IT Weekly


Feb 19, 2019

Every week we bring you more than 40+ relevant online sources that contain articles of interest to IT and DC Professionals at all levels

Browse by Technology
Browse by Year



Category Articles From 2016 Source Posted Date Age
Security 5 Signs We're Finally Getting Our Act Together on Security Network World 12/29/2016 782
Bit bucket 5 Key Technologies to Double Down on Now InfoWorld 12/29/2016 782
Data The Year of Big Data: What to Expect in 2017 Information Management 12/29/2016 782
Security The Reporting Line of the CISO is Key to Success Business 2 Community 12/29/2016 782
Data 7 Reasons Why Data Visualization is Better than Your Best Excel Charts and Graphs Business 2 Community 12/29/2016 782
Bit bucket 9 Technologies that IT Needed but Didn't Get in 2016 Network World 12/28/2016 783
Connectivity 5 Reasons to Automate Your Network Network World 12/28/2016 783
Data What to Do If Your Data is Taken Hostage IT World 12/28/2016 783
Data How to Make Sure Your Data Doesn't Crash and Burn IT World 12/28/2016 783
Security Encryption in 2016: Small Victories Add Up InfoWorld 12/28/2016 783
Cloud Cloud Computing Explained: SaaS, PaaS, and IaaS Business 2 Community 12/28/2016 783
Connectivity Will Networks and Security Converge In 2017? Network World 12/27/2016 784
Connectivity First Look: Wave 2 Wi-Fi Access Points Show Promise Network World 12/27/2016 784
Management Machine Learning: From Science Project to Business Plan InfoWorld 12/27/2016 784
Security 6 Top IT Security Trends for 2017 Information Management 12/27/2016 784
Security 8 Boldest Security Predictions for 2017 Dark Reading 12/27/2016 784
Security Corporate Boards aren't Prepared for Cyberattacks Network World 12/26/2016 785
Security Corporate Boards Aren't Prepared For Cyberattacks Network World 12/26/2016 785
Technology Weird Science! 10 Strangest Tech Stories of 2016 IT World 12/26/2016 785
Connectivity Google and Facebook: It's Your Job to Fix a Broken Internet InfoWorld 12/26/2016 785
Technology Tips for New Tech Devices ComputerWorld 12/26/2016 785
Compliance Object Storage Product Survey 2016: The Big Six ComputerWeekly 12/26/2016 785
Bit bucket DoJ: What does it Take to Prosecute Federal Computer Crimes? Network World 12/25/2016 786
Bit bucket Systems Admin Role isn't Dead Network World 12/23/2016 788
Bit bucket New Accounting Standards Change the Rules of IT Leasing IT World 12/23/2016 788
Security What Fake News Means for IT-and How IT Security Can Help Fight It CSO Online 12/23/2016 788
Management The 10 Best Business Lessons of 2016 Fast Company 12/22/2016 789
Technology The Future of Robotics: 10 Predictions for 2017 and Beyond ZDnet 12/22/2016 789
Security Encryption Backdoors are Against US National Interest, say Lawmakers ZDnet 12/22/2016 789
Cloud Predicting the End of Cloud Computing Network World 12/22/2016 789
Storage NASA's "Human Computers" and the Hidden Figures Movie Story Network World 12/22/2016 789
Bit bucket Why Monitoring Needs to be Reinvented Network World 12/22/2016 789
Bit bucket Event-Driven Infrastructure and the Move to Higher Worlds Network World 12/22/2016 789
Connectivity 5 WiFi Networking Predictions for 2017 NetworkComputing 12/22/2016 789
Security 2017 may be the year of the battle over encryption, again IT World Canada 12/22/2016 789
Technology Experts Split On How Soon Quantum Computing Is Coming, But Say We Should Start Preparing Now IT World 12/22/2016 789
Administration Serverless Architecture - Too Good to Be True? Business 2 Community 12/22/2016 789
Bit bucket The 3 Layers of Data Business 2 Community 12/22/2016 789
Data Four Trends Driving Demand for Data Security in 2017 Cloud Tweaks 12/22/2016 789
Data Hackers and Passwords: Your Guide to Data Breaches cnet 12/21/2016 790
Bit bucket The Weirdest, Wackiest and Coolest Sci/Tech Stories of 2016 Network World 12/21/2016 790
Compliance Storage Industry: 9 Hot Trends for 2017 NetworkComputing 12/21/2016 790
Data Security Analytics: Don't Let Your Data Lake Turn into a Data Swamp Dark Reading 12/21/2016 790
Bit bucket 10 Absolute Best Games of 2016 ComputerWorld 12/21/2016 790
Data What Can Data Visualization Learn from Punks? ComputerWorld 12/21/2016 790
Compliance 5 Reasons Why Internal Audit May Be the Best Place for the Risk Manager to Sit LinkedIn 12/20/2016 791
Security All Email Should be Encrypted Computing Now 12/20/2016 791
Bit bucket 5 Steps to Personal Greatness Success 12/20/2016 791
Bit bucket The Ethernet Ecosystem Today Is Driven by Applications, Not Speed Alone Network World 12/20/2016 791
Bit bucket Use Virtual Containers to Isolate Ransomware Network World 12/20/2016 791
Bit bucket Identity verification: The New Turing Test Network World 12/20/2016 791
Technology IoT Could be Our Downfall Network World 12/20/2016 791
Management Real Edge Computing will Enable New Business Models Network World 12/20/2016 791
Cloud How to Create a Cloud Security Strategy IT World Canada 12/20/2016 791
Management Why Every CIO Needs To Be a Hands-on Leader to Succeed IT World 12/20/2016 791
Security Maybe Security Isn't Going to Get Better After All InfoWorld 12/20/2016 791
Cloud Your Cloud Strategy must Include No-Cloud Options InfoWorld 12/20/2016 791
Bit bucket Innovation Is a Team Sport InformationWeek 12/20/2016 791
Cloud How Cloudy is the Data Center's Future? Data Center Knowledge 12/20/2016 791
Cloud 20 Questions Security Pros Should Ask Themselves Before Moving to the Cloud Dark Reading 12/20/2016 791
Cloud The Top Five Cloud Trends for 2017 Continuity Central 12/20/2016 791
Security Commercial Drones: 2017's new Terrorism Threat Continuity Central 12/20/2016 791
Bit bucket Virtual Reality is Actually Here ComputerWorld 12/20/2016 791
Data Deadlines for Investigating and Reporting Data Breaches HelpNet Security 12/19/2016 792
Bit bucket The End of Passwords? Not in the Near Future TechRepublic 12/19/2016 792
Data The New Rulers of the Cybersecurity Realm: Automation, Analytics Artificial Intelligence Network World 12/19/2016 792
Data 5 most Common Data Privacy Misconceptions Network World 12/19/2016 792
Bit bucket 5 Enterprise Technologies that Will Shake Things Up in 2017 Network World 12/19/2016 792
Connectivity Network Troubleshooting from the User Perspective NetworkComputing 12/19/2016 792
Management What It Takes to be a Great Project Manager IT World 12/19/2016 792
Security What 2017 Has in Store for Cybersecurity IT World 12/19/2016 792
Bit bucket AI Is Late: 3 Things to Accelerate It InformationWeek 12/19/2016 792
Security Vulnerabilities and Exploits: What You Need to Know Business 2 Community 12/19/2016 792
Bit bucket The 5 Biggest Tech Trends of 2016 ZDnet 12/18/2016 793
Management Why Projects Fail: Project Management Lessons Business 2 Community 12/18/2016 793
Bit bucket How to Tell a Great Story without Rambling Endlessly Fast Company 12/17/2016 794
Bit bucket World's Smallest Radio Receiver has Building Blocks the Size of Two Atoms Science Daily 12/16/2016 795
Bit bucket The Next Wave Of IT: Where Do We Go from Here? ZDnet 12/16/2016 795
Data Worm on the Sensor: What Happens When IoT Data is Bad? Network World 12/16/2016 795
Bit bucket The Gifts You Didn't get: InfoWorld's 2016 Geek Gadget Guide IT World 12/16/2016 795
Management 12 Predictions for 2017 That Will Shape Your Business Business 2 Community 12/16/2016 795
Data Data Wrangling & The Future of Big Data Business 2 Community 12/16/0216 795
Data Technique Shrinks Data Sets for Easier Analysis Science Daily 12/15/2016 796
Bit bucket What's Next after Hyperconvergence? The Register 12/15/2016 796
Security 4 Ways Your Company can Avoid Yahoo-Level Stupidity in Enterprise Security TechRepublic 12/15/2016 796
Bit bucket 3 Areas of Hybrid Infrastructure Your Company Should Prioritize in 2017 TechRepublic 12/15/2016 796
Security Five Ways Cybersecurity is Nothing like the Way Hollywood Portrays It Network World 12/15/2016 796
Management Walking Dead can Teach You Valuable Security Lessons IT World 12/15/2016 796
Operations Improving Your IT Resilience and Disaster Recovery Capability Continuity Central 12/15/2016 796
Technology Top 20 Technology-Driven Hard Trends Shaping the Future Business 2 Community 12/15/2016 796
Security ENISA Says Crypto Backdoors are a Bad Idea HelpNet Security 12/14/2016 797
Bit bucket 4 Real-Life Ways People Shut Down Interruptions for Good Fast Company 12/14/2016 797
Management 10 CEOs Share Their Secrets to Keeping Employees Motivated (and Happy) in December Fast Company 12/14/2016 797
Cloud 10 Examples of the AWS Path of Disruption Network World 12/14/2016 797
Security Top 15 Security Predictions for 2017 IT World 12/14/2016 797
Bit bucket Knowing the Manager You Really Are ComputerWorld 12/14/2016 797
Bit bucket BYOD: Large Firms Need Clarity from the Top, Not Ambiguity or Denial Business 2 Community 12/14/2016 797
Data Why Data Decays so Fast? Business 2 Community 12/14/2016 797
Bit bucket Hands-Free Just As Distracting as Handheld Mobile Phone Use Behind the Wheel Science Daily 12/13/2016 798
Management The New CISO Imperative: Solving the Information Management Paradox HelpNet Security 12/13/2016 798
Management How Emotionally Intelligent Bosses Resolve Conflicts Fast Company 12/13/2016 798
Management Time Management Experts Share Their Secrets for Staying Productive During the Holidays Fast Company 12/13/2016 798
Management Trump to Meet with Key US Tech Leaders: 6 Questions That Need to Be Answered TechRepublic 12/13/2016 798
Management 4 Tips for Managing a Diverse Project Team TechRepublic 12/13/2016 798
Bit bucket 10 Mistakes to Avoid When Troubleshooting IT Problems TechRepublic 12/13/2016 798
Bit bucket A Deep and Diverse Menu: VPNs for Any Needs Network World 12/13/2016 798
Connectivity 8 Ways the Network Will Change in 2017 NetworkComputing 12/13/2016 798
Connectivity The Internet of Things: When Bigger is Not Better Dark Reading 12/13/2016 798
Security 91% of Cyberattacks Start With a Phishing Email Dark Reading 12/13/2016 798
Connectivity Five Networking Trends for 2017 Continuity Central 12/13/2016 798
Technology Dear Engineers: Please Build Friendly Robots ComputerWorld 12/13/2016 798
Data 4 Statistics that Show Why We Must Bridge the Gap between Collecting Customer Data & Actually Using It Business 2 Community 12/13/2016 798
Bit bucket At the Edge of a Cognitive Space Science Daily 12/12/2016 799
Management 12 Tips for Implementing Secure Business Practices HelpNet Security 12/12/2016 799
Bit bucket Reducing Wan Complexity with SD-WAN Segmentation Network World 12/12/2016 799
Connectivity The Beginning of the End for Enterprise Network VLANs Network World 12/12/2016 799
Bit bucket Should You Buy an SD-WAN Service? Network World 12/12/2016 799
Management JetBlue CIO Drives Innovation through IT's 'Toolkit' IT World 12/12/2016 799
Security 5 Enterprise-Related Things You Can Do with Blockchain Technology Today InfoWorld 12/12/2016 799
Management The Non-IT CIO: Information Over Infrastructure InformationWeek 12/12/2016 799
Bit bucket Flash or SDS? Finding the Right Path for Your Infrastructure Information Management 12/12/2016 799
Data 12 Top Data and IT Trends to Expect in 2017 Information Management 12/12/2016 799
Connectivity What's Naughty & Nice about the Internet of Things Dark Reading 12/12/2016 799
Technology Disaster Recovery Testing: Technology Systems to Test DR ComputerWeekly 12/12/2016 799
Bit bucket 7 Technologies Shaking up Insurance Agents Insurance Networking 12/10/2016 801
Technology Six Tips For Practicing Safe Social Media HelpNet Security 12/09/2016 802
Security Why CISOs Succeed and Why They Leave Network World 12/09/2016 802
Data Managing the Hybrid Data Center NetworkComputing 12/09/2016 802
Technology The Future of AI Is Humans + Machines IT World 12/09/2016 802
Bit bucket How this Analyst Targeted a Phisher IT World 12/09/2016 802
Data Harnessing the Power of Social Media Analytics IT Web 12/09/2016 802
Cloud It's Not the Cloud, It's You Data Center Dynamics 12/09/2016 802
Security Why Video Game Publishers must Adopt Enforceable Security Standards Dark Reading 12/09/2016 802
Operations Your Own Motion could One Day Power Your Cell Phone ComputerWorld 12/09/2016 802
Management 10 Brain Teasing Questions to Ask When Interviewing IT Professionals TechRepublic 12/08/2016 803
Technology High Performance Graphene Photodetectors set Speed Record Science Daily 12/08/2016 803
Management Three Career Lessons My Micromanaging Boss Didn't Mean to Teach Me Fast Company 12/08/2016 803
Technology Bluetooth 5 Launched with Focus on IoT v3 co uk 12/08/2016 803
Bit bucket The Amazing Women Behind Hidden Figures Who Made the US Space Program Possible TechRepublic 12/08/2016 803
Security 7 Ways to Tighten Enterprise Social Media Security Network World 12/08/2016 803
Devops The DevOps Engineer Is an Optical Illusion InformationWeek 12/08/2016 803
Data 13 Top-Paying Database Skills for 2017 Information Management 12/08/2016 803
Devops Google Will Be Powered Completely by Clean Energy Next Year Data Center Knowledge 12/08/2016 803
Bit bucket From Carna to Mirai: Recovering from a Lost Opportunity Dark Reading 12/08/2016 803
Bit bucket Moore's Law Lives on with Speedy 7nm Mobile Chips Coming in 2018 ComputerWorld 12/08/2016 803
Bit bucket New Invention to Inspire New Night-Vision Specs Science Daily 12/07/2016 804
Technology The Early IoT Gets the Worm HelpNet Security 12/07/2016 804
Bit bucket Worried About Identity Theft? Then You Should Avoid these Password Pitfalls TechRepublic 12/07/2016 804
Bit bucket Just One Autonomous Car will Use 4,000 GB Of Data/Day Network World 12/07/2016 804
Administration Serverless: The Next Step in Cloud Computing's Evolution Network World 12/07/2016 804
Technology Which IoT Applications Work Best with Fog Computing? Network World 12/07/2016 804
Compliance 7 Ways Flash Storage is Gaining Momentum NetworkComputing 12/07/2016 804
Security Playing Cyber Defense is Not Enough to Win IT World 12/07/2016 804
Security Corporations Cite Reputational Damage as Biggest Cyber Risk Dark Reading 12/07/2016 804
Technology Biometric Technology Is Not a Cure-All for Password Woes Dark Reading 12/07/2016 804
Bit bucket 10 Hottest Tech Skills for 2017 ComputerWorld 12/07/2016 804
Compliance The Evolution of Datacenter Storage: from DAS to Hyperconverged and Distributed Business 2 Community 12/07/2016 804
Data Is Big Data Creating Big Problems for Marketing? Business 2 Community 12/07/2016 804
Data The Future of the Data Centre Is Within The Register 12/06/2016 805
Bit bucket Electric Cars That Charge in Minutes TechWorld 12/06/2016 805
Connectivity Companies Increasingly Looking for Hackers to Attack Their Networks Network World 12/06/2016 805
Security Common Security Mistakes in Collaboration Tools IT World 12/06/2016 805
Cloud Moving Truckloads of Data to the Cloud IT Web 12/06/2016 805
Security Web Gateways: 5 Big Security Challenges Dark Reading 12/06/2016 805
Bit bucket Say Goodbye to the MS-DOS Command Prompt ComputerWorld 12/06/2016 805
Technology Robots vs Cyborgs: Why AI is Really Just Intelligence Amplification Business 2 Community 12/06/2016 805
Security DDoS Trends, DNS Survey Signal Warnings to Infosec Pros IT World Canada 12/05/2016 806
Security Intentional or Not, Insider Threats are Real HelpNet Security 12/05/2016 806
Connectivity Most Email Authentication Implementations Fail HelpNet Security 12/05/2016 806
Management Beyond the Thank-You Note: Four Things to Do After Your Job Interview Fast Company 12/05/2016 806
Compliance R&D: Ultrahigh Density Optical Storage Researched at Kazan University Storage Newsletter 12/05/2016 806
Administration 7 Linux Predictions for 2017 Network World 12/05/2016 806
Bit bucket Microservices: The Infrastructure Impact NetworkComputing 12/05/2016 806
Cloud Security Pros Most Worried about Clouds, Mobile IT World 12/05/2016 806
Data Assembling a Top-Notch Insurance Analytics Team Insurance Networking 12/05/2016 806
Cloud Capital One Rides the Cloud to Tech Company Transformation ComputerWorld 12/05/2016 806
Security The Biggest Threat to Artificial Intelligence: Human Stupidity ZDnet 12/04/2016 807
Bit bucket How to Shoot a Drone Out of the Sky ComputerWorld 12/03/2016 808
Management Embrace Shadow IT, Says Panel of CIOs v3 co uk 12/02/2016 809
Security The Human Firewall: Why People are Critical to Email Security Dark Reading 12/02/2016 809
Bit bucket Imagine Every Mistake You Can Make With a New Software Rollout... The Register 12/01/2016 810
Security Best Practices for Lowering Cyber Insurance Costs and Cyber Risk Network World 12/01/2016 810
Connectivity How to Architect the Network So IoT Devices Are Secure Network World 12/01/2016 810
Connectivity How to Architect The Network So IoT Devices Are Secure Network World 12/01/2016 810
Bit bucket 20 Years Ago: Hot Sci/Tech Images from 1996 Network World 12/01/2016 810
Management CIO Battles Nuclear Industry Regulation in Digital Shift IT World 12/01/2016 810
Data 5 Ways Data Classification Can Prevent an Education Data Breach IT World 12/01/2016 810
Devops 10 Key Security Terms Devops Ninjas Need to Know InfoWorld 12/01/2016 810
Bit bucket Ready, Set, AIM! Data Center Dynamics 12/01/2016 810
Security Bitcoin Wallet Comparison: BTC vs XAPO Business 2 Community 12/01/2016 810
Bit bucket How to Safeguard & Protect Your Most Important Asset: Data Business 2 Community 12/01/2016 810
Bit bucket New Method to Improve Predictions Science Daily 11/30/2016 811
Bit bucket Do these Stimulants Actually Improve Focus? Fast Company 11/30/2016 811
Management What's the First Emotion you'd give an AI That Might Kill You? Yes, Fear The Register 11/30/2016 811
Bit bucket Your New Best Friend Could Be an AI TechWorld 11/30/2016 811
Bit bucket 2016 Will Be 1 Second Longer: Google can Help You Cope Network World 11/30/2016 811
Technology John Deere Leads the Way with IoT-Driven Precision Farming Network World 11/30/2016 811
Bit bucket The Return of the Infrastructure Engineer Network World 11/30/2016 811
Cloud Cool Tech at AWS re:Invent Network World 11/30/2016 811
Bit bucket What's In Store for Tech In 2017 Network World 11/30/2016 811
Security Who's on Your IT Security Dream Team? IT World 11/30/2016 811
Management Just Half of Organizations Employ Threat Intelligence Dark Reading 11/30/2016 811
Cloud Is the Cloud Really Just Someone Else's Computer? TechRepublic 11/29/2016 812
Management 10 Ways to Gracefully Kill An IT Project TechRepublic 11/29/2016 812
Bit bucket 5 Ways to Stay Positive When You're Having a Bad Day Success 11/29/2016 812
Connectivity Why Networking doesn't get Respect Anymore No Jitter 11/29/2016 812
Cloud How to Compare Cloud Costs Between Amazon, Microsoft and Google Network World 11/29/2016 812
Bit bucket Tips for building SD-WANs Network World 11/29/2016 812
Cloud The Metrics that Matter for Your Private/Hybrid Cloud Network World 11/29/2016 812
Bit bucket A Guide to VPN Basics NetworkComputing 11/29/2016 812
Bit bucket Driverless Vehicles & the IT Impact InformationWeek 11/29/2016 812
Cloud The Mission Critical Cloud: Designing an Enterprise Cloud Data Center Knowledge 11/29/2016 812
Bit bucket Why Do We still Rebuild RAID Drives? ZDnet 11/28/2016 813
Management Uses of Robotics in Business: How Will Robots Be Used n Future? TechWorld 11/28/2016 813
Bit bucket Teeny Sensor System lets You Effectively Monitor Electricity Usage Network World 11/28/2016 813
Connectivity 'Complexity' will Halt Network Upgrades In 2017 Network World 11/28/2016 813
Cloud 7 Simple Truths You Should Know About the Hybrid Cloud Network World 11/28/2016 813
Security Best Practices to Fight Corporate Security Risks Network World 11/28/2016 813
Connectivity The Future of Networking Network World 11/28/2016 813
Bit bucket Why the IETF Will Be Key for Standardizing 5G Network World 11/28/2016 813
Security Google Security Expert says Antivirus Apps Don't Work Network World 11/28/2016 813
Bit bucket Has IT become too Complex to Manage? Network World 11/28/2016 813
Management How a Social Robot Could Make Our Leaders Better IT World 11/25/2016 816
Cloud Cloud Storage Use Up, but Integration Still Sought InformationWeek 11/25/2016 816
Connectivity Internet of Things Will Demand a Step-Change in Search Solutions Science Daily 11/24/2016 817
Bit bucket 10 Smartphone Trends to Watch for In 2017 ComputerWorld 11/24/2016 817
Bit bucket Students Have Trouble Judging the Credibility of Information Online, Researchers Find Science Daily 11/23/2016 818
Security Six Key Principles for Efficient Cyber Investigations HelpNet Security 11/23/2016 818
Administration Stay Out of My Server Room! The Register 11/23/2016 818
Data Algorithms can Be Racist: Why CXOs Should Understand the Assumptions Behind Predictive Analytics TechRepublic 11/23/2016 818
Bit bucket How FedEx Is Shaving Millions from Its IT Costs IT World 11/23/2016 818
Bit bucket The Best Fitness Trackers at Every Price Point IT World 11/23/2016 818
Data 6 Questions Every CEO Should Ask about Their Data Security Information Management 11/23/2016 818
Bit bucket How to Reduce Costs and Improve Efficiency in Your IT Infrastructure Data Center Knowledge 11/23/2016 818
Security Security Automation: Striking the Right Balance Dark Reading 11/23/2016 818
Bit bucket Assessing Managed SD-WAN Services NetworkComputing 11/22/2016 819
Management Ford CIO: IT is a 'People Business' IT World 11/22/2016 819
Bit bucket UMass Settles Potential HIPAA Violations following Malware Infection 11/22/2016 819
Security Who Has the Most Impact In Driving Security Advancement? CSO Online 11/22/2016 819
Security 7 Cyber Security Tips for 2017 Business 2 Community 11/22/2016 819
Bit bucket A Phone that Charges In Seconds? Science Daily 11/21/2016 820
Bit bucket What Your Choice of Smartphone Says About You Science Daily 11/21/2016 820
Cloud Hybrid Cloud Storage Use to Double in Next 12 Months HelpNet Security 11/21/2016 820
Bit bucket Ten Tips to Boost Your Facilitation Skills Project Management Advisor 11/21/2016 820
Management What CIOs Need to Know About SD-WAN Network World 11/21/2016 820
Cloud 10 Reasons to Divorce the Cloud Network World 11/21/2016 820
Connectivity Network Managers Should be Checking Their List Twice Network World 11/21/2016 820
Bit bucket 10 Top Holiday Phishing Scams IT World 11/21/2016 820
Connectivity Balancing the Risk & Promise of the Internet of Things Dark Reading 11/21/2016 820
Bit bucket Androids under Attack: 1 Million Google Accounts Hijacked Dark Reading 11/20/2016 821
Bit bucket Androids Under Attack: 1 Million Google Accounts Hijacked Dark Reading 11/20/2016 821
Connectivity Top Reasons for Network Downtime Network World 11/18/2016 823
Management How to Integrate Disruptive Technologies with IT Outsourcing Contracts Network World 11/18/2016 823
Compliance Data Storage: An Evolution NetworkComputing 11/18/2016 823
Data Hidden Fees: What is the Cost of a Data Breach? Information Management 11/18/2016 823
Bit bucket 8 Awesome Gifts for PC Gamers ComputerWorld 11/18/2016 823
Bit bucket U.S. iPhone Factories: Designed In California, Made by Machines ComputerWorld 11/18/2016 823
Bit bucket The Main Reasons why Tech Startups Fail TechWorld 11/17/2016 824
Data Why Your New Data Center Doesn't Work; The Sorry State of Commissioning Network World 11/17/2016 824
Security 7 Cybersecurity Best Practices that Regulated Industries Deal With Network World 11/17/2016 824
Administration Server-Based Open Networking Taxes the CPU, So Offload to An Intelligent Server Adapter Network World 11/17/2016 824
Connectivity Network Analysis: TCP Window Size NetworkComputing 11/17/2016 824
Cloud Five Reasons to Adopt Hybrid Cloud Storage for your Data Center Data Center Knowledge 11/17/2016 824
Bit bucket How to 'PoisonTap' a Locked Computer Using a $5 Raspberry Pi Dark Reading 11/17/2016 824
Management These Business Lessons from Ballet's Leaders are Totally on Point Fast Company 11/16/2016 825
Management Five CEOS on the Skills It Takes to Land the Corner Office Fast Company 11/16/2016 825
Cloud 10 Tips from the Front Lines of Enterprise Public Cloud Use Network World 11/16/2016 825
Bit bucket Welcome to the 11th Gibbs Golden Turkey Awards Network World 11/16/2016 825
Bit bucket Is Critical Infrastructure the Next DDoS Target? IT World 11/16/2016 825
Cloud 6 Reasons Private Clouds aren't Dead Yet InformationWeek 11/16/2016 825
Technology 9 Essential AI Technologies Information Management 11/16/2016 825
Bit bucket The Dangers of External Collaboration on Data CIO Today 11/16/2016 825
Cloud 5 Reasons Why Moving to the Cloud is Easier Than You Think Business 2 Community 11/16/2016 825
Connectivity Key Causes of Network Outages and Vulnerabilities HelpNet Security 11/15/2016 826
Technology Four Email Subject Lines that Make Everyone Hate You Fast Company 11/15/2016 826
Bit bucket Start Onboarding The Day the Offer is Accepted TLNT 11/15/2016 826
Bit bucket Six Tips On How to Become a Successful Tech Freelancer TechWorld 11/15/2016 826
Bit bucket 7 Challenges Successful People Overcome Success 11/15/2016 826
Bit bucket Goodbye, NAC. Hello, Software-Defined Perimeter Network World 11/15/2016 826
Security Security Analysis of Popular IoT Devices Network World 11/15/2016 826
Data What Is the General Data Protection Regulation (GDRP) and Why Should You Care? Network World 11/15/2016 826
Data What Is the General Data Protection Regulation and Why Should You Care? Network World 11/15/2016 826
Bit bucket Paralyzed ALS Patient Operates Speech Computer with Her Mind Science Daily 11/14/2016 827
Bit bucket How to Negotiate When You're at a Disadvantage Fast Company 11/14/2016 827
Devops How to Implement Agile Project Management TLNT 11/14/2016 827
Security Your Security Mirages Network World 11/14/2016 827
Cloud Cloud Traffic Set to Quadruple: Looks Like Those Pipes are Going to Run Hot Network World 11/14/2016 827
Connectivity Creating a New Network Value Equation Network World 11/14/2016 827
Bit bucket ENIAC, World's first Digital Computer, Turns 66 Network World 11/14/2016 827
Security Blockchain Adoption in Banks Coming, but Slower than Expected IT World 11/14/2016 827
Security Intel Security's CTO: Achieving Better Efficiency in Security Information Management 11/14/2016 827
Management 5 Common Ways Organizations Lose Data Information Management 11/14/2016 827
Security Cybersecurity Is Never Dull When It Comes to the NSA Information Management 11/14/2016 827
Bit bucket The Top 12 Overused IT Terms ComputerWorld 11/14/2016 827
Bit bucket What is Quality Control? An Introduction for Software Companies Business 2 Community 11/12/2016 829
Management From Marathon Running to Telling Better Stories: This Week's Top Leadership Stories Fast Company 11/11/2016 830
Management 6 Ways to Add Cybersecurity Protections to Outsourcing Deals IT World 11/11/2016 830
Data How Trump Defeated Clinton using Analytics IT World 11/11/2016 830
Data Trump's Election: Poll Failures Hold Data Lessons for IT InformationWeek 11/11/2016 830
Security Sharing Threat Intel: Easier Said than Done Dark Reading 11/11/2016 830
Technology Two Paths at Once: Watching the Buildup of Quantum Superpositions Science Daily 11/10/2016 831
Security A Checklist for People Who Understand Cyber Security HelpNet Security 11/10/2016 831
Bit bucket How to Avoid DDoSing Yourself The Register 11/10/2016 831
Connectivity Ethernet Consortia Trio Want to Unlock a More Time-Sensitive Network Network World 11/10/2016 831
Cloud How to Pick the Right Cloud Storage Service Network World 11/10/2016 831
Bit bucket 40-Plus Eye-Popping Black Friday 2016 Tech deals Network World 11/10/2016 831
Bit bucket Why RAID Arrays are Sinking NetworkComputing 11/10/2016 831
Cloud Visibility, Security Top Concerns for Cloud Computing Adoption IT World 11/10/2016 831
Data A Look at Insurance's Big Data Trajectory Insurance Networking 11/10/2016 831
Cloud What Can IT Professionals Learn from New AWS VP? InformationWeek 11/10/2016 831
Data 7 Reasons Why Data Science Lacks Ethics, and How to Retrofit Morality Information Management 11/10/2016 831
Bit bucket Infiniband will Reach 200-Gigabit Speed Next Year ComputerWorld 11/10/2016 831
Connectivity Hacker Shows How Easy it is to Take Over a City's Public Wi-Fi Network ComputerWorld 11/10/2016 831
Management Five Powerful Career Habits Of Naturally Curious People Fast Company 11/09/2016 832
Bit bucket Why We Help Our Best Talent to Leave TLNT 11/09/2016 832
Technology Why Social Media couldn't call Trump's Victory cnet 11/09/2016 832
Technology Why Social Media Couldn't call Trump's Victory cnet 11/09/2016 832
Data Wildly Inaccurate Election forecasts Highlight Big Data Challenges ZDnet 11/09/2016 832
Cloud Every Cloud Needs a Cop: How the FBI Secures Its Digital Assets TechRepublic 11/09/2016 832
Connectivity 6 Network and Security Trends You Can Expect In 2017 Network World 11/09/2016 832
Bit bucket What You Need to Know About Microservices Network World 11/09/2016 832
Connectivity 10 Interview Questions Networking Pros should Expect NetworkComputing 11/09/2016 832
Bit bucket 10 Hardest-to-Find Tech Skills IT World 11/09/2016 832
Management 5 Secrets to Creating the Best Project Management Resume IT World 11/09/2016 832
Data Polling Failures Don't Mean Big Data is Bunk Insurance Networking 11/09/2016 832
Management The Big Lesson We Must Learn from the Dyn DDoS Attack Dark Reading 11/09/2016 832
Bit bucket Why Embarrassment Can Be a Good Thing (and 3 Ways to Deal) Fast Company 11/08/2016 833
Connectivity How to Approach a VIP at a Crowded Networking Event Fast Company 11/08/2016 833
Bit bucket Six Things Great Bosses Constantly Remind their Teams Fast Company 11/08/2016 833
Bit bucket How IBM's Watson is Helping Doctors Diagnose the Most Rare and Elusive Illnesses ZDnet 11/08/2016 833
Bit bucket AI, Cognitive Computing to Disrupt Enterprises: IDC InformationWeek 11/08/2016 833
Security Stay Vigilant to the Evolving Threat of Social Engineering Dark Reading 11/08/2016 833
Connectivity Is Fingerprint Authentication Making the Password Problem Worse? Dark Reading 11/08/2016 833
Security The 7 Types of Security Jobs, According to NIST Dark Reading 11/08/2016 833
Technology Insect-Like Microrobots Move Just like Real Insects Science Daily 11/07/2016 834
Bit bucket 10 Predictions on IT Changes Over the Next 36 Months HelpNet Security 11/07/2016 834
Bit bucket 5 Common Communication Misfires (and How to Avoid Them) Fast Company 11/07/2016 834
Data Big Data: Three Ways to Make Your Project a Success ZDnet 11/07/2016 834
Management Project Management Screw-Up 4 - We Didn't Do a Good Project Schedule Project Management Advisor 11/07/2016 834
Connectivity 5 Things You Need to Know About Virtual Private Networks Network World 11/07/2016 834
Technology Diamonds Could Be Building Blocks for Quantum Computers Network World 11/07/2016 834
Connectivity 80/20 Rule of Network Equipment: Stay on Budget and Innovate Network World 11/07/2016 834
Technology Industrial IoT: 8 Things to Know NetworkComputing 11/07/2016 834
Bit bucket 10 of the Coolest Things Made on 3D Printers IT World 11/07/2016 834
Bit bucket How Gender-Neutral Job Postings Decrease Time to Hire IT World 11/07/2016 834
Security The Worst People You meet Doing IT Security IT World 11/07/2016 834
Cloud 5 Flavors of Hybrid Cloud Transforming the Enterprise InfoWorld 11/07/2016 834
Cloud Tips and Best Practices for Securing your Cloud Initiative Data Center Knowledge 11/07/2016 834
Technology Changing IoT Passwords Won't Stop Attacks. Here's what Will. Dark Reading 11/07/2016 834
Administration Transitioning from the Server Room to the Boardroom Dark Reading 11/05/2016 836
Storage Seven Myths for Hyperconverged Integrated Systems HelpNet Security 11/04/2016 837
Bit bucket How to Approach Your First Day As CSO Network World 11/04/2016 837
Cloud Securing the Cloud Endpoint Network World 11/04/2016 837
Data How to Increase Adoption of Your Big Data Analytics Platform Network World 11/04/2016 837
Bit bucket Phishing Scheme Crimps El Paso for $3.2 Million Network World 11/04/2016 837
Bit bucket Reducing the Risk of Phishing Attacks IT World Canada 11/04/2016 837
Bit bucket 6 Machine Learning Misunderstandings IT World 11/04/2016 837
Data Why Assuming Data is Secure Is Dangerous and Stupid IT World 11/04/2016 837
Management Overconfidence is Putting Organizations At Higher Risk for Attacks HelpNet Security 11/03/2016 838
Management Speed to Drive CIO Agenda in 2017 Network World 11/03/2016 838
Cloud 10 AWS Security Blunders and How to Avoid Them Network World 11/03/2016 838
Security Flood of Threat Intelligence Overwhelming for Many Firms Network World 11/03/2016 838
Compliance How SDN Interacts with Software-Defined Storage NetworkComputing 11/03/2016 838
Bit bucket OpenStack: The Philosophical Divide NetworkComputing 11/03/2016 838
Bit bucket DDoS Attack on Dyn Could Have Been Prevented IT World 11/03/2016 838
Connectivity How To Reduce Data and Network Latency Where Others Fail Data Center Knowledge 11/03/2016 838
Technology Engineers Develop New Magnetic Ink to Print Self-Healing Devices that Heal in Record Time Science Daily 11/02/2016 839
Bit bucket Ultra-fast 2-D and 3-D Printing Science Daily 11/02/2016 839
Bit bucket Building Risk Culture is Easier than Making Hot Dogs LinkedIn 11/02/2016 839
Data Most Employees Violate Policies Designed to Prevent Data Breaches HelpNet Security 11/02/2016 839
Management How Prepared Are You to Deal with Workplace Violence? TLNT 11/02/2016 839
Bit bucket Turning Pings Into Packets: Why The Future of Computers Looks a Lot Like Your Brain ZDnet 11/02/2016 839
Data IBM Engineer Says AR will Trump VR for Data Visualization Network World 11/02/2016 839
Cloud The Long, Slow Death of Private Cloud Continues Network World 11/02/2016 839
Cloud 6 Trends that Will Shape Cloud Computing in 2017 Network World 11/02/2016 839
Connectivity Network Performance Analysis: TCP MSS NetworkComputing 11/02/2016 839
Security 11 Cyber Threat Intelligence Tips Information Management 11/02/2016 839
Bit bucket Smart Machines: Is Full Automation Desirable? HelpNet Security 11/01/2016 840
Security Ex-CIA CTO: Don't Believe Everything You Hear about Hacking TechWorld 11/01/2016 840
Bit bucket The Top 6 Reasons Why Employees Leave, and How You Can Stop Them TechRepublic 11/01/2016 840
Bit bucket 8 Little Habits that Will Instantly Make You Happier Success 11/01/2016 840
Bit bucket Gartner: Despite the DDoS Attacks, Don't Give Up on Dyn or DNS Service Providers Network World 11/01/2016 840
Security BGP Security: Mitigating Route Leaks NetworkComputing 11/01/2016 840
Security Gartner's Top Cybersecurity 'Macro Trends' for 2017 IT World Canada 11/01/2016 840
Bit bucket 5 Ways to Reduce Bias In Your Hiring Practices IT World 11/01/2016 840
Bit bucket 10 Ways to Make Sure Your Remote Workers are Being Safe IT World 11/01/2016 840
Management 7 Security Lessons he Video Game Industry Can Teach IoT Manufacturers Dark Reading 11/01/2016 840
Security What Can We Do About the Critical Cybersecurity Skills Shortage? HelpNet Security 10/31/2016 841
Management The 5 Secrets of Great Interviewers TLNT 10/31/2016 841
Management Project Management Screw-Up - The Team Didn't Gel Project Management Advisor 10/31/2016 841
Security Improve IT Security: Start with These 10 Topics Network World 10/31/2016 841
Bit bucket 17 Essential Tools to Protect Your Online Identity, Privacy Network World 10/31/2016 841
Bit bucket How DNS Works: A Primer NetworkComputing 10/31/2016 841
Bit bucket The FCC's New Privacy Rules are Toothless IT World 10/31/2016 841
Management Are True IT Leaders Born or Made? InformationWeek 10/31/2016 841
Management Banding Together: 6 Challenges Shared by City CIOs Government Technology 10/31/2016 841
Data Big Data, Open Data and the Need for Data Transparency (Industry Perspective) Government Technology 10/31/2016 841
Compliance How Does Data Fabric Fit With Software-Defined Storage, and What Can It Do for You? Data Center Knowledge 10/31/2016 841
Technology China's Policing Robot: Cattle Prod meets Supercomputer ComputerWorld 10/31/2016 841
Data 5 Lessons Learned from Building a Data Pipeline ComputerWorld 10/31/2016 841
Security Slasher or Hacker? These 2016 Hacks Gave Us Nightmares cnet 10/29/2016 843
Data Companies Complacent about Data Breach Preparedness Network World 10/28/2016 844
Security The Limits of Encryption IT World 10/28/2016 844
Bit bucket Gartner's 10 Tech Predictions that Will Change IT InformationWeek 10/28/2016 844
Data Analytics, IoT Crucial to Mobile E-Commerce Growth InformationWeek 10/28/2016 844
Cloud Securing Data in the Cloud - To Encrypt, Authenticate, or Both? Information Management 10/28/2016 844
Bit bucket And Now a PREDATOR to Fight DNS Domain Abuse Dark Reading 10/28/2016 844
Security 5 Signs Your Smartphone has Been Hacked Dark Reading 10/28/2016 844
Bit bucket How to Take Down Irritating Drones without Shooting Them Out of the Sky ZDnet 10/27/2016 845
Technology The Secret Behind the Success Of Mirai IoT Botnets Network World 10/27/2016 845
Bit bucket Formula One puts you in the Grand Prix with VR and AR Network World 10/27/2016 845
Security Securing the Breach Trumps Breach Prevention Network World 10/27/2016 845
Connectivity CIO Security Lessons: Dark Thinking on IoT & Exploding Enterprise Networks Network World 10/27/2016 845
Bit bucket Racing to 2.5 and 5 Gigabit Ethernet NetworkComputing 10/27/2016 845
Connectivity SDN Post-Deployment Considerations NetworkComputing 10/27/2016 845
Bit bucket Terabit-Scale DDoS Events Are on the Horizon HelpNet Security 10/26/2016 846
Management Why Don't All Businesses Have a Good Continuity Strategy? HelpNet Security 10/26/2016 846
Bit bucket The PDF Format Finally Reaches 2.0 Release Network World 10/26/2016 846
Bit bucket OpenStack: It's Interoperable after All Network World 10/26/2016 846
Connectivity Why We May See the End of the Private Network NetworkComputing 10/26/2016 846
Bit bucket MPLS Lives on In Hybrid WAN Era NetworkComputing 10/26/2016 846
Bit bucket 7 Tech Nightmares Haunting IT Pros this Halloween Information Management 10/26/2016 846
Bit bucket Facial Recognition: Policy Outpaces Tech, Puts Certain Communities at Risk Government Technology 10/26/2016 846
Connectivity Let's Clean Up the Internet by Taking Responsibility for Our Actions Dark Reading 10/26/2016 846
Security Getting To the 'Just Right' Level of Encryption Dark Reading 10/26/2016 846
Management DDos on Dyn Used Malicious TCP, UDP Traffic Dark Reading 10/26/2016 846
Operations Renewable Energy Represented More than Half of All New Power Capacity In '15 ComputerWorld 10/26/2016 846
Management How to Explain the DDoS Attack on Dyn to Your CEO in Simple Terms CIO 10/26/2016 846
Management How to Explain the DDoS Attack on Dyn to Your CEO In Simple Terms CIO 10/26/2016 846
Data Researchers Use Big Data to Save Big Dollars on Fleet Vehicles Science Daily 10/25/2016 847
Technology How Often do Quantum Systems Violate the Second Law of Thermodynamics? Science Daily 10/25/2016 847
Management History Repeating: How the IoT Is Failing to Learn the Security Lessons of the Past ZDnet 10/25/2016 847
Bit bucket 19 Companies Using Drones right Now TechWorld 10/25/2016 847
Cloud Your Network, IoT Cloud Computing and the Future Network World 10/25/2016 847
Bit bucket Beyond 911: Other N-1-1 Codes You Should Know Network World 10/25/2016 847
Connectivity Network Troubleshooting: TCP SYN Analysis NetworkComputing 10/25/2016 847
Management 10 Qualities of Successful IT Leaders IT World Canada 10/25/2016 847
Cloud Is Public or Private Cloud Cheaper? Here's the Answer IT World Canada 10/25/2016 847
Bit bucket What Awareness Is Supposed to Be IT World 10/25/2016 847
Bit bucket The Only Realistic Plan to Avoid DDoS Disaster InfoWorld 10/25/2016 847
Security Blockchain & the Battle to Secure Digital Identities Dark Reading 10/25/2016 847
Bit bucket Dyn DDoS Attack: The Aftermath HelpNet Security 10/24/2016 848
Bit bucket 5 Secrets of Successful One-on-One Meetings TLNT 10/24/2016 848
Cloud The Enterprise Wish-List for the Hybrid Cloud Network World 10/24/2016 848
Connectivity Answers to 'Is the Internet Broken?' and other Dyn DDoS Questions Network World 10/24/2016 848
Security Better Safe Than Sorry: 5 Apps for Encrypting and Shredding Files Network World 10/24/2016 848
Bit bucket Performance Analysis: Bursting the Myth of MPLS Performance Network World 10/24/2016 848
Management How to Choose the Right Project Management Tools IT World 10/24/2016 848
Technology Frightening Technology Trends to Worry About IT World 10/24/2016 848
Bit bucket Bots May be Trumping Online Polls IT World 10/24/2016 848
Bit bucket Gartner Identifies Five Domains for the New Digital Platform Information Management 10/24/2016 848
Technology 'Root' & the New Age of IoT-Based DDoS Attacks Dark Reading 10/24/2016 848
Data Are Your Marketing Pros Ready to Handle Big Data? CIO 10/24/2016 848
Security 7 Steps to Proactive Security Network World 10/21/2016 851
Bit bucket 4 Developing Technologies that Could Help Solve Modern Problems Government Technology 10/21/2016 851
Bit bucket No -- I Won't Bring You Proof of My Last Salary Forbes 10/21/2016 851
Security Flipping Security Awareness Training Dark Reading 10/21/2016 851
Security 7 Imminent IoT Threats Dark Reading 10/21/2016 851
Security Fast-Track your Information Security Incident Response Plan Continuity Central 10/21/2016 851
Connectivity The Right Way To Back Out of a Networking Conversation Fast Company 10/20/2016 852
Security 3D Printing Hack: Researchers Crash Drone with Sabotaged Propeller TechRepublic 10/20/2016 852
Management 6 Essential Elements of a Good Business Plan IT World 10/20/2016 852
Management Why You Need to Develop an Immersive Security Strategy IT World 10/20/2016 852
Security Stupid Encryption Mistakes Criminals Make InfoWorld 10/20/2016 852
Data Encryption - Still the Best Way to Protect Data from Hackers Information Management 10/20/2016 852
Cloud Clueless CIO Cloud Confusion Continues ComputerWorld 10/20/2016 852
Connectivity Wi-Fi, LTE Ambient Signals to Replace, Augment GPS Network World 10/19/2016 853
Bit bucket 6 Industries That Will Be Affected by Virtual Reality Network World 10/19/2016 853
Security Only Do Penetration Tests if Your Security Program is Up To It, Say Experts IT World 10/19/2016 853
Management CISOs, It's Time to Bury the Hatchet with Your CIO IT World 10/19/2016 853
Security 'Kevin Durant Effect': What Skilled Cybersecurity Pros Want Dark Reading 10/19/2016 853
Security Malvertising Trends: Don't Talk Ad Standards without Ad Security Dark Reading 10/19/2016 853
Cloud Exploring Risks Associated with Cloud Backup Continuity Central 10/19/2016 853
Technology Is Your Service Center Too Dependent on Technology? ComputerWorld 10/19/2016 853
Bit bucket How to Select the Right Disaster Recovery Facility CIO Review 10/19/2016 853
Technology Three Email Habits that Kill Your Whole Team's Productivity Fast Company 10/18/2016 854
Management Why It May Be Time to Stop Outsourcing IT TechRepublic 10/18/2016 854
Data How Auto Giants are Using Big Data: A Conversation with Ford TechRepublic 10/18/2016 854
Management Feeling Stuck in Middle Management? Learning Corporate Strategy Can Help. TechRepublic 10/18/2016 854
Connectivity Wi-Fi Troubleshooting Remains a Challenge for Most Organizations Network World 10/18/2016 854
Management Gartner's 10 Strategic Predictions for 2017....And Beyond Network World 10/18/2016 854
Connectivity Networks help You Compress Time Network World 10/18/2016 854
Bit bucket How Can Good Guys Take Advantage of DNS IT World 10/18/2016 854
Bit bucket 10 Things Your Next Firewall must Do Information Management 10/18/2016 854
Cloud Cloud Security: Where to Get Started, Part 1 Business 2 Community 10/18/2016 854
Bit bucket Not All IT Incidents are Created Equal: How to Manage Escalations TechRepublic 10/17/2016 855
Bit bucket 56% of Employees Don't Have the Latest Tech Needed to Do Their Job Well TechRepublic 10/17/2016 855
Data DarkLight Removes Li-Fi Restriction, Allows Visible Light to Transmit Data in the Dark Network World 10/17/2016 855
Bit bucket Comparing Dynamic Routing Protocols NetworkComputing 10/17/2016 855
Data Few prepared for new European data protection regulations: Survey IT World Canada 10/17/2016 855
Data The 12 Top Paying Data Jobs for 2017 Insurance Networking 10/17/2016 855
Security Threat Response Automation: The Next Frontier for Cybersecurity Information Management 10/17/2016 855
Security The State of the Chief Information Security Officer Information Management 10/17/2016 855
Cloud Private Cloud vs. Public Cloud: Which Option is Cheaper? Data Center Knowledge 10/17/2016 855
Technology Diamonds aren't Forever: Team Creates first Quantum Computer Bridge Science Daily 10/14/2016 858
Cloud Alarming Cloud Encryption Misconceptions Revealed HelpNet Security 10/14/2016 858
Compliance All-Flash Storage: Tech's Ready, Is It Safe to Move Yet? The Register 10/14/2016 858
Bit bucket The 20 Biggest Tech Disasters of All Time TechRepublic 10/14/2016 858
Bit bucket Transforming Enterprise Communications Infrastructure NetworkComputing 10/14/2016 858
Management How Blockchain can Benefit IT Outsourcing Providers IT World 10/14/2016 858