lowering Cyber Insurance Costs and Cyber Risk Network World 12/01/2016 740
Connectivity How to Architect the Network So IoT Devices Are Secure Network World 12/01/2016 740
Connectivity How to Architect The Network So IoT Devices Are Secure Network World 12/01/2016 740
Bit bucket 20 Years Ago: Hot Sci/Tech Images from 1996 Network World 12/01/2016 740
Management CIO Battles Nuclear Industry Regulation in Digital Shift IT World 12/01/2016 740
Data 5 Ways Data Classification Can Prevent an Education Data Breach IT World 12/01/2016 740
Devops 10 Key Security Terms Devops Ninjas Need to Know InfoWorld 12/01/2016 740
Bit bucket Ready, Set, AIM! Data Center Dynamics 12/01/2016 740
Security Bitcoin Wallet Comparison: BTC vs XAPO Business 2 Community 12/01/2016 740
Bit bucket How to Safeguard & Protect Your Most Important Asset: Data Business 2 Community 12/01/2016 740
Bit bucket New Method to Improve Predictions Science Daily 11/30/2016 741
Bit bucket Do these Stimulants Actually Improve Focus? Fast Company 11/30/2016 741
Management What's the First Emotion you'd give an AI That Might Kill You? Yes, Fear The Register 11/30/2016 741
Bit bucket Your New Best Friend Could Be an AI TechWorld 11/30/2016 741
Bit bucket 2016 Will Be 1 Second Longer: Google can Help You Cope Network World 11/30/2016 741
Technology John Deere Leads the Way with IoT-Driven Precision Farming Network World 11/30/2016 741
Bit bucket The Return of the Infrastructure Engineer Network World 11/30/2016 741
Cloud Cool Tech at AWS re:Invent Network World 11/30/2016 741
Bit bucket What's In Store for Tech In 2017 Network World 11/30/2016 741
Security Who's on Your IT Security Dream Team? IT World 11/30/2016 741
Management Just Half of Organizations Employ Threat Intelligence Dark Reading 11/30/2016 741
Cloud Is the Cloud Really Just Someone Else's Computer? TechRepublic 11/29/2016 742
Management 10 Ways to Gracefully Kill An IT Project TechRepublic 11/29/2016 742
Bit bucket 5 Ways to Stay Positive When You're Having a Bad Day Success 11/29/2016 742
Connectivity Why Networking doesn't get Respect Anymore No Jitter 11/29/2016 742
Cloud How to Compare Cloud Costs Between Amazon, Microsoft and Google Network World 11/29/2016 742
Bit bucket Tips for building SD-WANs Network World 11/29/2016 742
Cloud The Metrics that Matter for Your Private/Hybrid Cloud Network World 11/29/2016 742
Bit bucket A Guide to VPN Basics NetworkComputing 11/29/2016 742
Bit bucket Driverless Vehicles & the IT Impact InformationWeek 11/29/2016 742
Cloud The Mission Critical Cloud: Designing an Enterprise Cloud Data Center Knowledge 11/29/2016 742
Bit bucket Why Do We still Rebuild RAID Drives? ZDnet 11/28/2016 743
Management Uses of Robotics in Business: How Will Robots Be Used n Future? TechWorld 11/28/2016 743
Bit bucket Teeny Sensor System lets You Effectively Monitor Electricity Usage Network World 11/28/2016 743
Connectivity 'Complexity' will Halt Network Upgrades In 2017 Network World 11/28/2016 743
Cloud 7 Simple Truths You Should Know About the Hybrid Cloud Network World 11/28/2016 743
Security Best Practices to Fight Corporate Security Risks Network World 11/28/2016 743
Connectivity The Future of Networking Network World 11/28/2016 743
Bit bucket Why the IETF Will Be Key for Standardizing 5G Network World 11/28/2016 743
Security Google Security Expert says Antivirus Apps Don't Work Network World 11/28/2016 743
Bit bucket Has IT become too Complex to Manage? Network World 11/28/2016 743
Management How a Social Robot Could Make Our Leaders Better IT World 11/25/2016 746
Cloud Cloud Storage Use Up, but Integration Still Sought InformationWeek 11/25/2016 746
Connectivity Internet of Things Will Demand a Step-Change in Search Solutions Science Daily 11/24/2016 747
Bit bucket 10 Smartphone Trends to Watch for In 2017 ComputerWorld 11/24/2016 747
Bit bucket Students Have Trouble Judging the Credibility of Information Online, Researchers Find Science Daily 11/23/2016 748
Security Six Key Principles for Efficient Cyber Investigations HelpNet Security 11/23/2016 748
Administration Stay Out of My Server Room! The Register 11/23/2016 748
Data Algorithms can Be Racist: Why CXOs Should Understand the Assumptions Behind Predictive Analytics TechRepublic 11/23/2016 748
Bit bucket How FedEx Is Shaving Millions from Its IT Costs IT World 11/23/2016 748
Bit bucket The Best Fitness Trackers at Every Price Point IT World 11/23/2016 748
Data 6 Questions Every CEO Should Ask about Their Data Security Information Management 11/23/2016 748
Bit bucket How to Reduce Costs and Improve Efficiency in Your IT Infrastructure Data Center Knowledge 11/23/2016 748
Security Security Automation: Striking the Right Balance Dark Reading 11/23/2016 748
Bit bucket Assessing Managed SD-WAN Services NetworkComputing 11/22/2016 749
Management Ford CIO: IT is a 'People Business' IT World 11/22/2016 749
Bit bucket UMass Settles Potential HIPAA Violations following Malware Infection HHS.gov 11/22/2016 749
Security Who Has the Most Impact In Driving Security Advancement? CSO Online 11/22/2016 749
Security 7 Cyber Security Tips for 2017 Business 2 Community 11/22/2016 749
Bit bucket A Phone that Charges In Seconds? Science Daily 11/21/2016 750
Bit bucket What Your Choice of Smartphone Says About You Science Daily 11/21/2016 750
Cloud Hybrid Cloud Storage Use to Double in Next 12 Months HelpNet Security 11/21/2016 750
Bit bucket Ten Tips to Boost Your Facilitation Skills Project Management Advisor 11/21/2016 750
Management What CIOs Need to Know About SD-WAN Network World 11/21/2016 750
Cloud 10 Reasons to Divorce the Cloud Network World 11/21/2016 750
Connectivity Network Managers Should be Checking Their List Twice Network World 11/21/2016 750
Bit bucket 10 Top Holiday Phishing Scams IT World 11/21/2016 750
Connectivity Balancing the Risk & Promise of the Internet of Things Dark Reading 11/21/2016 750
Bit bucket Androids under Attack: 1 Million Google Accounts Hijacked Dark Reading 11/20/2016 751
Bit bucket Androids Under Attack: 1 Million Google Accounts Hijacked Dark Reading 11/20/2016 751
Connectivity Top Reasons for Network Downtime Network World 11/18/2016 753
Management How to Integrate Disruptive Technologies with IT Outsourcing Contracts Network World 11/18/2016 753
Compliance Data Storage: An Evolution NetworkComputing 11/18/2016 753
Data Hidden Fees: What is the Cost of a Data Breach? Information Management 11/18/2016 753
Bit bucket 8 Awesome Gifts for PC Gamers ComputerWorld 11/18/2016 753
Bit bucket U.S. iPhone Factories: Designed In California, Made by Machines ComputerWorld 11/18/2016 753
Bit bucket The Main Reasons why Tech Startups Fail TechWorld 11/17/2016 754
Data Why Your New Data Center Doesn't Work; The Sorry State of Commissioning Network World 11/17/2016 754
Security 7 Cybersecurity Best Practices that Regulated Industries Deal With Network World 11/17/2016 754
Administration Server-Based Open Networking Taxes the CPU, So Offload to An Intelligent Server Adapter Network World 11/17/2016 754
Connectivity Network Analysis: TCP Window Size NetworkComputing 11/17/2016 754
Cloud Five Reasons to Adopt Hybrid Cloud Storage for your Data Center Data Center Knowledge 11/17/2016 754
Bit bucket How to 'PoisonTap' a Locked Computer Using a $5 Raspberry Pi Dark Reading 11/17/2016 754
Management These Business Lessons from Ballet's Leaders are Totally on Point Fast Company 11/16/2016 755
Management Five CEOS on the Skills It Takes to Land the Corner Office Fast Company 11/16/2016 755
Cloud 10 Tips from the Front Lines of Enterprise Public Cloud Use Network World 11/16/2016 755
Bit bucket Welcome to the 11th Gibbs Golden Turkey Awards Network World 11/16/2016 755
Bit bucket Is Critical Infrastructure the Next DDoS Target? IT World 11/16/2016 755
Cloud 6 Reasons Private Clouds aren't Dead Yet InformationWeek 11/16/2016 755
Technology 9 Essential AI Technologies Information Management 11/16/2016 755
Bit bucket The Dangers of External Collaboration on Data CIO Today 11/16/2016 755
Cloud 5 Reasons Why Moving to the Cloud is Easier Than You Think Business 2 Community 11/16/2016 755
Connectivity Key Causes of Network Outages and Vulnerabilities HelpNet Security 11/15/2016 756
Technology Four Email Subject Lines that Make Everyone Hate You Fast Company 11/15/2016 756
Bit bucket Start Onboarding The Day the Offer is Accepted TLNT 11/15/2016 756
Bit bucket Six Tips On How to Become a Successful Tech Freelancer TechWorld 11/15/2016 756
Bit bucket 7 Challenges Successful People Overcome Success 11/15/2016 756
Bit bucket Goodbye, NAC. Hello, Software-Defined Perimeter Network World 11/15/2016 756
Security Security Analysis of Popular IoT Devices Network World 11/15/2016 756
Data What Is the General Data Protection Regulation (GDRP) and Why Should You Care? Network World 11/15/2016 756
Data What Is the General Data Protection Regulation and Why Should You Care? Network World 11/15/2016 756
Bit bucket Paralyzed ALS Patient Operates Speech Computer with Her Mind Science Daily 11/14/2016 757
Bit bucket How to Negotiate When You're at a Disadvantage Fast Company 11/14/2016 757
Devops How to Implement Agile Project Management TLNT 11/14/2016 757
Security Your Security Mirages Network World 11/14/2016 757
Cloud Cloud Traffic Set to Quadruple: Looks Like Those Pipes are Going to Run Hot Network World 11/14/2016 757
Connectivity Creating a New Network Value Equation Network World 11/14/2016 757
Bit bucket ENIAC, World's first Digital Computer, Turns 66 Network World 11/14/2016 757
Security Blockchain Adoption in Banks Coming, but Slower than Expected IT World 11/14/2016 757
Security Intel Security's CTO: Achieving Better Efficiency in Security Information Management 11/14/2016 757
Management 5 Common Ways Organizations Lose Data Information Management 11/14/2016 757
Security Cybersecurity Is Never Dull When It Comes to the NSA Information Management 11/14/2016 757
Bit bucket The Top 12 Overused IT Terms ComputerWorld 11/14/2016 757
Bit bucket What is Quality Control? An Introduction for Software Companies Business 2 Community 11/12/2016 759
Management From Marathon Running to Telling Better Stories: This Week's Top Leadership Stories Fast Company 11/11/2016 760
Management 6 Ways to Add Cybersecurity Protections to Outsourcing Deals IT World 11/11/2016 760
Data How Trump Defeated Clinton using Analytics IT World 11/11/2016 760
Data Trump's Election: Poll Failures Hold Data Lessons for IT InformationWeek 11/11/2016 760
Security Sharing Threat Intel: Easier Said than Done Dark Reading 11/11/2016 760
Technology Two Paths at Once: Watching the Buildup of Quantum Superpositions Science Daily 11/10/2016 761
Security A Checklist for People Who Understand Cyber Security HelpNet Security 11/10/2016 761
Bit bucket How to Avoid DDoSing Yourself The Register 11/10/2016 761
Connectivity Ethernet Consortia Trio Want to Unlock a More Time-Sensitive Network Network World 11/10/2016 761
Cloud How to Pick the Right Cloud Storage Service Network World 11/10/2016 761
Bit bucket 40-Plus Eye-Popping Black Friday 2016 Tech deals Network World 11/10/2016 761
Bit bucket Why RAID Arrays are Sinking NetworkComputing 11/10/2016 761
Cloud Visibility, Security Top Concerns for Cloud Computing Adoption IT World 11/10/2016 761
Data A Look at Insurance's Big Data Trajectory Insurance Networking 11/10/2016 761
Cloud What Can IT Professionals Learn from New AWS VP? InformationWeek 11/10/2016 761
Data 7 Reasons Why Data Science Lacks Ethics, and How to Retrofit Morality Information Management 11/10/2016 761
Bit bucket Infiniband will Reach 200-Gigabit Speed Next Year ComputerWorld 11/10/2016 761
Connectivity Hacker Shows How Easy it is to Take Over a City's Public Wi-Fi Network ComputerWorld 11/10/2016 761
Management Five Powerful Career Habits Of Naturally Curious People Fast Company 11/09/2016 762
Bit bucket Why We Help Our Best Talent to Leave TLNT 11/09/2016 762
Technology Why Social Media couldn't call Trump's Victory cnet 11/09/2016 762
Technology Why Social Media Couldn't call Trump's Victory cnet 11/09/2016 762
Data Wildly Inaccurate Election forecasts Highlight Big Data Challenges ZDnet 11/09/2016 762
Cloud Every Cloud Needs a Cop: How the FBI Secures Its Digital Assets TechRepublic 11/09/2016 762
Connectivity 6 Network and Security Trends You Can Expect In 2017 Network World 11/09/2016 762
Bit bucket What You Need to Know About Microservices Network World 11/09/2016 762
Connectivity 10 Interview Questions Networking Pros should Expect NetworkComputing 11/09/2016 762
Bit bucket 10 Hardest-to-Find Tech Skills IT World 11/09/2016 762
Management 5 Secrets to Creating the Best Project Management Resume IT World 11/09/2016 762
Data Polling Failures Don't Mean Big Data is Bunk Insurance Networking 11/09/2016 762
Management The Big Lesson We Must Learn from the Dyn DDoS Attack Dark Reading 11/09/2016 762
Bit bucket Why Embarrassment Can Be a Good Thing (and 3 Ways to Deal) Fast Company 11/08/2016 763
Connectivity How to Approach a VIP at a Crowded Networking Event Fast Company 11/08/2016 763
Bit bucket Six Things Great Bosses Constantly Remind their Teams Fast Company 11/08/2016 763
Bit bucket How IBM's Watson is Helping Doctors Diagnose the Most Rare and Elusive Illnesses ZDnet 11/08/2016 763
Bit bucket AI, Cognitive Computing to Disrupt Enterprises: IDC InformationWeek 11/08/2016 763
Security Stay Vigilant to the Evolving Threat of Social Engineering Dark Reading 11/08/2016 763
Connectivity Is Fingerprint Authentication Making the Password Problem Worse? Dark Reading 11/08/2016 763
Security The 7 Types of Security Jobs, According to NIST Dark Reading 11/08/2016 763
Technology Insect-Like Microrobots Move Just like Real Insects Science Daily 11/07/2016 764
Bit bucket 10 Predictions on IT Changes Over the Next 36 Months HelpNet Security 11/07/2016 764
Bit bucket 5 Common Communication Misfires (and How to Avoid Them) Fast Company 11/07/2016 764
Data Big Data: Three Ways to Make Your Project a Success ZDnet 11/07/2016 764
Management Project Management Screw-Up 4 - We Didn't Do a Good Project Schedule Project Management Advisor 11/07/2016 764
Connectivity 5 Things You Need to Know About Virtual Private Networks Network World 11/07/2016 764
Technology Diamonds Could Be Building Blocks for Quantum Computers Network World 11/07/2016 764
Connectivity 80/20 Rule of Network Equipment: Stay on Budget and Innovate Network World 11/07/2016 764
Technology Industrial IoT: 8 Things to Know NetworkComputing 11/07/2016 764
Bit bucket 10 of the Coolest Things Made on 3D Printers IT World 11/07/2016 764
Bit bucket How Gender-Neutral Job Postings Decrease Time to Hire IT World 11/07/2016 764
Security The Worst People You meet Doing IT Security IT World 11/07/2016 764
Cloud 5 Flavors of Hybrid Cloud Transforming the Enterprise InfoWorld 11/07/2016 764
Cloud Tips and Best Practices for Securing your Cloud Initiative Data Center Knowledge 11/07/2016 764
Technology Changing IoT Passwords Won't Stop Attacks. Here's what Will. Dark Reading 11/07/2016 764
Administration Transitioning from the Server Room to the Boardroom Dark Reading 11/05/2016 766
Storage Seven Myths for Hyperconverged Integrated Systems HelpNet Security 11/04/2016 767
Bit bucket How to Approach Your First Day As CSO Network World 11/04/2016 767
Cloud Securing the Cloud Endpoint Network World 11/04/2016 767
Data How to Increase Adoption of Your Big Data Analytics Platform Network World 11/04/2016 767
Bit bucket Phishing Scheme Crimps El Paso for $3.2 Million Network World 11/04/2016 767
Bit bucket Reducing the Risk of Phishing Attacks IT World Canada 11/04/2016 767
Bit bucket 6 Machine Learning Misunderstandings IT World 11/04/2016 767
Data Why Assuming Data is Secure Is Dangerous and Stupid IT World 11/04/2016 767
Management Overconfidence is Putting Organizations At Higher Risk for Attacks HelpNet Security 11/03/2016 768
Management Speed to Drive CIO Agenda in 2017 Network World 11/03/2016 768
Cloud 10 AWS Security Blunders and How to Avoid Them Network World 11/03/2016 768
Security Flood of Threat Intelligence Overwhelming for Many Firms Network World 11/03/2016 768
Compliance How SDN Interacts with Software-Defined Storage NetworkComputing 11/03/2016 768
Bit bucket OpenStack: The Philosophical Divide NetworkComputing 11/03/2016 768
Bit bucket DDoS Attack on Dyn Could Have Been Prevented IT World 11/03/2016 768
Connectivity How To Reduce Data and Network Latency Where Others Fail Data Center Knowledge 11/03/2016 768
Technology Engineers Develop New Magnetic Ink to Print Self-Healing Devices that Heal in Record Time Science Daily 11/02/2016 769
Bit bucket Ultra-fast 2-D and 3-D Printing Science Daily 11/02/2016 769
Bit bucket Building Risk Culture is Easier than Making Hot Dogs LinkedIn 11/02/2016 769
Data Most Employees Violate Policies Designed to Prevent Data Breaches HelpNet Security 11/02/2016 769
Management How Prepared Are You to Deal with Workplace Violence? TLNT 11/02/2016 769
Bit bucket Turning Pings Into Packets: Why The Future of Computers Looks a Lot Like Your Brain ZDnet 11/02/2016 769
Data IBM Engineer Says AR will Trump VR for Data Visualization Network World 11/02/2016 769
Cloud The Long, Slow Death of Private Cloud Continues Network World 11/02/2016 769
Cloud 6 Trends that Will Shape Cloud Computing in 2017 Network World 11/02/2016 769
Connectivity Network Performance Analysis: TCP MSS NetworkComputing 11/02/2016 769
Security 11 Cyber Threat Intelligence Tips Information Management 11/02/2016 769
Bit bucket Smart Machines: Is Full Automation Desirable? HelpNet Security 11/01/2016 770
Security Ex-CIA CTO: Don't Believe Everything You Hear about Hacking TechWorld 11/01/2016 770
Bit bucket The Top 6 Reasons Why Employees Leave, and How You Can Stop Them TechRepublic 11/01/2016 770
Bit bucket 8 Little Habits that Will Instantly Make You Happier Success 11/01/2016 770
Bit bucket Gartner: Despite the DDoS Attacks, Don't Give Up on Dyn or DNS Service Providers Network World 11/01/2016 770
Security BGP Security: Mitigating Route Leaks NetworkComputing 11/01/2016 770
Security Gartner's Top Cybersecurity 'Macro Trends' for 2017 IT World Canada 11/01/2016 770
Bit bucket 5 Ways to Reduce Bias In Your Hiring Practices IT World 11/01/2016 770
Bit bucket 10 Ways to Make Sure Your Remote Workers are Being Safe IT World 11/01/2016 770
Management 7 Security Lessons he Video Game Industry Can Teach IoT Manufacturers Dark Reading 11/01/2016 770
Security What Can We Do About the Critical Cybersecurity Skills Shortage? HelpNet Security 10/31/2016 771
Management The 5 Secrets of Great Interviewers TLNT 10/31/2016 771
Management Project Management Screw-Up - The Team Didn't Gel Project Management Advisor 10/31/2016 771
Security Improve IT Security: Start with These 10 Topics Network World 10/31/2016 771
Bit bucket 17 Essential Tools to Protect Your Online Identity, Privacy Network World 10/31/2016 771
Bit bucket How DNS Works: A Primer NetworkComputing 10/31/2016 771
Bit bucket The FCC's New Privacy Rules are Toothless IT World 10/31/2016 771
Management Are True IT Leaders Born or Made? InformationWeek 10/31/2016 771
Management Banding Together: 6 Challenges Shared by City CIOs Government Technology 10/31/2016 771
Data Big Data, Open Data and the Need for Data Transparency (Industry Perspective) Government Technology 10/31/2016 771
Compliance How Does Data Fabric Fit With Software-Defined Storage, and What Can It Do for You? Data Center Knowledge 10/31/2016 771
Technology China's Policing Robot: Cattle Prod meets Supercomputer ComputerWorld 10/31/2016 771
Data 5 Lessons Learned from Building a Data Pipeline ComputerWorld 10/31/2016 771
Security Slasher or Hacker? These 2016 Hacks Gave Us Nightmares cnet 10/29/2016 773
Data Companies Complacent about Data Breach Preparedness Network World 10/28/2016 774
Security The Limits of Encryption IT World 10/28/2016 774
Bit bucket Gartner's 10 Tech Predictions that Will Change IT InformationWeek 10/28/2016 774
Data Analytics, IoT Crucial to Mobile E-Commerce Growth InformationWeek 10/28/2016 774
Cloud Securing Data in the Cloud - To Encrypt, Authenticate, or Both? Information Management 10/28/2016 774
Bit bucket And Now a PREDATOR to Fight DNS Domain Abuse Dark Reading 10/28/2016 774
Security 5 Signs Your Smartphone has Been Hacked Dark Reading 10/28/2016 774
Bit bucket How to Take Down Irritating Drones without Shooting Them Out of the Sky ZDnet 10/27/2016 775
Technology The Secret Behind the Success Of Mirai IoT Botnets Network World 10/27/2016 775
Bit bucket Formula One puts you in the Grand Prix with VR and AR Network World 10/27/2016 775
Security Securing the Breach Trumps Breach Prevention Network World 10/27/2016 775
Connectivity CIO Security Lessons: Dark Thinking on IoT & Exploding Enterprise Networks Network World 10/27/2016 775
Bit bucket Racing to 2.5 and 5 Gigabit Ethernet NetworkComputing 10/27/2016 775
Connectivity SDN Post-Deployment Considerations NetworkComputing 10/27/2016 775
Bit bucket Terabit-Scale DDoS Events Are on the Horizon HelpNet Security 10/26/2016 776
Management Why Don't All Businesses Have a Good Continuity Strategy? HelpNet Security 10/26/2016 776
Bit bucket The PDF Format Finally Reaches 2.0 Release Network World 10/26/2016 776
Bit bucket OpenStack: It's Interoperable after All Network World 10/26/2016 776
Connectivity Why We May See the End of the Private Network NetworkComputing 10/26/2016 776
Bit bucket MPLS Lives on In Hybrid WAN Era NetworkComputing 10/26/2016 776
Bit bucket 7 Tech Nightmares Haunting IT Pros this Halloween Information Management 10/26/2016 776
Bit bucket Facial Recognition: Policy Outpaces Tech, Puts Certain Communities at Risk Government Technology 10/26/2016 776
Connectivity Let's Clean Up the Internet by Taking Responsibility for Our Actions Dark Reading 10/26/2016 776
Security Getting To the 'Just Right' Level of Encryption Dark Reading 10/26/2016 776
Management DDos on Dyn Used Malicious TCP, UDP Traffic Dark Reading 10/26/2016 776
Operations Renewable Energy Represented More than Half of All New Power Capacity In '15 ComputerWorld 10/26/2016 776
Management How to Explain the DDoS Attack on Dyn to Your CEO in Simple Terms CIO 10/26/2016 776
Management How to Explain the DDoS Attack on Dyn to Your CEO In Simple Terms CIO 10/26/2016 776
Data Researchers Use Big Data to Save Big Dollars on Fleet Vehicles Science Daily 10/25/2016 777
Technology How Often do Quantum Systems Violate the Second Law of Thermodynamics? Science Daily 10/25/2016 777
Management History Repeating: How the IoT Is Failing to Learn the Security Lessons of the Past ZDnet 10/25/2016 777
Bit bucket 19 Companies Using Drones right Now TechWorld 10/25/2016 777
Cloud Your Network, IoT Cloud Computing and the Future Network World 10/25/2016 777
Bit bucket Beyond 911: Other N-1-1 Codes You Should Know Network World 10/25/2016 777
Connectivity Network Troubleshooting: TCP SYN Analysis NetworkComputing 10/25/2016 777
Management 10 Qualities of Successful IT Leaders IT World Canada 10/25/2016 777
Cloud Is Public or Private Cloud Cheaper? Here's the Answer IT World Canada 10/25/2016 777
Bit bucket What Awareness Is Supposed to Be IT World 10/25/2016 777
Bit bucket The Only Realistic Plan to Avoid DDoS Disaster InfoWorld 10/25/2016 777
Security Blockchain & the Battle to Secure Digital Identities Dark Reading 10/25/2016 777
Bit bucket Dyn DDoS Attack: The Aftermath HelpNet Security 10/24/2016 778
Bit bucket 5 Secrets of Successful One-on-One Meetings TLNT 10/24/2016 778
Cloud The Enterprise Wish-List for the Hybrid Cloud Network World 10/24/2016 778
Connectivity Answers to 'Is the Internet Broken?' and other Dyn DDoS Questions Network World 10/24/2016 778
Security Better Safe Than Sorry: 5 Apps for Encrypting and Shredding Files Network World 10/24/2016 778
Bit bucket Performance Analysis: Bursting the Myth of MPLS Performance Network World 10/24/2016 778
Management How to Choose the Right Project Management Tools IT World 10/24/2016 778
Technology Frightening Technology Trends to Worry About IT World 10/24/2016 778
Bit bucket Bots May be Trumping Online Polls IT World 10/24/2016 778
Bit bucket Gartner Identifies Five Domains for the New Digital Platform Information Management 10/24/2016 778
Technology 'Root' & the New Age of IoT-Based DDoS Attacks Dark Reading 10/24/2016 778
Data Are Your Marketing Pros Ready to Handle Big Data? CIO 10/24/2016 778
Security 7 Steps to Proactive Security Network World 10/21/2016 781
Bit bucket 4 Developing Technologies that Could Help Solve Modern Problems Government Technology 10/21/2016 781
Bit bucket No -- I Won't Bring You Proof of My Last Salary Forbes 10/21/2016 781
Security Flipping Security Awareness Training Dark Reading 10/21/2016 781
Security 7 Imminent IoT Threats Dark Reading 10/21/2016 781
Security Fast-Track your Information Security Incident Response Plan Continuity Central 10/21/2016 781
Connectivity The Right Way To Back Out of a Networking Conversation Fast Company 10/20/2016 782
Security 3D Printing Hack: Researchers Crash Drone with Sabotaged Propeller TechRepublic 10/20/2016 782
Management 6 Essential Elements of a Good Business Plan IT World 10/20/2016 782
Management Why You Need to Develop an Immersive Security Strategy IT World 10/20/2016 782
Security Stupid Encryption Mistakes Criminals Make InfoWorld 10/20/2016 782
Data Encryption - Still the Best Way to Protect Data from Hackers Information Management 10/20/2016 782
Cloud Clueless CIO Cloud Confusion Continues ComputerWorld 10/20/2016 782
Connectivity Wi-Fi, LTE Ambient Signals to Replace, Augment GPS Network World 10/19/2016 783
Bit bucket 6 Industries That Will Be Affected by Virtual Reality Network World 10/19/2016 783
Security Only Do Penetration Tests if Your Security Program is Up To It, Say Experts IT World 10/19/2016 783
Management CISOs, It's Time to Bury the Hatchet with Your CIO IT World 10/19/2016 783
Security 'Kevin Durant Effect': What Skilled Cybersecurity Pros Want Dark Reading 10/19/2016 783
Security Malvertising Trends: Don't Talk Ad Standards without Ad Security Dark Reading 10/19/2016 783
Cloud Exploring Risks Associated with Cloud Backup Continuity Central 10/19/2016 783
Technology Is Your Service Center Too Dependent on Technology? ComputerWorld 10/19/2016 783
Bit bucket How to Select the Right Disaster Recovery Facility CIO Review 10/19/2016 783
Technology Three Email Habits that Kill Your Whole Team's Productivity Fast Company 10/18/2016 784
Management Why It May Be Time to Stop Outsourcing IT TechRepublic 10/18/2016 784
Data How Auto Giants are Using Big Data: A Conversation with Ford TechRepublic 10/18/2016 784
Management Feeling Stuck in Middle Management? Learning Corporate Strategy Can Help. TechRepublic 10/18/2016 784
Connectivity Wi-Fi Troubleshooting Remains a Challenge for Most Organizations Network World 10/18/2016 784
Management Gartner's 10 Strategic Predictions for 2017....And Beyond Network World 10/18/2016 784
Connectivity Networks help You Compress Time Network World 10/18/2016 784
Bit bucket How Can Good Guys Take Advantage of DNS IT World 10/18/2016 784
Bit bucket 10 Things Your Next Firewall must Do Information Management 10/18/2016 784
Cloud Cloud Security: Where to Get Started, Part 1 Business 2 Community 10/18/2016 784
Bit bucket Not All IT Incidents are Created Equal: How to Manage Escalations TechRepublic 10/17/2016 785
Bit bucket 56% of Employees Don't Have the Latest Tech Needed to Do Their Job Well TechRepublic 10/17/2016 785
Data DarkLight Removes Li-Fi Restriction, Allows Visible Light to Transmit Data in the Dark Network World 10/17/2016 785
Bit bucket Comparing Dynamic Routing Protocols NetworkComputing 10/17/2016 785
Data Few prepared for new European data protection regulations: Survey IT World Canada 10/17/2016 785
Data The 12 Top Paying Data Jobs for 2017 Insurance Networking 10/17/2016 785
Security Threat Response Automation: The Next Frontier for Cybersecurity Information Management 10/17/2016 785
Security The State of the Chief Information Security Officer Information Management 10/17/2016 785
Cloud Private Cloud vs. Public Cloud: Which Option is Cheaper? Data Center Knowledge 10/17/2016 785
Technology Diamonds aren't Forever: Team Creates first Quantum Computer Bridge Science Daily 10/14/2016 788
Cloud Alarming Cloud Encryption Misconceptions Revealed HelpNet Security 10/14/2016 788
Compliance All-Flash Storage: Tech's Ready, Is It Safe to Move Yet? The Register 10/14/2016 788
Bit bucket The 20 Biggest Tech Disasters of All Time TechRepublic 10/14/2016 788
Bit bucket Transforming Enterprise Communications Infrastructure NetworkComputing 10/14/2016 788
Management How Blockchain can Benefit IT Outsourcing Providers IT World 10/14/2016 788
Data 7 Keys to Building a Successful Big Data Infrastructure InformationWeek 10/14/2016 788