IT Weekly

NEWSLETTER

Dec 11, 2018


Every week we bring you more than 40+ relevant online sources that contain articles of interest to IT and DC Professionals at all levels
Header


Browse by Technology
Browse by Year

Header

Header

Header
Category Articles From 2017 Source Posted Date Age
Management Outsourcing Trends to Watch in 2017 Network World 12/30/2017 346
Bit bucket NVMe: The Best Is Yet to Come NetworkComputing 12/29/2017 347
Cloud 3 New Year's Resolutions for the Cloud in 2018 InfoWorld 12/29/2017 347
Bit bucket Avoiding Micro-Segmentation Pitfalls: A Phased Approach to Implementation Dark Reading 12/29/2017 347
Bit bucket 17 Things We Should Have Learned in 2017, but Probably Didn't Dark Reading 12/29/2017 347
Technology IoT Is an Invitation to Ransomware Information Management 12/28/2017 348
Security The Disconnect Between Cybersecurity & the C-Suite Dark Reading 12/28/2017 348
Security IoT Security Using BLE Encryption NetworkComputing 12/27/2017 349
Data Predictions 2018: New Ransomware Threats Lead the Top Trends in Data Security Information Management 12/27/2017 349
Security 2018's Top Cybersecurity Threats Information Management 12/27/2017 349
Security The Coolest Hacks of 2017 Dark Reading 12/27/2017 349
Bit bucket Managing Switches with REST and Thrift APIs NetworkComputing 12/26/2017 350
Compliance Preparing For GDPR: How To Best Meet The New Compliance Requirements Information Management 12/26/2017 350
Management CISOs Play Rising Role in Business Dark Reading 12/26/2017 350
Management What It Takes to Be a Great Project Manager ComputerWorld 12/26/2017 350
Bit bucket Why 4K Isn't Enough: The Case for Higher Resolutions cnet 12/24/2017 352
Connectivity Will 2018 Be the Decisive Year for the Internet of Things? CIO Today 12/24/2017 352
Management 7 Skills Every IT Project Manager Needs Information Management 12/22/2017 354
Security What to Expect in 2018: Online Security Business 2 Community 12/22/2017 354
Bit bucket The 20 Worst Passwords of 2017: Did Yours Make the List? TechRepublic 12/21/2017 355
Data 8 Game-Changing Data Trends that Will Impact Businesses in 2018 TechRepublic 12/21/2017 355
Compliance GDPR: Looking Beyond the Burden NetworkComputing 12/21/2017 355
Bit bucket Beware of Hybrid IT Washing in 2018 InfoWorld 12/21/2017 355
Technology Watch for These 5 Technology Trends in 2018 Business 2 Community 12/21/2017 355
Management Digital Communications Your Business Should Be Encrypting And Securing Business 2 Community 12/21/2017 355
Bit bucket Researchers Find Jack-of-All-Trades Android Malware that Can Destroy Phones v3 co uk 12/20/2017 356
Operations 10 Hard Truths About Succeeding in IT Operations TechRepublic 12/20/2017 356
Technology Using The Dark Side Of Excitons for Quantum Computing Science Daily 12/20/2017 356
Bit bucket The Coldest Chip In the World Science Daily 12/20/2017 356
Bit bucket What is a Hypervisor? Networks Asia 12/20/2017 356
Management Shadow IT: How Today's CIOs Grapple with Unsanctioned Tech Networks Asia 12/20/2017 356
Management Hard Disk Drives Cling to Life as SSDs Take Off NetworkComputing 12/20/2017 356
Security Email has Been Weaponized by Hackers, Results Can Be Deadly CIO Today 12/20/2017 356
Management How To Execute on Strategy: Getting Great Ideas from the Whiteboard to the Boardroom ZDnet 12/20/2017 356
Data Part 1: Best Practices for Managing Enterprise Data Streams Data Center Knowledge 12/20/2017 356
Bit bucket Secret To 'Self-Healing' Glass Accidentally Discovered by Japanese Researchers v3 co uk 12/19/2017 357
Bit bucket 6 Toxic thoughts Successful People Quarantine The Ladders 12/19/2017 357
Bit bucket How to Rebuild Burned Bridges at Work The Ladders 12/19/2017 357
Cloud Cloud Storage Confusion Leading to Major Security Issues TechRepublic 12/19/2017 357
Data Top 10 Data Center Predictions: IDC Network World 12/19/2017 357
Management How to Kill a Dead Project IT World 12/19/2017 357
Data How to Assemble a Highly Effective Analytics Team IT World 12/19/2017 357
Cloud How the End of Net Neutrality Will Affect Enterprise Cloud Computing InfoWorld 12/19/2017 357
Technology Predictions 2018: 5 Trends Driving the IoT and IIoT Information Management 12/19/2017 357
Data Dispelling the 3 Most Common Myths About AI and Big Data Information Management 12/19/2017 357
Security Why Cryptography is Much Harder Than Software Engineers Think HelpNet Security 12/19/2017 357
Compliance Your Palms are Sweaty, Knees Weak, Arms are Heavy - You Forgot About Europe's GDPR Already The Register 12/19/2017 357
Compliance Storage Connection Protocol Testing Offers Lessons for Real-World Implementations TechRepublic 12/18/2017 358
Management How Can CISOs Choose Among Limitless Security Options with a Limited Budget? SC Magazine 12/18/2017 358
Security How to Use Blockchain: 10 Use Cases InformationWeek 12/18/2017 358
Compliance Predictions 2018: GDPR Boosts Interest in Data Governance Information Management 12/18/2017 358
Bit bucket Mastering the Three Top Tenets of Digital Transformation Information Management 12/18/2017 358
Management Five Things CIOs Can Do as IoT Adoption Turns Into a Nightmare HelpNet Security 12/18/2017 358
Management Five Workplace Issues We'll Be Talking About In 2018 Fast Company 12/18/2017 358
Connectivity Data Center Networks are Getting Faster and Smarter Data Center Knowledge 12/18/2017 358
Bit bucket Advanced Deception: How it Works & Why Attackers Hate It Dark Reading 12/18/2017 358
Data Why Do Password Policies Fail to Keep Data Safe? Business 2 Community 12/18/2017 358
Administration All I Want for Christmas is Compute: Enterprise Server Demand Rising The Register 12/18/2017 358
Bit bucket 3D Sensing to Become Mainstream for Smartphones in 2018 DigiTimes 12/18/2017 358
Management How To Futureproof Your Career as a CIO ComputerWeekly 12/18/2017 358
Bit bucket 15 Ways To Combat Cognitive Overload TechRepublic 12/17/2017 359
Security As Cryptocurrencies Soar, Regulators Call for Caution CIO Today 12/17/2017 359
Security Cybersecurity Predictions in the Zero Perimeter World Networks Asia 12/16/2017 360
Connectivity Net Neutrality: What's Next After the FCC Regulation Repeal? TechRepublic 12/15/2017 361
Technology Error-Free Into the Quantum Computer Age Science Daily 12/15/2017 361
Cloud The Network in 2018: Cloud, Containers, and Connections NetworkComputing 12/15/2017 361
Connectivity The Myth of Network Speed NetworkComputing 12/15/2017 361
Bit bucket Consumers Are Ready to Say Goodbye to Passwords HelpNet Security 12/15/2017 361
Bit bucket 10 Research-Proven Tricks that Make You Look Smarter Than You Are The Ladders 12/14/2017 362
Bit bucket Data 'Tsunami' to Absorb 20% of World Electricity Network World 12/14/2017 362
Management Understanding the Role of Information Rights Management Information Management 12/14/2017 362
Administration BlueBorne Attack Highlights Flaws in Linux, IoT Security Dark Reading 12/14/2017 362
Connectivity 5 Reasons Why America's Ctrl-Z on Net Neutrality Rules is a GOOD Thing The Register 12/14/2017 362
Bit bucket Funnily Enough, No, IT Admins Who Trash Biz Machines Can't Claim They Had Permission The Register 12/14/2017 362
Data As the Climate Changes, So Should Data Center Operations Data Center Knowledge 12/14/2017 362
Management Why 0% of US Companies Believe Their Information Security Strategy is Working TechRepublic 12/13/2017 363
Bit bucket Ransomware: A Cheat Sheet for Professionals TechRepublic 12/13/2017 363
Security 99% of Office Workers Threaten Their Company's Cybersecurity TechRepublic 12/13/2017 363
Bit bucket 5 Ways IT Workers Behave Badly And How to Deal With Them TechRepublic 12/13/2017 363
Bit bucket 6 Cutting-Edge Certifications for Infrastructure Pros NetworkComputing 12/13/2017 363
Bit bucket 10 Surprising Ways Machine Learning is Being Used Today InformationWeek 12/13/2017 363
Compliance GDPR and the Human Element of Personal Data Protection Information Management 12/13/2017 363
Data Why Wait to Be Breached? Three Reasons to Secure Your Data Now HelpNet Security 12/13/2017 363
Bit bucket These are the 10 Habits That Drive Recruiters Crazy Fast Company 12/13/2017 363
Data Google Sheds Light on Data Encryption Practices Dark Reading 12/13/2017 363
Storage Thanks To the 'Glassdoor Effect,' Companies Will Never Be the Same Benefit News 12/13/2017 363
Bit bucket Oklahoma's IT Unification Nets Hundreds of Millions in Savings Government Technology 12/13/2017 363
Bit bucket Meet The Machine That Color Sorts Tomatoes All by Itself CiOL 12/13/2017 363
Bit bucket 7 Indispensable Soft Skills To Develop for 2018 The Ladders 12/12/2017 364
Bit bucket Shatter-Proof Mobile Phone Screens a Step Closer Science Daily 12/12/2017 364
Connectivity Machine Learning Will Become the Most Important Technology Since the Internet Networks Asia 12/12/2017 364
Connectivity APIs and Networking: 3 Use Cases NetworkComputing 12/12/2017 364
Cloud Data Integration Is One Thing the Cloud Makes Worse IT World 12/12/2017 364
Data IoT Data Exchange: Building Trust and Value HelpNet Security 12/12/2017 364
Management Talking Blockchain with The Institutes' RiskBlock Alliance leader Digital Insurance 12/12/2017 364
Bit bucket Managing Risk or managing risks? Business 2 Community 12/12/2017 364
Data Algorithms Are Too Complicated, But Also Too Easy to Game, to Open the Black Box The Register 12/12/2017 364
Cloud Minimizing Public Cloud 'Blind Spots' as Apps Multiply Networks Asia 12/11/2017 365
Security McAfee Labs Previews Five Cybersecurity Trends for 2018 Networks Asia 12/11/2017 365
Compliance 7 Enterprise Storage Trends for 2018 NetworkComputing 12/11/2017 365
Bit bucket How to Determine Which Tech Trends Matter IT World Canada 12/11/2017 365
Management 5 Survival Tactics for Enterprise CIOs in 2018 InformationWeek 12/11/2017 365
Cloud AWS Ignites Debate About the Death of IT Ops InformationWeek 12/11/2017 365
Bit bucket The Most Important Quality to Look for When You're Hiring Forbes 12/11/2017 365
Bit bucket The Three Top Emerging IT Trends Continuity Central 12/10/2017 366
Management IT Versus the Organization InformationWeek 12/08/2017 368
Security What Slugs in a Garden Can Teach Us About Security Dark Reading 12/08/2017 368
Bit bucket Prevent Injuries, Death from Arc Flashes by Complying with NFPA Standards Data Center Knowledge 12/08/2017 368
Bit bucket The Etiquette Rule Book on Holiday Gifts for Your Boss TechRepublic 12/07/2017 369
Data What Is NoSQL? NoSQL Databases Explained InfoWorld 12/07/2017 369
Data No, You Shouldn't Keep All that Data Forever InfoWorld 12/07/2017 369
Cloud Hybrid Cloud - You're Doing It Wrong InformationWeek 12/07/2017 369
Bit bucket 4 Predictions for 2018: Data-Driven Decisions Pay Off Information Management 12/07/2017 369
Data 2018 Predictions: 6 Data Security Trends to Expect in the New Year Information Management 12/07/2017 369
Bit bucket Conficker: The Worm that Won't Die Dark Reading 12/07/2017 369
Cloud Disaster Recovery as a Service is Not Cloud Migration Data Center Knowledge 12/07/2017 369
Bit bucket Biggest Enterprise Software Will Soon Be SaaS-Only and It's Time to Worry Data Center Knowledge 12/07/2017 369
Security These 3 Departments are Causing the Biggest Cybersecurity Problems at Your Office TechRepublic 12/06/2017 370
Compliance Towards Data Storage at the Single Molecule Level Science Daily 12/06/2017 370
Data Micro-Modular Data Centers Set to Multiply Networks Asia 12/06/2017 370
Cloud Five Predictions for the Hybrid Cloud Market in 2018 Networks Asia 12/06/2017 370
Management Don't Fight It: Automate Firewall Analysis and Management Networks Asia 12/06/2017 370
Bit bucket 7 Digital Transformation Myths IT World 12/06/2017 370
Bit bucket Beyond NLP: 8 Challenges to Building a Chatbot InfoWorld 12/06/2017 370
Management How CIO/CFO Relationships Are Evolving InformationWeek 12/06/2017 370
Data Using the Scientific Method In Data Analytics for Better Results Information Management 12/06/2017 370
Data Many Organizations Can't Shake Data Security Fears With the IoT Information Management 12/06/2017 370
Bit bucket How Your Coworkers Make Assumptions About You Based on Body Language Fast Company 12/06/2017 370
Technology These Are the Four Biggest Email Problems (And How to Fix Them) Fast Company 12/06/2017 370
Security Why Cybersecurity Must Be an International Effort Dark Reading 12/06/2017 370
Bit bucket 7 Toxic Bosses You Should Avoid Like the Plague The Ladders 12/05/2017 371
Connectivity The Internet of Things is here: What is Your IoT Strategy? Networks Asia 12/05/2017 371
Security 5 Computer Security Facts that Surprise Most People IT World 12/05/2017 371
Security Simulated Attacks Uncover Real-World Problems in IT Security Dark Reading 12/05/2017 371
Bit bucket Improve Signal-to-Noise Ratio with 'Content Curation:' 5 Steps Dark Reading 12/05/2017 371
Bit bucket Real Words or Buzzwords?: Five Nines Security InfoWatch 12/05/2017 371
Data How to Make Big Data Part of a Long-Term Digital Transformation Plan TechRepublic 12/04/2017 372
Bit bucket New Nanowires Are Just a Few Atoms Thick Science Daily 12/04/2017 372
Data 5 Hot Enterprise Backup and Recovery Vendors NetworkComputing 12/04/2017 372
Bit bucket 10 Questions to Ask Your Employees Every Quarter Leadership Now 12/04/2017 372
Bit bucket What Is IFTTT? A Free Platform that Connects Everything as a Service IT World 12/04/2017 372
Management 20 Ways to Kill Your IT Career (Without Knowing It) IT World 12/04/2017 372
Technology Three Email Mistakes to Avoid the Week You Come Back from Vacation Fast Company 12/04/2017 372
Technology The Rising Dangers of Unsecured IoT Technology Dark Reading 12/04/2017 372
Connectivity Cheat Sheet: Two-Factor Authentication TechRepublic 12/01/2017 375
Bit bucket When Good Enough is No Longer Enough NetworkComputing 12/01/2017 375
Security What's New in PHP 7.2: Better Security, Code Handling InfoWorld 12/01/2017 375
Data Using Data to Drive a Smarter Way to Faster Insights Information Management 12/01/2017 375
Bit bucket How to Make Firing Someone During the Holidays Less Horrible Fast Company 12/01/2017 375
Security Security Geek Gift Guide Dark Reading 12/01/2017 375
Data Underground Data Centers are Having a Moment Data Center Knowledge 12/01/2017 375
Bit bucket Entertainment the Most Effective Lure for Phishing Attacks, Claims PhishMe v3 co uk 11/30/2017 376
Security How to Re-Add Yourself to the Sudo Security Group TechRepublic 11/30/2017 376
Bit bucket Amazon's Roadmap for the Future: 4 Signposts for the Tech Industry TechRepublic 11/30/2017 376
Security 35% of IT Professionals See Themselves As the Biggest Security Risk to Their Company TechRepublic 11/30/2017 376
Bit bucket Squeezing Light Into a Tiny Channel Brings Optical Computing a Step Closer Science Daily 11/30/2017 376
Bit bucket The Evil of Vanity Metrics HelpNet Security 11/30/2017 376
Management 6 Tips for Staffing Insurance Transformation Projects Digital Insurance 11/30/2017 376
Security 5 Free or Low-Cost Security Tools for Defenders Dark Reading 11/30/2017 376
Data Data Scientists & Analysts Need Not Apply: The Future of Data Analysis Business 2 Community 11/30/2017 376
Data Protecting Your Data From Ransomware The Register 11/30/2017 376
Administration From Devops to No-Ops: El Reg Chats Serverless Computing with NYT's CTO The Register 11/30/2017 376
Technology Big Step Forward for Quantum Computing Science Daily 11/29/2017 377
Technology A Transistor of Graphene Nanoribbons Science Daily 11/29/2017 377
Operations Data Center Cooling Market Set to Explode in the Coming Years Network World 11/29/2017 377
Data How Artificial Intelligence Will Self-Manage the Data Center Network World 11/29/2017 377
Cloud The Critical NetOps-Devops Tag Team for Multi-Cloud Agility Networks Asia 11/29/2017 377
Bit bucket What are Microservices? Lightweight Software Development Explained InfoWorld 11/29/2017 377
Bit bucket Do This Immediately After Messing Up to Regain Your Boss's Trust Fast Fast Company 11/29/2017 377
Management First US Federal CISO Shares Security Lessons Learned Dark Reading 11/29/2017 377
Bit bucket We Go Live to the Uber-Waymo Court Battle... You Are Not Going to Believe this. The Judge Certainly Doesn't The Register 11/29/2017 377
Bit bucket This Simple, Surprising Mental Trick will Improve Your Life, According to Steve Jobs The Ladders 11/28/2017 378
Connectivity Child-Proofing the Internet of Things Science Daily 11/28/2017 378
Connectivity The Case for Securing the SD-WAN Network World 11/28/2017 378
Cloud When It Comes to the Cloud, Don't Start with Technology InfoWorld 11/28/2017 378
Technology 11 Tech Giants Investing in Artificial Intelligence TechWorld 11/27/2017 379
Connectivity Ready for More Secure Authentication? Try These Password Alternatives and Enhancements Networks Asia 11/27/2017 379
Security Uber's Security Slip-Ups: What Went Wrong Dark Reading 11/27/2017 379
Security Reporting Line of the CISO: What Really Matters Business 2 Community 11/27/2017 379
Bit bucket My Machine Will Call Your Machine? No Jitter 11/27/2017 379
Technology Will Wearables Ever be Cool? Probably Not. But in Field Service, They'll be Useful Business 2 Community 11/26/2017 380
Bit bucket This Is How to Recover from Tragedy: 4 Secrets from Research The Ladders 11/24/2017 382
Technology The 12 Most Unlikely Places to Find Next-Level Technology TechRepublic 11/24/2017 382
Connectivity High-Speed Quantum Encryption May Help Secure the Future Internet Science Daily 11/24/2017 382
Management 10 Ways to Fund the Shift to Digital Business Networks Asia 11/24/2017 382
Cloud How to Diagnose Cloud Performance Issues InfoWorld 11/22/2017 384
Cloud Cloud Pricing Comparison: AWS vs. Microsoft Azure vs. Google Cloud vs. IBM Cloud InfoWorld 11/22/2017 384
Compliance How GDPR will Impact Data Management Practices Information Management 11/22/2017 384
Data 3 Ways to Consolidate Data Security and Disaster Recovery Strategies Information Management 11/22/2017 384
Management Only 12% of Organizations Are Likely to Detect a Sophisticated Cyber Attack HelpNet Security 11/22/2017 384
Data Six Data Security Questions that Every Board Needs to Ask HelpNet Security 11/22/2017 384
Operations Data Center Security: Honey Pots and the Art of Deceiving Hackers Data Center Knowledge 11/22/2017 384
Operations Data Center Standards: Where's the Value? Data Center Knowledge 11/22/2017 384
Cloud Facing the Hybrid Cloud Reality NetworkComputing 11/21/2017 385
Bit bucket Let's Take a Page from the Credit Card Industry's Playbook Dark Reading 11/21/2017 385
Bit bucket Ten Bad Habits You Must Eliminate from Your Daily Routine The Ladders 11/20/2017 386
Storage NASA Shows the World Its 20-Year Virtual Reality Experiment to Train Astronauts: The Inside Story TechRepublic 11/20/2017 386
Data How Law Firms are Protecting Client Data From Cyber Threats TechRepublic 11/20/2017 386
Security How Blockchain Encryption Works: It's all About Math TechRepublic 11/20/2017 386
Bit bucket 21 Weird Tech Job Titles of the Future TechRepublic 11/20/2017 386
Bit bucket RAID Is 30-YearsOld Storage Newsletter 11/20/2017 386
Bit bucket UEFI 101, and Why You Need it Scanned Networks Asia 11/20/2017 386
Technology Pushing IoT to the Edge Networks Asia 11/20/2017 386
Data Resolving the Conflict between Data Security and IT Operations Information Management 11/20/2017 386
Security 2017 Security Predictions IT World 11/20/2017 386
Cloud The Cloud: We're Not in 2012 Any More InformationWeek 11/17/2017 389
Data Why Analytics Will Be the Next Competitive Edge Information Management 11/17/2017 389
Bit bucket IPv6 Migration: 5 Best Practices NetworkComputing 11/16/2017 390
Devops 9 'People Problems' Plaguing DevOps InformationWeek 11/16/2017 390
Bit bucket The 20 Coolest Star Wars Coffee Mugs in Any Galaxy TechRepublic 11/16/2017 390
Security Blockchain is Where Anonymity Meets Transparency The FCPA Blog 11/16/2017 390
Compliance Preparing the Enterprise for GDPR and the Era of Data Compliance and Security Networks Asia 11/15/2017 391
Data Most Data Breaches Start Internally: Blackberry Report IT World Canada 11/15/2017 391
Compliance What Organizations Must Do In the Six Months Leading to GDPR Information Management 11/15/2017 391
Compliance Mobile Devices Present a Significant Risk for GDPR Noncompliance HelpNet Security 11/15/2017 391
Technology Deception Technology: Prevention Reimagined Dark Reading 11/15/2017 391
Security Fred Kwong: The Psychology of Being a CISO Dark Reading 11/15/2017 391
Security Blockchain-as-a-Service Allows Enterprises Test Distributed Ledger Technology ComputerWorld 11/15/2017 391
Bit bucket Several MailChimp Accounts Compromised as Phishing Attack Impersonates Major Brands IT Security Guru 11/15/2017 391
Bit bucket Nifty and Nerdy: 10 Holiday Gifts for IT Pros NetworkComputing 11/14/2017 392
Bit bucket Stop Trying to Be Friends With All Your Coworkers, and Do This Instead Fast Company 11/14/2017 392
Bit bucket Good for You: Eight Habits of Considerate People The Ladders 11/13/2017 393
Bit bucket Thinking We're Being Paid Fairly Matters More than Actually Being Paid Fairly The Ladders 11/13/2017 393
Security Hackers In Hollywood: How Mr. Robot Got it Right TechRepublic 11/13/2017 393
Bit bucket Don't Just Jump On the Bandwagon: Which Emerging Tech is Worth Your Time? Networks Asia 11/13/2017 393
Bit bucket 25 Vendors Making Waves in IT Infrastructure NetworkComputing 11/13/2017 393
Devops 25 DevOps Vendors to Consider in 2018 InformationWeek 11/13/2017 393
Data 25 Data & Analytics Vendors at the Forefront in 2018 InformationWeek 11/13/2017 393
Security Risk Assessment: The First Step in Improving Cyber Security HelpNet Security 11/13/2017 393
Compliance Is Your CCTV System GDPR Compliant? HelpNet Security 11/13/2017 393
Management The Emotionally Intelligent Manager's Guide to Leading Remote Teams Fast Company 11/13/2017 393
Security Emerging IT Security Technologies: 13 Categories, 26 Vendors Dark Reading 11/13/2017 393
Management Cisco: Most IoT Projects are Failing Due to Lack of Experience and Security ZDnet 11/13/2017 393
Bit bucket Yes, You Can Fire Someone for What They Post Online TLNT 11/10/2017 396
Bit bucket 20 Bad Tech Gifts to Avoid Giving During the 2017 Holiday Season TechRepublic 11/10/2017 396
Cloud Everything as a Service: Cloud Providers Solve Problems in-House IT Can't and Do It More Quickly and for Less Money TechRepublic 11/10/2017 396
Security Cybersecurity Predictions for 2018: It's Going to Be "A Lot More of the Same" TechRepublic 11/10/2017 396
Data 85% Of Big Data Projects Fail, but Your Developers Can Help Yours Succeed TechRepublic 11/10/2017 396
Data Most Companies Ill-Prepared for EU Data Protection Requirements Information Management 11/10/2017 396
Management Digital Business is Turning CIOs Into Leaders HelpNet Security 11/10/2017 396
Connectivity Never Start Your Networking Conversations by Saying These 8 Things Fast Company 11/10/2017 396
Security 6 Steps for Sharing Threat Intelligence Dark Reading 11/10/2017 396
Security Customers Punish Breached Companies Dark Reading 11/10/2017 396
Security Why Common Sense is Not so Common in Security: 20 Answers Dark Reading 11/10/2017 396
Compliance Why Europe's GDPR Privacy Regulation is Good for Business ComputerWeekly 11/10/2017 396
Bit bucket How to Improve the ROI of Your Staff Meetings TLNT 11/09/2017 397
Connectivity AI and the Future of Network Security NetworkComputing 11/09/2017 397
Administration Virtualization in the WAN: Where It's Headed NetworkComputing 11/09/2017 397
Management 5 Lessons from New Technology Leaders - Claudio Silvestri, NAV Canada IT World Canada 11/09/2017 397
Management 5 Lessons from New Technology Leaders - Bruce Ross, Royal Bank of Canada IT World Canada 11/09/2017 397
Bit bucket 10 Worries that Should Keep Every Developer Up at Night (2018 Edition) InfoWorld 11/09/2017 397
Devops Are DevOps and Software Quality Incompatible? InformationWeek 11/09/2017 397
Data Why Automation Won't Displace Human Intelligence in Analytics InformationWeek 11/09/2017 397
Compliance Top GDPR Compliance Risks: Breach Notification, Data Mapping, Managing Consent HelpNet Security 11/09/2017 397
Bit bucket Microsoft Offers Mitigation Advice for DDE Attacks Scenarios HelpNet Security 11/09/2017 397
Management These Emotionally Intelligent Habits can Make You a Better Listener Fast Company 11/09/2017 397
Bit bucket 3 Times You Should Say Yes to Office Happy Hour Fast Company 11/09/2017 397
Data Why Insurance CIOs Should Invest in AI, IoT and Big Data All at Once Digital Insurance 11/09/2017 397
Data Cybersecurity Staffing Shortage Tied to Cyberattacks, Data Breaches Dark Reading 11/09/2017 397
Data 8 Steps to Take Within 48 Hours of a Data Breach TechRepublic 11/08/2017 398
Bit bucket Compensation Planning: Your Key to Retaining Top Talent IT World 11/08/2017 398
Security 12 Famous (and Infamous) IT Security Disasters IT World 11/08/2017 398
Security What is Quantum Encryption? It's No Silver Bullet, But could Improve Security IT World 11/08/2017 398
Data How to Choose a Database for Your Microservices InfoWorld 11/08/2017 398
Security IoT Anxiety is Consuming Security Professionals HelpNet Security 11/08/2017 398
Bit bucket This Is the Right Way to "Play Politics" at Work Fast Company 11/08/2017 398
Technology We're Not Saying Uncle Sam Has Lost Control on Twitter, But US Embassy in Riyadh Just Did a Shout Out for Oatmeal The Register 11/08/2017 398
Security The Entertainment Industry Needs to Invest More in Cybersecurity Says Ethical Hacker Ralph Echemendia TechWorld 11/07/2017 399
Security Forrester's Top 6 Cybersecurity Predictions for 2018 TechRepublic 11/07/2017 399
Bit bucket The Role of VNF in NFV Deployments Networks Asia 11/07/2017 399
Data 7 Sure-Fire Ways to Fail at Data Analytics IT World 11/07/2017 399
Compliance How GDPR Affects Your Organization HelpNet Security 11/07/2017 399
Bit bucket Managers: What You Should Do When an Employee Reports Harassment Fast Company 11/07/2017 399
Management These 5 Interview Questions Reveal the Most About Job Candidates Fast Company 11/07/2017 399
Technology How I Infiltrated a Fortune 500 Company with Social Engineering Dark Reading 11/07/2017 399
Security Hiring Outside the Box in Cybersecurity Dark Reading 11/07/2017 399
Bit bucket Who's That Cuddling Up in the Container... *Squints* Wow You're Getting Along Well The Register 11/07/2017 399
Security What is Blockchain? And 5 Other Questions Your Boss Needs Answered ASAP TechRepublic 11/06/2017 400
Data 5 Ways to Build Your Company's Defense Against a Data Breach before It Happens TechRepublic 11/06/2017 400
Connectivity Internet of Things Definitions: A Handy Guide to Essential IoT Terms Networks Asia 11/06/2017 400
Connectivity 7 Enterprise Networking Trends for 2018 NetworkComputing 11/06/2017 400
Management Stay Grounded when Dealing with AI Projects InformationWeek 11/06/2017 400
Bit bucket Majority of Firms Now Adopting AI; More Investments Planned Information Management 11/06/2017 400
Management Ten Important Shifts Impacting IT Organizations Over the Next 36 Months HelpNet Security 11/06/2017 400
Security The Evolution of BYOD Security in a Mobile-First World HelpNet Security 11/06/2017 400
Bit bucket When Ransomware Strikes: 7 Steps You Can Take Now to Prepare Dark Reading 11/06/2017 400
Bit bucket The Death Knell of Passwords? It's Closer than You Think Dark Reading 11/06/2017 400
Management Integrating IT Services and IT Operations: Why Businesses Should Care Data Center Knowledge 11/06/2017 400
Bit bucket This is Where Confidence Comes From The Ladders 11/04/2017 402
Bit bucket Use These 3 Tips to Talk Like a Boss The Ladders 11/03/2017 403
Security Hackers Find An Evil Use for SEO SC Magazine 11/03/2017 403
Management 6 IoT Skills that Will Future-Proof Your Career Network World 11/03/2017 403
Technology Wearables are Showing Their True Worth in the Enterprise Space Networks Asia 11/03/2017 403
Administration Build an Ultra-Secure Microsoft Exchange Server Networks Asia 11/03/2017 403
Bit bucket DNS: Valuable and Vulnerable NetworkComputing 11/03/2017 403
Technology Forrester's Top 10 Technology Trends for 2018 Digital Insurance 11/03/2017 403
Management Consumers Don't Trust Businesses Can Protect their Data Dark Reading 11/03/2017 403
Security 4 Ways the Next Generation of Security Is Changing Dark Reading 11/03/2017 403
Cloud A Myth, Plan, and Test: Cloud-based Backup and Disaster Recovery Data Center Knowledge 11/03/2017 403
Bit bucket Is Credential Creep Strangling Your Hiring? TLNT 11/02/2017 404
Bit bucket 9 Stupid Rules that Make Great People Quit The Ladders 11/02/2017 404
Data How Big Data Won the 2017 World Series TechRepublic 11/02/2017 404
Data End-to-End Data Encryption: Why HTTPS is Not Enough SC Magazine 11/02/2017 404
Bit bucket IPv6 Addressing for Enterprises Network World 11/02/2017 404
Data 6 Trends Shaping the Future of Data Analytics Information Management 11/02/2017 404
Cloud 6 Impacts of GDPR On Organizations That Store Data in the Cloud Information Management 11/02/2017 404
Data 7 Tips to Reduce Risks of Data Breaches HelpNet Security 11/02/2017 404
Bit bucket The Five Things that Trustworthy Bosses Have Mastered Fast Company 11/02/2017 404
Bit bucket Social Engineer Spills Tricks of the Trade Dark Reading 11/02/2017 404
Security 10 Mistakes End Users Make that Drive Security Managers Crazy Dark Reading 11/02/2017 404
Bit bucket Atto, Boy! Eggheads Fire Laser for 43 Attoseconds, Fastest Man-Made Spurt The Register 11/02/2017 404
Bit bucket Hardware Has Never Been Better, But It Isn't a License for Code Bloat The Register 11/02/2017 404
Management Making Sense of the SD-WAN Business Case Network World 11/01/2017 405
Bit bucket Goodbye Legacy Systems, Hello "Composable IT" Networks Asia 11/01/2017 405
Bit bucket AI is not What You Think It Is Networks Asia 11/01/2017 405
Data Steps for Data Center Recovery Following a Natural Disaster Information Management 11/01/2017 405
Bit bucket IT Automation: Where It's Working, Where it's Not ZDnet 11/01/2017 405
Bit bucket So, Tell Us Again How Tech Giants are More Important Than US Govt... The Register 11/01/2017 405
Bit bucket This Is How Important It Is to Have a Supportive Manager The Ladders 10/31/2017 406
Bit bucket 11 Habits of Supremely Happy People The Ladders 10/31/2017 406
Technology The Automated Office: 8 Ways Companies are Using AI to Increase Productivity TechRepublic 10/31/2017 406
Bit bucket How to Identify Every Type of Phishing Attack Networks Asia 10/31/2017 406
Compliance The GDPR and Personal Data ... Help! Information Management 10/31/2017 406
Management 8 Issues Every CIO Needs to Solve about Artificial Intelligence Information Management 10/31/2017 406
Compliance The Clock is Ticking on GDPR: Is Your Business Ready? HelpNet Security 10/31/2017 406
Security Who Says Brilliant Security Engineers Can't be Amazing People Managers? Dark Reading 10/31/2017 406
Bit bucket Stop Counting Vulnerabilities & Start Measuring Risk Dark Reading 10/31/2017 406
Bit bucket Your VPN Needs these Eight Essential Features CIO Today 10/31/2017 406
Bit bucket Why It's a Mistake to Think Managers are Effective Coaches TLNT 10/30/2017 407
Data 59% Of Employed Data Scientists Learned Skills on Their Own or Via a MOOC TechRepublic 10/30/2017 407
Management How the Most (And Least) Successful CEOs Spend Their Workdays Fast Company 10/30/2017 407
Security Preventing Credential Theft: A Security Checklist for Boards Dark Reading 10/30/2017 407
Security It's Time to Change the Cybersecurity Conversation Dark Reading 10/30/2017 407
Technology IoT Won't Take Off Until SoCs Cost 50 Cents or Less - ARM TechCon v3 co uk 10/27/2017 410
Bit bucket Here's How Attractiveness Can Hurt You at Work The Ladders 10/27/2017 410
Bit bucket Detecting and Guarding Against Phishing Attempts Networks Asia 10/27/2017 410
Data 19 Big Data Certifications that Will Pay Off Networks Asia 10/27/2017 410
Bit bucket Secrets of the Most Resilient People Fast Company 10/27/2017 410
Connectivity Passwords Use Alone still Trumps Multi-Factor Authentication Dark Reading 10/27/2017 410
Bit bucket Terrifying Tech to Haunt Your Halloween ComputerWorld 10/27/2017 410
Connectivity Field Of Digital Dreams: Why MLB is Betting Its Future on Big Data, Wi-Fi, Apps, and AR TechRepublic 10/26/2017 411
Bit bucket Why IT Pros Need To Remain Curious NetworkComputing 10/26/2017 411
Data Even Data Scientists are Facing AI Takeover InfoWorld 10/26/2017 411
Security Quantum Computing Brings Promise and Threats InformationWeek 10/26/2017 411
Bit bucket Ask These 9 Questions Before Every Meeting to Avoid Wasting Time Fast Company 10/26/2017 411
Connectivity A Checklist for Securing the Internet of Things Dark Reading 10/26/2017 411
Cloud Security Forecast: Cloudy with Low Data Visibility Dark Reading 10/26/2017 411
Cloud The Huge Security Threat of Misconfigured Cloud and How to Fix It Data Center Knowledge 10/26/2017 411
Cloud Multi-Cloud Approaches Within Reach Data Center Knowledge 10/26/2017 411
Bit bucket 9 Bad Habits You Must Break to Be More Productive The Ladders 10/24/2017 413
Management The CDO and the CIO: Is It a Love or Hate Relationship? Digital Insurance 10/23/2017 414
Bit bucket The Machine Learning Era has Arrived NetworkComputing 10/20/2017 417
Bit bucket 11 Habits of Ridiculously Likeable People The Ladders 10/19/2017 418
Bit bucket Old-School Archiving: Five Bad Habits to Break Information Management 10/19/2017 418
Technology 10 Social Engineering Attacks Your End Users Need to Know About Dark Reading 10/19/2017 418
Bit bucket Flash In The Enterprise Is In a Solid State. Where is it Going Next? The Register 10/19/2017 418
Management How To Conduct a Technical Interview: 5 Questions to Ask TechRepublic 10/18/2017 419
Management 5 Steps Leaders Can Take to Improve Cybersecurity in Their Organization TechRepublic 10/18/2017 419
Management GE CIO: Machines Will Tell Humans What to Do, Not the Other Way Around Network World 10/18/2017 419
Data First Self-Powered Data Center Opens Network World 10/18/2017 419
Cloud What is Hybrid Cloud Computing? Networks Asia 10/18/2017 419
Cloud TCO: Why SISTIC Bought a Ticket for the Private Cloud Train Networks Asia 10/18/2017 419
Security How Containers and Microservices Change Security InfoWorld 10/18/2017 419
Bit bucket How To Make the Case for Hardware and Software Modernization Information Management 10/18/2017 419
Cloud Security Flaws in Children's Smartwatches Make Them Vulnerable to Hackers ZDnet 10/18/2017 419
Bit bucket CERT: These Emerging Technologies Bring New Risks ZDNet 10/18/2017 419
Connectivity 6 AI Ingredients every Wireless Networking Strategy Needs Network World 10/17/2017 420
Devops DevSecOps: Add Security To Complete Your DevOps Process InfoWorld 10/17/2017 420
Technology Create Real Value with Augmented (not Artificial) Intelligence Informationweek 10/17/2017 420
Security IT Execs Must Ensure Key Security Practices are Constantly Observed Information Management 10/17/2017 420
Management Why Security Leaders Can't Afford to Be Just 'Left-Brained' Dark Reading 10/17/2017 420
Security InfoSec Pros Among Worst Offenders of Employer Snooping Dark Reading 10/17/2017 420
Connectivity Here's Every Patch for KRACK Wi-Fi Vulnerability Available Right Now ZDnet 10/17/2017 420
Bit bucket Surprise! Most People Leave Companies, not Managers TLNT 10/16/2017 421
Bit bucket SAML Explained: What it Is, What It's Used for, How it Works Networks Asia 10/16/2017 421
Compliance GDPR: The Role of the DPO - and How to Find One in a Competitive Landscape Information Management 10/16/2017 421
Data Almost Half of Non-IT and Data Pros Don't Understand Blockchain HelpNet Security 10/16/2017 421
Security Printers: The Weak Link in Enterprise Security Dark Reading 10/16/2017 421
Security WPA2 Security In Trouble as KRACK Belgian Boffins Tease Key Reinstallation Bug The Register 10/16/2017 421
Data Keep Your Voice Down in the Data Centre, The HDDs Have Ears! I SAID, KEEP... The Register 10/16/2017 421
Operations Huge Power Imbalance Between Firms and Users Whose Info They Grab The Register 10/16/2017 421
Bit bucket A Look at Firewalls Networks Asia 10/13/2017 424
Management 9 IT Projects Primed for Machine Learning Networks Asia 10/13/2017 424
Cloud 10 Major Cloud Storage Security Slip-Ups (So Far) this Year Dark Reading 10/13/2017 424
Technology 9 Scary Robots That Will Give You the Jitters ZDnet 10/13/2017 424
Technology It's time for a New C-Suite Position: Chief AI Officer ZDnet 10/13/2017 424
Data IT At Sea Makes Data too Easy to See: Ships are Basically Big Floating Security Nightmares The Register 10/13/2017 424
Bit bucket The Looming Showdown: Privacy, Wellness and Productivity TLNT 10/12/2017 425
Bit bucket Ten Uncomfortable Deeds that Will Pay Off Forever The Ladders 10/12/2017 425
Cloud Shadow Cloud Apps Pose Unseen Risks Networks Asia 10/12/2017 425
Security Is Automation the Future of Cyber Security? Networks Asia 10/12/2017 425
Management Tips for Transitioning from the IT Department to CEO Chair InformationWeek 10/12/2017 425
Technology These Common Email Mistakes are Ruining Your Credibility Fast Company 10/12/2017 425
Bit bucket Four Steps Employers Should Take as the Weinstein Scandal Unfolds Fast Company 10/12/2017 425
Compliance Who Will Keep You Out Of Trouble With the GDPR? v3 co uk 10/11/2017 426
Data Your Data is Biased, Here's Why InformationWeek 10/11/2017 426
Compliance 10 Steps Enterprises Need to Take to Comply with GDPR InformationWeek 10/11/2017 426
Cloud 6 Questions Providers Should ask Cloud Vendors Information management 10/11/2017 426
Connectivity IoT: Insecurity of Things or Internet of Threats? Dark Reading 10/11/2017 426
Technology Companies are Investing Millions In AI -- and Facing Big Barriers ZDnet 10/11/2017 426
Cloud Containers Unlock the Cloud Data Center Dynamics 10/11/2017 426
Security Put CISOs On the Board, Urges F-Secure Chief Research Officer Mikko Hyppnen v3 co uk 10/10/2017 427
Connectivity Organisations Must Treat Their Network as a Utility v3 co uk 10/10/2017 427
Cloud Cryptocurrency Miners Put Cloud at Risk with Hacking Efforts v3 co uk 10/10/2017 427
Bit bucket 6 Reasons why Your Boss Doesn't Trust You The Ladders 10/10/2017 427
Bit bucket Autonomous Protection of Applications (and Cars) SC Magazine 10/10/2017 427
Compliance Tape Storage: Past, Present and Future ITProPortal 10/10/2017 427
Cloud Now's the Time To Do Deep Learning in the Cloud InfoWorld 10/10/2017 427
Data Steps for Adapting Data Governance to Modern Analytics Information Management 10/10/2017 427
Security Unstructured Data: The Threat You Cannot See Dark Reading 10/10/2017 427
Devops The Importance of Devops In Digital Transformation Networks Asia 10/09/2017 428
Devops How Devops Changes Monitoring InfoWorld 10/09/2017 428
Bit bucket I Lost My Brother to Opioid Addiction. Here's How Employers Can Address the Crisis Fast Company 10/09/2017 428
Connectivity New 4G, 5G Network Flaw 'Worrisome' Dark Reading 10/09/2017 428
Bit bucket The Future of Mobility: Are We Asking the Right Questions? ComputerWorld 10/09/2017 428
Management What is EMM? Enterprise Mobility Management Explained ComputerWorld 10/09/2017 428
Bit bucket 5 Ways Newer ERP Systems Overcome Traditional Limitations CIO 10/09/2017 428
Bit bucket Data! I Need more Data! Project Management Advisor 10/09/2017 428
Bit bucket How Elon Musk Runs an Efficient Meeting - and You Can, Too The Ladders 10/06/2017 431
Technology Data or Metadata? For the IoT They're Both Important Network World 10/06/2017 431
Cloud The Cloud Computing Wars Have Forgotten the Enterprise InfoWorld 10/06/2017 431
Security Leaving Employees to Manage Their Own Password Security is a Mistake HelpNet Security 10/06/2017 431
Technology Most Decision Makers Expect ROI from Artificial Intelligence Within Two Years HelpNet Security 10/06/2017 431
Security Rise in Insider Threats Drives Shift to Training, Data-Level Security Dark Reading 10/06/2017 431
Security Here's Google's Biggest Secret to Not Failing At Security TechRepublic 10/06/2017 431
Management 10 Ways to Help Get a New IT Leader Up to Speed TechRepublic 10/06/2017 431
Security Blockchain for Banks: Benefits and Implications CiOL 10/06/2017 431
Management 5 Ways You Can Use Exit Interviews to Improve Performance TLNT 10/05/2017 432
Cloud Top 5: Alternatives to Centralized Cloud Services TechRepublic 10/05/2017 432
Connectivity Most Network Endpoints Are in the Dark: Do You Know How to Find Them? HelpNet Security 10/05/2017 432
Technology The Privacy Implications of Email Tracking HelpNet Security 10/05/2017 432
Compliance Beyond GDPR: Data Protection as a Competitive Advantage HelpNet Security 10/05/2017 432
Management Three Ways to Get Everyone in Your Work Life to Like You Better Fast Company 10/05/2017 432
Management How Project Teams can Improve QA Testing TechRepublic 10/05/2017 432
Management 10 Questions Job Seekers Can Expect in a Cybersecurity Interview TechRepublic 10/05/2017 432
Technology IoT Tipping Point: Connection Capacity NetworkComputing 10/05/2017 432
Administration Why Expected Server Lifetime Is in the Eye of the Beholder Data Center Knowledge 10/05/2017 432
Data Making Sense of Unstructured Data with Text Analytics Business 2 Community 10/05/2017 432
Bit bucket How to Read People: 5 Secrets Backed by Research The Ladders 10/04/2017 433
Technology HPC Meets AI - A World of Possibilities Networks Asia 10/04/2017 433
Devops How DevOps Changes Both Dev and Ops InfoWorld 10/04/2017 433
Management AI, Cybersecurity Two Biggest Trends Shaping the CIO Role Information Management 10/04/2017 433
Data Ransomware Will Target Backups: 4 Ways to Protect Your Data Dark Reading 10/04/2017 433
Security What Security Teams Need to Know about the NIAC Report Dark Reading 10/04/2017 433
Bit bucket Pixel, iPhone, Galaxy, Oh My! Why Pay a Premium When Every Phone Runs the Same Apps? ZDnet 10/04/2017 433
Bit bucket Passwords as We Know Them Are Dying, Here's What Will Take Their Place TechRepublic 10/04/2017 433
Bit bucket DNSSEC Key Signing Key Rollover: Are You Ready? Networks Asia 10/03/2017 434
Data Five Big Data Misbeliefs that Could Cost Organizations Millions Information Management 10/03/2017 434
Security 70% of US Employees Lack Security and Privacy Awareness Dark Reading 10/03/2017 434
Cloud DevOpsSec: A Big Step in Cloud Application Security Dark Reading 10/03/2017 434
Technology 10 Ways Technology is Changing Disaster Response TechRepublic 10/03/2017 434
Bit bucket SDN: Time to Move On, Gartner Says NetworkComputing 10/03/2017 434
Bit bucket The 4 Rituals That Will Make You an Expert at Anything The Ladders 10/02/2017 435
Management 20 Harsh, But Necessary, Lessons You Learn in Your 20s The Ladders 10/02/2017 435
Bit bucket Asphalt Helps Lithium Batteries Charge Faster Science Daily 10/02/2017 435
Security How Attackers Can Take Advantage of Encrypted Tunnels HelpNet Security 10/02/2017 435
Connectivity Protecting Networks from DNS Exfiltration HelpNet Security 10/02/2017 435
Compliance How US and UK Companies Address GDPR Data Protection Requirements HelpNet Security 10/02/2017 435
Bit bucket Introvert Or Extrovert? Here's Another Way to Think About Your Personality Fast Company 10/02/2017 435
Bit bucket 5 IT Practices That Put Enterprises at Risk Dark Reading 10/02/2017 435
Bit bucket BYOD Might Be a Hipster Honeypot But It's Rarely Worth the Extra Hassle The Register 10/02/2017 435
Data 6 Big Data Privacy Practices Every Company Should Adopt in 2018 TechRepublic 10/02/2017 435
Compliance Big Data Storage: 7 Key Factors NetworkComputing 10/02/2017 435
Bit bucket 6 Ways to Protect Customer Data Business 2 Community 10/02/2017 435
Connectivity Get Ready for 'Unlimited Data' of 5G Networks in 2019 cnet 10/01/2017 436
Bit bucket America's First Exascale Supercomputer Set for 2021 Debut Network World 09/29/2017 438
Data In Equifax Data Breach, Three Hard Lessons in Risk Networks Asia 09/29/2017 438
Cloud 6 Cloud Cost Management Tips Networks Asia 09/29/2017 438
Data Why AI and Advanced Analytics Benefits Still Elude Most Organizations Information Management 09/29/2017 438
Management CISOs Offer Soup-to-Nuts C-Suite Strategy Dark Reading 09/29/2017 438
Management Best and Worst Security Functions to Outsource Dark Reading 09/29/2017 438
Administration 3 Things Infrastructure Pros Need to Know About Nested Virtualization on Google Cloud TechRepublic 09/29/2017 438
Management Humility Builds Leadership Loyalty TLNT 09/28/2017 439
Bit bucket Try This Trick to Go Straight to Sleep The Ladders 09/28/2017 439
Connectivity Spock's Wise Words for Today's Network Managers Network World 09/28/2017 439
Security 10 Critical Security Skills every IT Team Needs IT World 09/28/2017 439
Management 6 Tips for Negotiating CIO Noncompete Agreements IT World 09/28/2017 439
Connectivity 10 of the Most Dangerous Malware Threats on the Internet Today TechRepublic 09/28/2017 439
Bit bucket 5 Easy Tips to Improve Your Company's Intranet TechRepublic 09/28/2017 439
Data Top 3 Data Center Myths Debunked NetworkComputing 09/28/2017 439
Bit bucket When Disasters Strike, Edge Computing Must Kick In Network World 09/27/2017 440
Connectivity Bossie Awards 2017: The Best Networking and Security Software IT World 09/27/2017 440
Technology Digital Twins and IoT Enable Smart Products and Services InformationWeek 09/27/2017 440
Security Which Security Investments Make a Difference? HelpNet Security 09/27/2017 440
Bit bucket I Went To The Gym for Cardio Training and Left As a Better Boss Fast Company 09/27/2017 440
Cloud Companies Push to Decode Cloud Encryption Dark Reading 09/27/2017 440
Security 7 SIEM Situations that Can Sack Security Teams Dark Reading 09/27/2017 440
Bit bucket Don't Let Lack of All Flash Array Experience Hold You Back The Register 09/27/2017 440
Bit bucket Exploring the Air Gap Myth SC Magazine 09/26/2017 441
Technology Innovative Control System Paves the Way for Large Scale Universal Quantum Computing Science Daily 09/26/2017 441
Data It's a New, Challenging World for Data Governance InformationWeek 09/26/2017 441
Management FBI's Freese Shares Risk Management Tips Dark Reading 09/26/2017 441
Management Why Your Business Must Care about Privacy Dark Reading 09/26/2017 441
Administration Serverless Architecture: 4 Things to Know NetworkComputing 09/26/2017 441
Compliance Comparing Top All-Flash Data Center Storage Arrays Data Center Knowledge 09/26/2017 441
Bit bucket 40 Questions to Ask Before You Accept a Job Offer The Ladders 09/25/2017 442
Data 26 of the Most Infamous Data Breaches TechWorld 09/25/2017 442
Security New Non-Contact, Remote Biometric Tool Could Be Next Advance in Computer Security Science Daily 09/25/2017 442
Technology Physicists Demonstrate Using a Laser to Control a Current In Graphene within Just One Femtosecond Science Daily 09/25/2017 442
Bit bucket New Type of Supercomputer Could Be Based on 'Magic Dust' Combination Of Light and Matter Science Daily 09/25/2017 442