IT Weekly


Dec 11, 2018

Every week we bring you more than 40+ relevant online sources that contain articles of interest to IT and DC Professionals at all levels

Browse by Technology
Browse by Year



Category Articles From 2018 Source Posted Date Age
Operations 36% of Workers Would Rather Go to the DMV than Troubleshoot an IT Issue (DMV or Troubleshoot) TechRepublic 12/11/2018 New
Technology What can we expect from technology in 2019? (2019 Expectations) Networks Asia 12/11/2018 New
Cloud Key Considerations When Migrating Workloads to the Public Cloud (Migrating To The Public Cloud, White Paper) Insight 12/11/2018 New
Data How to Get Beyond AI Myths (Beyond AI Myths, Artificial Intelligence) Washington Technology 12/11/2018 New
Data How to Get Beyond AI Myths (Beyond AI Myths, Artificial Intelligence) GCN 12/11/2018 New
Management World's Hot Alternative Energy Projects Network World 12/11/2018 New
Bit bucket Machine Learning: The Deplorable State of Deployment ComputerWorld 12/11/2018 New
Security US Senate Computers will Use Disk Encryption (Disk Encryption for US Senate) ZDnet 12/03/2018 8
Technology A New Light on Significantly Faster Computer Memory Devices (Faster Computer Memory Devices) Science Daily 12/03/2018 8
Management End Users Are Winning the Shadow IT War (End Users Winning Shadow War) InformationWeek 12/03/2018 8
Connectivity HTTPS Is Almost Everywhere. So Why Isn’t the Internet Secure Now? (Why HTTPS Does Not Mean Secure) How To Geek 12/03/2018 8
Management Your People Problem With Emerging Technology and Innovation (People Problems and Technology) Digital Insurance 12/03/2018 8
Data The Complete Guide To: Data Science (Data Science Guide, White Paper) TechWorld 12/03/2018 8
Technology IoT and the Security Challenges That Tech Companies Face (IoT Security Challenges) TechRepublic 11/30/2018 11
Security How To Protect Your Business from Botnets: 6 Strategies (Botnet Protection Strategies) TechRepublic 11/30/2018 11
Management How Cyber-Attacks Will Change the Face of Company Boards (Cyber Attacks Changing Boards Of Directors) Networks Asia 11/30/2018 11
Security The Season of Fraud is Coming. Are You Prepared? (Checklist on How to Deal With Holiday Fraud) Business 2 Community 11/30/2018 11
Operations What Serverless Is and What it Means for You = Part 2: Challenges and Considerations for Choosing the Right Serverless Solution (Choosing the Right Serverless Solution) Business 2 Community 11/30/2018 11
Data Data Science for Marketers (Part 2): Descriptive v Diagnostic Analytics (Descriptive v Diagnostic Marketing Analytics) Business 2 Community 11/30/2018 11
Connectivity 10 Tips for Diagnosing Slow Applications (Fixing Slow Applications) No Jitter 11/29/2018 12
Connectivity Higher Speed Ethernet Requirements Continue to Grow (Higher Speed Ethernet Growing) NetworkComputing 11/29/2018 12
Connectivity Preparing for 5G's Biggest Security Challenges (5G's Security Challenges) NetworkComputing 11/29/2018 12
Security Encrypted Traffic Reaches a New Threshold (Encrypted Traffic Breaking Point, Encryption) NetworkComputing 11/29/2018 12
Data Three Steps Toward Stronger Data Protection (Stronger Data Protection) Information Management 11/29/2018 12
Security Last Quarter Saw 137M Phishing Attacks, Up Nearly 30 Percent (Phishing Up 30% To 137MM/Qtr) Information Management 11/29/2018 12
Security Is Security the Real Stuff of Nightmares? (CISOs Manage Constant Risk) HelpNet Security 11/29/2018 12
Operations Blind Spots and How to See Them: Observability in a Serverless Environment (Observability in a Serverless Environment, FaaS, DevOps, VPC) HelpNet Security 11/29/2018 12
Data Incorrect Assessments of Data Value Putting Organizations at Risk (Incorrect Data Value Assessments) Dark Reading 11/29/2018 12
Security The "Typical" Security Engineer: Hiring Myths & Stereotypes (Security Engineer: Hiring Myths) Dark Reading 11/29/2018 12
Management 7 Trends Driving Enterprise IT Transformation in 2019 (2019 Trends) ciol 11/29/2018 12
Operations What Serverless is and What it Means for You - Part 1 (What Is Serverless Computing) Business 2 Community 11/29/2018 12
Technology 5 Ways to Help Robots Work Together with People (Robots Working With People) GCN 11/29/2018 12
Compliance Domain Name 'Admin' Role Eyed Up as Latest Victim in Whois System's GDPRrmeggdon (GDPRrmeggdon) The Register 11/28/2018 13
Data How Better Standards can Decrease Data Security Spending Needs (Better Standards Reduce Costs, FedRAMP) Information Management 11/28/2018 13
Connectivity Why You Shouldn't Trust Free VPNs (Don't Trust Free VPNs) How To Geek 11/28/2018 13
Compliance Why Compliance is Never Enough (Never Enough) HelpNet Security 11/28/2018 13
Security Take Cybersecurity Into Your Own Hands: Don't Rely on Tech Giants (Don't Put Your Security Into Someone Else's Hands) HelpNet Security 11/28/2018 13
Security Cybersecurity 2019: Predictions You Can't Ignore (Predictions You Can't Ignore) HelpNet Security 11/28/2018 13
Operations Lessons From This Year's Data Center Outages: Focus On the Fundamentals (Outage Fundamentals) Data Center Knowledge 11/28/2018 13
Security Who's the Weakest Link in Your Supply Chain? (Weakest Link: Third Parties) Dark Reading 11/28/2018 13
Security 8 Tips for Preventing Credential Theft Attacks on Critical Infrastructure (Preventing Credential Theft Attacks) Dark Reading 11/28/2018 13
Data Data Science for Marketers (Part 1): Getting Your Data Ready (Getting Your Data Marketing Ready) Business 2 Community 11/28/2018 13
Cloud Options for Dedicated Cloud Interconnects and Their Benefits (Options for Dedicated Interconnects) Search Networking 11/28/2018 13
Technology Using Blockchain to Support Trustworthy Transactions on the IoT (Blockchain and IoT Trustworthiness) InformationWeek 11/28/2018 13
Security Blockchain Applications for Identity Verification (Blockchain for Identity Verification, White Paper) Evident 11/28/2018 13
Technology Racing Electrons Under Control (Computing At Petahertz Frequencies) Science Daily 11/27/2018 14
Technology Quantum Computing at Scale: Scientists Achieve Compact, Sensitive Qubit Readout (Sensitive Qubit Readout) Science Daily 11/27/2018 14
Data Mass Data Fragmentation Requires a Storage Rethink (Data Fragmentation) Network World 11/27/2018 14
Security The World of Wirearchy: The Future of Security Operation Centres (Wirearchy: The Future of SOCs) Networks Asia 11/27/2018 14
Security Transforming into a CISO Security Leader (Becoming a CISO, Leadership) Dark Reading 11/27/2018 14
Compliance Learning from a $150 Billion Compliance Failure ($150 Billion Compliance Failure) Security Today 11/27/2018 14
Cloud 7 Factors to Consider When Designing a Cloud Migration Plan (Migration Factors) TechRepublic 11/27/2018 14
Technology Building The Tricorder: The Race To Create A Real-Life Star Trek Medical Scanner (Building A Real-Life Tricorder ZDnet 11/26/2018 15
Connectivity Mobile Networks are Killing Wi-Fi for Speed Around the World (Mobile Killing Wi-Fi) The Register 11/26/2018 15
Connectivity A 5G Day May Come When the Courage of Cable and DSL Fails ... But it Is Not This Day (Cable & DSL Face 5G, 5G FWA) The Register 11/26/2018 15
Security Why Military Veterans Might Be Key to Closing the Cybersecurity Jobs Gap (Hire Military Cyber Professionals) TechRepublic 11/26/2018 15
Operations 8 Strategies To Keep Legacy Systems Running (Keep Legacy Systems Running) TechRepublic 11/26/2018 15
Data 6 Ways To Include Dark Data In Analytic Strategies (Using Dark Data) TechRepublic 11/26/2018 15
Technology How to Tell Which IoT Predictions to Pay Attention to (Real Or Fake IoT Predictions, IIoT) Network World 11/26/2018 15
Data Meeting the Intelligent Data Management Needs of 2019 (Data Management In 2019) Networks Asia 11/26/2018 15
Cloud Why Banking Industry Cloud Strategies Lag Behind (Banking Industry Lags Behind) InformationWeek 11/26/2018 15
Security Fundamental Concepts of Cyber Resilience: Introduction and Overview (Fundamentals of Cyber Resistance, White Paper) R&D Center 11/26/2018 15
Security Edge Computing Security Dos and Don'ts (Edge Dos and Don'ts) NetworkComputing 11/24/2018 17
Technology 6 Mobile Security Threats You Should Take Seriously in 2019 (2019 Mobile Threats) Networks Asia 11/23/2018 18
Management Decision Making During Crises And How To Avoid Groupthink (Avoid Groupthink During A Crisis) Continuity Central 11/23/2018 18
Data Gone Phishing: Everything You Need to Know About the Ever Present Threat to Your Data (Ever Present Threat) Business 2 Community 11/23/2018 18
Cloud Closing the Cloud Security Business Gap (Mitigate Data Threats, White Paper) SalesForce 11/23/2018 18
Technology Real Talk: You're Gonna Have to Get Real About Real-Time Analytics If You Wanna Make IoT Work (Making IoT Work) The Register 11/22/2018 19
Connectivity Net Neutrality Is Heading To the Courts (Again): So Will the Current Rules Stand or Be Overturned (Again)? (Net Neutrality Round Three) The Register 11/22/2018 19
Data What is Catastrophic Forgetting and How Does it Affect AI Development? (Catastrophic Forgetting, Artificial Intelligence) TechWorld 11/22/2018 19
Data 5 Trends To Expect For Artificial Intelligence In 2019 (AI Trends in 2019) Digital Insurance 11/22/2018 19
Security How to Stay Safe in a World Where Phishing is More Sophisticated Than Ever (Stay Safe from Phishing) Business 2 Community 11/22/2018 19
Security 3 Steps That Will Lower Your Cybersecurity Risk (Steps to Lower Risk) Business 2 Community 11/22/2018 19
Operations Data Center Power Distribution and Capacity Planning (Understanding Power, White paper) Raritan 11/22/2018 19
Data How Big Data Is Helping To Power Mercedes To F1 Glory (Mercedes + Big Data = F1 Victory) ZDnet 11/21/2018 20
Bit bucket Photos: 25 Bad Tech Gifts to Avoid Giving this Holiday Season (Really Bad Tech Gifts) TechRepublic 11/21/2018 20
Connectivity How 5G Technology will Change Data Centers (5G Impact) TechRepublic 11/21/2018 20
Security 85% of Enterprises Allow Employees to Access Data From Personal Devices, Security Risks Abound (Bad Idea -Employees Accessing Data From Personal Devices) TechRepublic 11/21/2018 20
Data Inside the Chief Data Privacy Officer Role with Barbara Lawler (Data Privacy Officer Role) Information Management 11/21/2018 20
Cloud Why a Multi-Cloud Strategy Is Critical for Enterprise Data Protection (Multi-Cloud Strategy Is Essential) Data Center Knowledge 11/21/2018 20
Management Consumers are Forgiving After a Data Breach, but Companies Need to Respond Well (Consumers Forgive After a Breach; Provided....) Dark Reading 11/21/2018 20
Security What We Can Learn from the Recent Singapore Data Breach (Singapore Data Breach Lessons) Networks Asia 11/20/2018 21
Connectivity Why SDN and IBN Demand Better Network Visibility (Better Visibility for SDN & IBN) NetworkComputing 11/20/2018 21
Storage How Do SSDs Work? (Inside SSDs) ExtremeTech 11/20/2018 21
Security Securities Markets at High Risk of Cyberattack (Highest Risk of Attack) Dark Reading 11/20/2018 21
Security 9 Traits of a Strong InfoSec Resume (Elements of a Strong InfoSec Resume) Dark Reading 11/20/2018 21
Security Can a New Standard Prevent An Encryption Meltdown. (Could Quantum Prevent An Encryption Meltdown) GCN 11/20/2018 21
Management Be Accessible, Not Open-Door (Accessible Not Open-Door) Project Management Advisor 11/20/2018 21
Security A Little Phishing Knowledge May Be a Dangerous Thing (Phishing Is Really Dangerous And Effective) The Register 11/19/2018 22
Technology Securing the IoT Has Become Business-Critical (Business Critical: IoT Security) Network World 11/19/2018 22
Cloud Gotcha Pricing from the Cloud Pushes Workloads Back on Premises (It's Not Cheaper) Network World 11/19/2018 22
Data Tips for Protecting Your Data When Losing an Employee (Protect Your Data When Losing An Employee) Information Management 11/19/2018 22
Technology What Is Augmented Reality, Anyway? (Long Way To Go for Augmented Reality) GCN 11/19/2018 22
Security How to Prepare for Your Next Security Breach (Prepare Now For The Next Breach) PC Magazine 11/18/2018 23
Data Building An Artificial General Intelligence Begins by Asking 'What is Intelligence?' (What is Artificial Intelligence) Information Management 11/18/2018 23
Security Would You Know if You've Been Breached? (Have You Been Breached, White Paper) thycotic 11/18/2018 23
Data Discriminate for Fairness (Fairness) DeadSalmonData 11/18/2018 23
Technology The Impact of Popular IoT Devices on Our Lives (IoT's Impact) Read IT Quick 11/17/2018 24
Technology 7 Questions Boards Need to Ask About Artificial Intelligence (Questions the Board Must Ask About AI) Information Management 11/17/2018 24
Security 95% of Organizations Have Cultural Issues Around Cybersecurity (Embedding Cybersecurity into the Organization) Dark Reading 11/17/2018 24
Cloud 10 Challenges in Taking off on a Bold Multi-Cloud Strategy (Multi-Cloud Strategy Challenges) ciol 11/17/2018 24
Security Artificial Intelligence, Cybersecurity, and Common Sense (Common Sense) Business 2 Community 11/17/2018 24
Operations Bridging the Divide between Software Developers and Operators using Logs (White Pape) Queen’s University, Canada 11/17/2018 24
Bit bucket 31 Books Every Techie Should Read (Must Reads for Techies) TechRepublic 11/16/2018 25
Cloud The Top 5 Myths about Cloud-Based Security (Cloud Security Myths) TechRepublic 11/16/2018 25
Connectivity SD-WAN Puts Traditional Routers on Notice (SD-WAN Is Arriving, Routers, MPLS) Network World 11/16/2018 25
Cloud Cloud Security: The Essential Checklist (Essential Security Checklist, IAM, LDAP) InfoWorld 11/16/2018 25
Storage Performance Benefits of NVMe over Fibre Channel (NVMe vs Fibre, White Paper) Demartek 11/16/2018 25
Technology How to Choose a Safer Analytics SDK for Your Mobile App (Safer Analytics SDK) Business 2 Community 11/16/2018 25
Connectivity OM5 and OM4+ Fiber (OM5 vs OM4+ fiber , White Paper) Commscope 11/16/2018 25
Security AI and Cybersecurity for Dummies (Artificial Intelligence & Cybersecurity For Dummies, White Paper) IBM 11/16/2018 25
Operations Six Critical Systems, Four Months To Brexit - And No Completed Testing (Brexit: Four Months Not Looking Good) The Register 11/15/2018 26
Technology How to Improve Enterprise IoT Security: 5 Tips (5 Tips for IoT Security) TechRepublic 11/15/2018 26
Connectivity 5G Mobile Networks: A Cheat Sheet (5G Cheat Sheet, eMBB, URLCC, mMTC) TechRepublic 11/15/2018 26
Connectivity Performance Testing: WinPcap versus Npcap (WinPcap vs Npcap, Wireshark) NetworkComputing 11/15/2018 26
Connectivity 5 Tips to Harden Network Security in a Connected Enterprise (Harden Security, IoT, Zero Trust) NetworkComputing 11/15/2018 26
Data Employees Aren't Taking The Proper Steps To Keep Information Safe While Traveling (Safe While Traveling) HelpNet Security 11/15/2018 26
Security What's Keeping Europe's Top Infosec Pros Awake at Night? (Keeping Europe Awake At Night, GDPR) HelpNet Security 11/15/2018 26
Compliance Practical Guidance for Complying with Canada's New Privacy Breach Rules (Complying with Canada's PIPEDA) Data Center Dynamics 11/15/2018 26
Security To Click or Not to Click: The Answer Is Easy (Spearphishing Works) Dark Reading 11/15/2018 26
Devops Security Teams Struggle with Container Security Strategy (Strategy for Container Security) Dark Reading 11/15/2018 26
Security Understanding Evil Twin AP Attacks and How to Prevent Them (Evil Twin AP Attacks, MitM, 802.11b, SSID) Dark Reading 11/15/2018 26
Security Why Cryptojacking Malware Is a Bigger Threat to Your PC Than You Realize (Huge Threat: Cryptojacking Malware) ZDnet 11/14/2018 27
Management CEOs are the Least Tech-Savvy Executives, Harming Enterprise Digital Transformation (Least Tech-Savvy Executives) TechRepublic 11/14/2018 27
Bit bucket 10 Signs You May Not Be Cut Out for IT (Decide if IT Is Your Career) TechRepublic 11/14/2018 27
Security Don't Underestimate the Power of Privilege (Danger From Privileged Accounts) SC Magazine 11/14/2018 27
Security RIP, 'IT Security' (Making Sense) Dark Reading 11/14/2018 27
Data Who is Your Data Expert? (Expert For Data) Business 2 Community 11/14/2018 27
Devops DevOps Done Right (Barriers To Success, White Paper) New Relic 11/14/2018 27
Cloud An Introduction To the New IT Approach Called Hybrid IT (Hybrid Introduction, White Paper) WEI 11/14/2018 27
Storage When You Play the Game Of Storage Arrays, You Win or You - Where are the Visionaries? (Gartner's Magical Square) The Register 11/13/2018 28
Technology Why 5G, AI, Cloud, and Blockchain Will Dominate The Digital Future Of The Enterprise (Dominating The Future, Artificial Intelligence) TechRepublic 11/13/2018 28
Security How CIOs Can Manage Blockchain Security: 4 Tips (Tips For Managing Blockchain) TechRepublic 11/13/2018 28
Cloud 5 Ways Cloud Computing Will Change In the Next Year (2019 Changes) TechRepublic 11/13/2018 28
Operations Making the Right Hyperconvergence Choice: HCI Hardware or Software? (HW Or SW For HCI, Hyperconverged Infrastructure) Network World 11/13/2018 28
Connectivity What is Transport Layer Security (TLS)? (TLS 1.3 Improvements, SSL) Network World 11/13/2018 28
Data Fix Your Data Before You Move It To The Cloud (Migrating To The Cloud with Bad Data) InfoWorld 11/13/2018 28
Data Data Silos: Now and Forever? (Data Silos Forever) InformationWeek 11/13/2018 28
Operations What Special Ops Taught Me about TechOps (TechOps Lessons From Special Ops) InformationWeek 11/13/2018 28
Data Are You Sure You Want to Build that Data Warehouse? (Building A Data Warehouse - Bad Idea) Business 2 Community 11/13/2018 28
Cloud What Are Likely to Be the Key Barriers to Embracing Serverless Computing? (Serverless Barriers) ZDnet 11/12/2018 29
Cloud Hybrid Cloud's Growing Pains - And How To Beat Them: a Guide To Raising a Good Platform, So You Can Raise a Glass Later (Hybrid's Growing Pains) The Register 11/12/2018 29
Technology 10 Predictions for How the Tech Industry Will Change In 2019 and Beyond (2019 And Beyond Predictions) TechRepublic 11/12/2018 29
Data Big Data Used to Predict the Future (Predicting The Future) Science Daily 11/12/2018 29
Storage Making Steps Toward Improved Data Storage (Improved Data Storage) Science Daily 11/12/2018 29
Management Trends that CTOs should pay attention to in 2019 (Trends for CTOs in 2019) Networks Asia 11/12/2018 29
Technology 12 Certifications for Enterprise Architects (Enterprise Architect Certifications) Networks Asia 11/12/2018 29
Cloud Don't Make Your Cloud Migration a House of Cards (Cruddy In, Cruddy Out) InfoWorld 11/12/2018 29
Connectivity How to Improve Wireless Network Capacity And Performance in 3 Steps (Improve Wireless Capacity) Search Networking 11/12/2018 29
Operations Vulnerabilities in Our Infrastructure: 5 Ways to Mitigate the Risk (Mitigate the Risk) Dark Reading 11/11/2018 30
Data Disaster Recovery on AWS, Azure and Google Cloud: Head to Head (Head to Head Cloud DR Comparison, Cloud DR) Business 2 Community 11/11/2018 30
Management Google, Microsoft, Amazon: When Employees are Mad, Make Sure They Feel Heard (Make Sure They Feel Heard) ToolBox 11/11/2018 30
Bit bucket The Best Holiday Gifts for Co-Workers (Co-Worker Holiday Gifts) TechRepublic 11/10/2018 31
Operations Not Just for Google: ML-Assisted Data Center Cooling You Can Do Today (Over Cooling, Machine Learning, Artificial Intelligence) Data Center Knowledge 11/10/2018 31
Data Forrester's 2019 AI Predictions Include Pragmatic AI (Artificial Intelligence Predictions) TechRepublic 11/09/2018 32
Security 10 Top Cybersecurity Predictions for 2019 (Top 10 Predictions) Information Management 11/09/2018 32
Security What is a 'Dark Web Scan' and Should You Use One? (Dark Web Scan) How To Geek 11/09/2018 32
Technology What Is A Solid-State Battery and Will They Solve Our Battery Life Problems? (Solid State Battery) How To Geek 11/09/2018 32
Security 5 Things the Most Secure Software Companies Do (and How You Can Be Like Them) (Secure Companies Approaches Dark Reading 11/09/2018 32
Data Five Steps For Successfully Implementing An ISO 27001 Risk Assessment Framework (Implementing ISO 27001) Continuity Central 11/09/2018 32
Management Leading Through a Crisis: How to Pass the Acid Test Of Management (Passing the Acid Test) Continuity Central 11/09/2018 32
Security Zero Trust Security For Dummies (Security Zero Trust, White Paper) Centrify 11/09/2018 32
Administration We Don't Want to Spoil All of This Article, But Have You Patched, Taken Away Admin Rights, Made Backups Yet? (Ahead Of the Game, Threats, Patching) The Register 11/08/2018 33
Technology Dollar for Dollar, Crafting Cryptocurrency Sucks Up 'More Energy' Than Mining Gold, Copper, etc. (Bitcoin Is Expensive to Mine) The Register 11/08/2018 33
Technology Batteryless Smart Devices Closer To Reality (Batteryless IoT Devices Science Daily 11/08/2018 33
Bit bucket Scientists Theorize New Origin Story for Earth's Water (Origins of Water) Science Daily 11/08/2018 33
Management Trends That CIOs Should Pay Attention to In 2019 (Trends For CIOs) Networks Asia 11/08/2018 33
Security Five Key Considerations When Developing A Security Operations Center (SOC Considerations) HelpNet Security 11/08/2018 33
Storage NVMe: Four Key Trends Set to Drive Its Adoption in 2019 and Beyond (NVMe Trends) DCIG 11/08/2018 33
Security Why the CISSP Remains Relevant to Cybersecurity After 28 Years (Is CISSP Still Relevant) Dark Reading 11/08/2018 33
Security Why Password Management and Security Strategies Fall Short (Rethink Passwords & Strategies) Dark Reading 11/08/2018 33
Data Why Disaster Recovery Should Become A Thing of the Past…(DR is Passé) Continuity Central 11/08/2018 33
Cloud 4 Mistakes Cloud Users Make when Purchasing Amazon Reserved Instances (Amazon Reserved Instances Mistakes) Business 2 Community 11/08/2018 33
Operations A 6-Step Approach For ITSM And ITOM To Work Better Together (Getting ITSM & ITOM Working Together, White Paper) servicenow 11/08/2018 33
Compliance Updates to PIPEDA, Canada's Own 'GDPR' (PIPEDA Canada's GDPR) Risk Management Monitor 11/08/2018 33
Bit bucket Why Your First Programming Language doesn't Really Matter (First Language Doesn't Matter) TechRepublic 11/07/2018 34
Security Humans vs Machines: AI and Machine Learning in Cyber Security (Artificial Intelligence Machine Learning) Networks Asia 11/07/2018 34
Data 5 Best Practices For Third-Party Data Risk Management (Third-Party Risk Management) Information Management 11/07/2018 34
Devops DevOps and Security: How to Make Disjointed Security and DevOps Teams Work Effectively (DevOps Working With Security) HelpNet Security 11/07/2018 34
Data 3 Leading AI Concerns for Insurers (Artificial Intelligence Machine Learning) Digital Insurance 11/07/2018 34
Security Keeping Your Business Safe: 5 Simple Ways to Provide Cybersecurity Solutions (Keeping Safe) Business 2 Community 11/07/2018 34
Data A Chilling Tale: Data and Vendors Gone Wrong (Vendors Gone Wrong) Business 2 Community 11/07/2018 34
Management Hire Great Talent, Train Them, Then Get Out of Their Way (Get Out Of Their Way, Hiring) TLNT 11/06/2018 35
Security How Automation Can Fill the Enterprise Cybersecurity Skills Gap (Automation Compliment Skills) TechRepublic 11/06/2018 35
Technology Coping With Errors In The Quantum Age (Correcting Quantum Errors) Science Daily 11/06/2018 35
Storage Physicists Create New, Simpler-than-Ever Quantum 'Hard Drive for Light' (Quantum Hard Drive) Science Daily 11/06/2018 35
Cloud The 'Born In the Cloud' Advantage Is Real, But Not Absolute (Cloud From the Start) InfoWorld 11/06/2018 35
Cloud How to Get Your Company to Handle the Cloud Truth (Cloud Culture Change) InfoWorld 11/06/2018 35
Compliance Post Implementation, GDPR Costs Higher than Expected (GDPR Higher Costs) HelpNet Security 11/06/2018 35
Management After the Breach: Tracing the 'Smoking Gun' (Find the Smoking Gun Dark Reading 11/06/2018 35
Management Five Winning Strategies for Attracting Top Talent (Attracting Talent, Hiring) Washington Technology 11/06/2018 35
Cloud Vendors Tell OMB to Keep It Simple in Cloud (Keeping The Cloud Simple) FCW 11/06/2018 35
Storage NVMe in the Data Centre (NVMe, White Paper) architectingIT 11/06/2018 35
Devops Time to Marry DevOps, Agile and Lean IT, Advocates Urge (Time To Get Hitched) ZDnet 11/05/2018 36
Operations Data Center Automation: 2 Acronyms You Should Know (Data Center Acronyms) ZDnet 11/05/2018 36
Operations Data Center Automation: 10 Vendors You should Know (10 Automation Vendors) ZDnet 11/05/2018 36
Cloud Cloud Computing will Virtually Replace Traditional Data Centers Within Three Years (95% in Three Years) ZDnet 11/05/2018 36
Management The True Value of a Project Management Professional TechRepublic 11/05/2018 36
Data 5 Reasons Why Your Company Doesn't Take Analytics Seriously, and 5 Ways to Change That (Taking Analytics Seriously) TechRepublic 11/05/2018 36
Connectivity SD-WAN: The Inside Scoop from Real-World Deployments (Real World SD-WAN) Network World 11/05/2018 36
Connectivity What Is WPA3? And Some Gotchas to Watch Out for In This Wi-Fi Security Upgrade (WPA3 Gotchas, WPA2) Network World 11/05/2018 36
Compliance Not Ready for New Reporting Obligations Yet? Here's Five Things to Think About (Canada's Breach Law, Compliance) IT World Canada 11/05/2018 36
Devops Companies Implementing DevSecOps Address Vulnerabilities Faster Than Others (Faster Vulnerability Solutions, DevOps) HelpNet Security 11/05/2018 36
Management Top 10 Predictions and Key Drivers for the IT Industry for the Next Five Years (5 Year Predictions & Drivers) HelpNet Security 11/05/2018 36
Technology Most CIOs say IoT will become a Major Burden (IoT To Become Burden) HelpNet Security 11/05/2018 36
Security Worst Malware and Threat Actors of 2018 (Worst Threats of 2018) Dark Reading 11/05/2018 36
Data Embedded Analytics: Easier to Create, More Accurate Than Ever (Embedded Analytics) SD Times 11/05/2018 36
Operations Six Pillars Of Monitoring Automation (Automation Monitoring) SD Times 11/05/2018 36
Security 11 Critical Visualizations for SD-WAN Success (Success With SD-WAN) NetworkComputing 11/04/2018 37
Cloud Is a Cloud-Native Strategy Right for You? (Correct Strategy) NetworkComputing 11/04/2018 37
Management 5 Lessons from New Technology Leaders: Alex Benay, CIO of the Government of Canada (Leadership Lessons) IT World Canada 11/04/2018 37
Security Tackling Cybersecurity from the Inside Out (Looking From The Inside) Dark Reading 11/04/2018 37
Security Gaining Ground On The Cyber Attacker (White Paper, State of Resilience) Accenture 11/04/2018 37
Security Fighting Email Scammers By Taking A Different View. Literally (Fighting Scammers) Homeland Security News 11/04/2018 37
Security Pinpointing Risky Employee Behaviors Enables IT Leaders to Reduce Risk (Employee Risky Behaviors) SC Magazine 11/02/2018 39
Connectivity What to expect from Wi-Fi 6 in 2019 (Wi-Fi 6 Expectations, 802.11ax) Network World 11/02/2018 39
Connectivity What is WPA3? Wi-Fi Security Protocol Strengthens Connections (Strength From WPA3) Network World 11/02/2018 39
Technology What's New in IoT: Trends for 2019 (IoT Trends) Networks Asia 11/02/2018 39
Security Where Is the Consumer Outrage about Data Breaches? (No Outrage From Consumers) Dark Reading 11/02/2018 39
Devops DevOps Done Right: How To Break Down The IT Department Silos without Alienating Developers (Doing It Right) ComputerWeekly 11/02/2018 39
Security The Current State of Cybersecurity Shows Now Is the Time for Zero Trust (Don't Trust Anyone) Business 2 Community 11/02/2018 39
Administration Grasp Container Basics To Plan Enterprise Adoption (Basics of Containers) Search IT Operations 11/02/2018 39
Technology Present and Future of Quantum Computing (Quantum Future) ToolBox 11/02/2018 39
Connectivity Optical Networking Breakthrough Will Run Networks 100x Faster (Spiral Fiber 100 Times Faster) Network World 11/01/2018 40
Technology Your Wearable is Always Watching You v3 co uk 10/31/2018 41
Connectivity It's Been a Week Since Engineers Approved a New DNS Encryption Standard and Everyone is Still Yelling (RFC 8484; DoH, Encryption Standard Under Fire) The Register 10/31/2018 41
Security Catching all Threats - Known, Unknown, and Unknown Unknown - Before They Can Harm You (The Unknowns) SC Magazine 10/31/2018 41
Technology Integrated Quantum Chip Operations Possible, Tests Show (Quantum Possibilities) Science Daily 10/31/2018 41
Connectivity Users Tell What You Need to Know About SD-WAN (SD-WAN from Users) Network World 10/31/2018 41
Operations Infrastructure Monitoring Software: Can You Afford It? (White Paper, Monitoring the Infrastructure) NetApp 10/31/2018 41
Security SMEs Ignore Cyber Security at Their Peril (Ransomware, Ignore At Your Peril) IT Web 10/31/2018 41
Data 15 Top Platforms for MDM And Data Governance (Top MDM Platforms) Information Management 10/31/2018 41
Devops The Case for MarDevSecOps (Security in DevOps) Dark Reading 10/31/2018 41
Compliance How Security, Compliance Standards Prevent OSI Layer Vulnerabilities Search Compliance 10/31/2018 41
Data 10 Ways to Use Machine Learning and AI in ITSM to Improve Processes (ITSM, 10 Ways for Artificial Intelligence) Search CIO 10/31/2018 41
Cloud Gartner Symposium 2018: Enterprise Cloud Strategy Mistakes to Avoid (Avoiding Mistakes) Search CIO 10/31/2018 41
Operations Hyperconverged Infrastructure as a Catalyst for Change (White Paper, Hyperconverged Catalyst for Change) Freeform Dynamics/VMware 10/31/2018 41
Technology US Rubber Stamps Right to Repair: What It Means for IT, SMBs, and Tinkerers TechRepublic 10/30/2018 42
Security How the FBI Weighs Cybersecurity Risks Against Other Criminal Threats (FBI Risk Weighting) TechRepublic 10/30/2018 42
Compliance 1 Billion Reasons Why Compliance Matters (GDPR, Non-Compliance Expensive) SC Magazine 10/30/2018 42
Technology IoT Security by Design (Security in IoT) No Jitter 10/30/2018 42
Technology What's the IoT Doing to Your Data Center? (Data Center IoT) Network World 10/30/2018 42
Security The Need for a Secure Content Sharing Ecosystem with IAM (Secure Sharing) Networks Asia 10/30/2018 42
Cloud Application Security - A Shared Responsibility in the Cloud? NetworkComputing 10/30/2018 42
Cloud How to Deal With Big Cloud Acquisitions Like IBM's Red Hat Purchase InfoWorld 10/30/2018 42
Devops A Wake-Up Call for Software Development Practices?(SW Wakeup Call) Informationweek 10/30/2018 42
Cloud Rethinking IT for Cloud Computing Informationweek 10/30/2018 42
Data 21% of All Files in the Cloud Contain Sensitive Data (Cloud Holds Sensitive Data) HelpNet Security 10/30/2018 42
Technology IoT Now Top Internet Attack Target (White Paper, IoT Attacks) F5 10/30/2018 42
Security Stay Ahead of Security Threats: Focusing on Your High-Risk Assets (One Step Ahead) Business 2 Community 10/30/2018 42
Bit bucket Best Gifts: 20 Luxury Gadgets for the Billionaire Who Has Everything (Billionaire Gadgets) ZDnet 10/29/2018 43
Connectivity Scientists to Create 'Truly Unhackable' Network Based on Quantum Physics (Unhackable Quantum) v3 co uk 10/29/2018 43
Connectivity Why 5G (And Even 6G) Could Put Your Business at Risk for a Cyberattack (Cyberattack from 5G/6G) TechRepublic 10/29/2018 43
Security Dark Web: A Cheat Sheet for Business Professionals (Cheat Sheet for the Dark Web) TechRepublic 10/29/2018 43
Technology 21 New Tech Jobs That Will Define the Next Decade of IT Work (Future Tech Jobs) TechRepublic 10/29/2018 43
Connectivity Meet the Professor Who Was There When the Internet Was Turned On (Day One of the Internet) PC Magazine 10/29/2018 43
Security How To Protect Your Organization from Insider Threats, The #1 Risk for Data Loss (Insiders Still #1) HelpNet Security 10/29/2018 43
Data Organizations Feel Ready to Put Highly Sensitive Data in the Cloud (Sensitive Data to the Cloud) HelpNet Security 10/29/2018 43
Security 8 Threats that Could Sink Your Company (Threats That Can Sink You) Dark Reading 10/29/2018 43
Connectivity How 5G Aims to End Network Delays That Slow Everything Down (5G Ends Delays) cnet 10/29/2018 43
Connectivity Be Prepared for SD-WAN Implementation Complexities Search SDN 10/29/2018 43
Security The Changing Face of Cyber Attacks (White Paper, Cyber's Changing Face) Neustar, Inc. 10/29/2018 43
Cloud Containers At-Risk: A Review of 21,000 Cloud Environments (White Paper, Risky Containers) Lacework, Inc. 10/29/2018 43
Security Internet Security Threat Report (White Paper, Report on Threats) Symantec 10/29/2018 43
Connectivity Highest Recommended SIP Trunk Providers, Friend to Friend (Providers for SIP) No Jitter 10/28/2018 44
Connectivity Preparing Your Workplace for 5G (Get Ready for 5G) NetworkComputing 10/28/2018 44
Connectivity Preparing for the Intent-Based Network (Networks Based on Intent) NetworkComputing 10/28/2018 44
Cloud Cloudy with a Chance of Threats (Threats) NetworkComputing 10/28/2018 44
Security Recent Security Breaches Come at Great Cost--Including Jobs--Including Jobs (Breach Guillotines) Data Center Knowledge 10/28/2018 44
Security 3 Keys to Reducing the Threat of Ransomware (Reducing Ransomware Threats) Dark Reading 10/28/2018 44
Security Cybersecurity Best Practices - In and Out of the Office (Office Best Practices) Business 2 Community 10/28/2018 44
Management 3 Factors Marginalizing the Historical Role of the CISO (Marginalizing the CISO) Business 2 Community 10/28/2018 44
Bit bucket The Best Tech Gifts for 2018 (Gifts for Your Techie) TechRepublic 10/27/2018 45
Data Should a Robo-Car Run Over A Kid or a Grandad? The Register 10/26/2018 46
Security 82% of Security Pros Fear Hackers Using AI to Attack Their Company (Artificial Intelligence, AI Being Used by Hackers) TechRepublic 10/26/2018 46
Data 3 Steps to Improve The Quality of Your Organization's Data (Data Improvement) TechRepublic 10/26/2018 46
Security Six Tips to Stop Phishing Attacks (Phishing Stop Tips) SC Magazine 10/26/2018 46
Compliance The Privacy Professional: A Modern Day Renaissance Man (GDPR, Renaissance Man & Privacy) SC Magazine 10/26/2018 46
Security Bridging the Cybersecurity Skills Gap Through Artificial Intelligence (Skills Gap) SC Magazine 10/26/2018 46
Technology Spinning the Light: The World's Smallest Optical Gyroscope (Smallest Gyroscope) Science Daily 10/26/2018 46
Data Artificial Intelligence Controls Quantum Computers (Quantum Computers and AI) Science Daily 10/26/2018 46
Technology What's the IoT Doing to Your Data Center? Network World 10/26/2018 46
Management Top Data and Analytics Risks that Will Concern Audit Executives in 2019 (Auditor Concerns About Data) HelpNet Security 10/26/2018 46
Cloud Securing Serverless: Defend or Attack? (Best Defense) Dark Reading 10/26/2018 46
Operations 10 Must-Have Skills for ITSM Pros (ITSM Skills) CIO 10/26/2018 46
Cloud Cloud Smart: Practical Considerations on Where To Focus (Smart Considerations) GCN 10/26/2018 46
Bit bucket Scientists Develop Cell-Sized Robots to Seek Out Disease While Floating In the Bloodstream v3 co uk 10/25/2018 47
Operations Edge Data Centers (White Paper) TIA 10/25/2018 47
Bit bucket 20 Most Important Tech Inventions of the Past 100 Years TechRepublic 10/25/2018 47
Technology Quantum Computing: A Cheat Sheet TechRepublic 10/25/2018 47
Connectivity One Simple Change in Fiber Optics Could Boost Your Internet Speed by 100x TechRepublic 10/25/2018 47
Cloud Hybrid Cloud: A Cheat Sheet TechRepublic 10/25/2018 47
Administration How to Detect Hardware-Based Server Bugs TechRepublic 10/25/2018 47
Connectivity 10 Things Your Next Firewall Must Do (White Paper) Palo Alto Networks 10/25/2018 47
Operations The Importance of Hyper-Availability for Critical Infrastructure Networks Asia 10/25/2018 47
Management Winning Board Presentations for CIOs InformationWeek 10/25/2018 47
Management Bridging the IT Talent Gap: Find Scarce Experts Informationweek 10/25/2018 47
Security Insiders are Still the Greatest Security Threat Facing Most Organizations Information Management 10/25/2018 47
Management AI, Cybersecurity Top CIO List of Most Disruptive Technologies (Artificial Intelligence) Digital Insurance 10/25/2018 47
Storage The State of Software-Defined Storage, Hyperconverged and Cloud Storage (White Paper) DataCore Software 10/25/2018 47
Storage Storage Availability, Vendor Lock-In Remain Pain Points for IT Pros Channel Partners 10/25/2018 47
Operations Software-Defined Data Center - Get The Most Out of Today's Infrastructure (White Paper) IBM 10/25/2018 47
Security The Five News Headlines You Don't Want to Be About YOUR Organization (White Paper) Juniper Networks 10/25/2018 47
Connectivity The Inmates Have Taken Over the Asylum: DNS Godfather Blasts DNS Over HTTPS Adoption (RFC 8484) The Register 10/24/2018 48
Bit bucket The 25 most Underappreciated Science Fiction/Fantasy Characters TechRepublic 10/24/2018 48
Security Why It's Pivotal to Relook Cybersecurity with a Security-First Approach Networks Asia 10/24/2018 48
Data Real-Time Social Media Location Data Used to Predict Crime IT News 10/24/2018 48
Security Giving CISOs The Tools to Measure and Improve Password Security Information Management 10/24/2018 48
Management Giving CISOs The Tools to Measure and Improve Password Security Information Management 10/24/2018 48
Security How Science can Fight Insider Threats HelpNet Security 10/24/2018 48
Security Good Times in Security Come When You Least Expect Them Dark Reading 10/24/2018 48
Connectivity With 5G, You Won't Just be Watching Video. It'll Be Watching You, Too cnet 10/24/2018 48
Administration Why It's Important to Assign User Rights Business 2 Community 10/24/2018 48
Data Do You Really Need Online Data Backups? (White Paper) Enterprise Technology Services 10/24/2018 48
Technology How Rants On Social Media Can Come Back to Haunt You Science Daily 10/23/2018 49
Operations Wave Energy to Power Undersea Data Centers Network World 10/23/2018 49
Security What's Luck Got To Do With Cybersecurity Networks Asia 10/23/2018 49
Compliance Privacy as a Business Practice (GDPR) Networks Asia 10/23/2018 49
Cloud The Forced March to Cloud Computing InfoWorld 10/23/2018 49
Technology The Coming Wave of Regulation over Facial Recognition Informationweek 10/23/2018 49
Security How to Make the CFO Your Best Cybersecurity Friend HelpNet Security 10/23/2018 49
Management 10 Tech Predictions for 2019 Digital Insurance 10/23/2018 49
Security Understanding SOCs' 4 Top Deficiencies Dark Reading 10/23/2018 49
Security Blockchain Developer Salaries Now Command As Much as $175K ComputerWorld 10/23/2018 49
Technology Congress Takes First Steps Toward Regulating Artificial Intelligence GCN 10/23/2018 49
Data Start The Long Journey To AI Gains Now, Or Risk Missing Out On The Benefits (Artificial Intelligence) IT World Canada 10/22/2018 50
Connectivity What is WiGig, and How is It Different from Wi-Fi 6? How To Geek 10/22/2018 50
Management Seven Key Digital Disruptions CIOs May not Seeing Coming HelpNet Security 10/22/2018 50
Data A Data Protection System Plus Management Creates Value, Risk Search Data Backup 10/22/2018 50
Storage How Do Secondary Storage and Primary Storage Differ? Search Data Backup 10/22/2018 50
Security When Cybersecurity Capabilities are Paid for, But Untapped GCN 10/22/2018 50
Security In Cybersecurity, the A.I. Debate is 'How', Not 'If' (Artificial Intelligence) SC Magazine 10/20/2018 52
Connectivity Roadmap for Quantum Internet Development Science Daily 10/20/2018 52
Security Computer Security: Preventing Attacks Made Possible by Meltdown/Spectre Science Daily 10/20/2018 52
Storage Tape vs. Disk Storage: Why isn't Tape Dead Yet? Network World 10/20/2018 52
Operations Uptime Institute Issues a Weather Warning for Data Centers Network World 10/20/2018 52
Connectivity What to Look for in a Network Monitoring Application NetworkComputing 10/20/2018 52
Connectivity The Network Automation Paradox: Why People are Key to Its Success NetworkComputing 10/20/2018 52
Devops Devops Is Mandatory for Multicloud Deployments InfoWorld 10/20/2018 52
Cloud Devops Is Mandatory for Multicloud Deployments InfoWorld 10/20/2018 52
Data How TiDB Combines OLTP and OLAP in a Distributed Database InfoWorld 10/20/2018 52
Management Amazon's HR Gaffe Demonstrates Important Points InformationWeek 10/20/2018 52
Security Weighing the Pros and Cons of Data Security Outsourcing Information Management 10/20/2018 52
Data Weighing the Pros and Cons of Data Security Outsourcing Information Management 10/20/2018 52
Data I'm Sorry, Dave: 9 Real Times AI Has Given Us the Creeps (Artificial Intelligence) ZDnet 10/19/2018 53
Compliance Ding Ding! Round Two: Second Annual Review for Transatlantic Data Flow Deal Privacy Shield The Register 10/19/2018 53
Operations 20 Innovative Data Centers That Give Us A Glimpse Into the Future of Computing TechRepublic 10/19/2018 53
Management CIOs Watch Out: Here are 7 Disruptions You Might Not See Coming TechRepublic 10/19/2018 53
Technology First Proof of Quantum Computer Advantage Science Daily 10/19/2018 53
Data The Big Problem of Small Data: A New Approach Science Daily 10/19/2018 53
Data Conquering the Five Deadly Data Sins Networks Asia 10/19/2018 53
Security Australia's Encryption-Busting Bill Also after PINs, Passwords IT News 10/19/2018 53
Connectivity How 5G Pits Big Carriers and Government Against Small Towns cnet 10/19/2018 53
Security How to Protect Your Company from Getting Hacked Business 2 Community 10/19/2018 53
Data What 5 Skills Should a Disaster Recovery Team Leader Have? Search Disaster Recovery 10/18/2018 54
Data Inline Deduplication vs. Post-Processing: Data Dedupe Best Practices Search Data Backup 10/18/2018 54
Data Data Backup Planning: 10 Best Practices for Protection Search Data Backup 10/18/2018 54
Bit bucket Supermassive Black Holes and Supercomputers Science Daily 10/17/2018 55
Cloud Why Switch to the Cloud? Networks Asia 10/17/2018 55
Management 10 Top Strategic Predictions for 2019 InformationWeek 10/17/2018 55
Cloud Avoiding Reputational Risk When Moving To the Cloud Data Center Dynamics 10/17/2018 55
Connectivity 5G is Almost a Reality. Here's What It'll Really Feel Like cnet 10/17/2018 55
Storage The Future of the Cloud Depends on Magnetic Tape Bloomberg 10/17/2018 55
Cloud The Future of the Cloud Depends on Magnetic Tape Bloomberg 10/17/2018 55
Security Prepping Your SIEM Architecture for the Future Search Security 10/17/2018 55
Data Can Common Sense Be Built into AI? (Artificial Intelligence) GCN 10/17/2018 55
Management Don't Wait For a Lawsuit to Close Your Pay Gaps TLNT 10/16/2018 56
Security How to Train Your Employees to Avoid Online Scams: 5 Tips TechRepublic 10/16/2018 56
Technology Here Are the 10 Top Tech Trends You Need to Understand Right Now TechRepublic 10/16/2018 56
Cloud What Is a Private Cloud? (and Some Things That It's Not) Network World 10/16/2018 56
Data Does China Have the Answer To Closing the AI Skills Gap? (Artificial Intelligence) Networks Asia 10/16/2018 56
Cloud Steel Yourself for the Cloud Hangover InfoWorld 10/16/2018 56
Cloud Solving the Cloud Infrastructure Misconfiguration Problem HelpNet Security 10/16/2018 56
Technology Spies Among Us: Tracking, IoT & the Truly Inside Threat Dark Reading 10/16/2018 56
Security Spies Among Us: Tracking, IoT & the Truly Inside Threat Dark Reading 10/16/2018 56
Security 6 Reasons Why Employees Violate Security Policies Dark Reading 10/16/2018 56
Security Tackling Privileged-Access Security GCN 10/16/2018 56
Technology IoT Security: Follow These Rules to Protect Your Users from Hackers, Gadget Makers Told ZDnet 10/15/2018 57
Bit bucket The 51 Coolest Laptop Stickers of All Time TechRepublic 10/15/2018 57
Connectivity Security Vulnerabilities in Terahertz Data Links Science Daily 10/15/2018 57
Technology Lift Off for World-First Ultrasound Levitation that Bends Around Barriers Science Daily 10/15/2018 57
Administration Almost Three Quarters of Canadian SMBs Don't Have Patching Policy: Survey IT World Canada 10/15/2018 57
Security Convinced A Cyber Attack is Looming, Many Firm Still Don't Prepare Information Management 10/15/2018 57
Security 4 Ways to Fight the Email Security Threat Dark Reading 10/15/2018 57
Security 6 Security Trends for 2018/2019 Dark Reading 10/15/2018 57
Administration 10 Coolest VMware Tools and Updates You Need to Know About CRN 10/15/2018 57
Cloud Cloud Migration Best Practices: 4 Potential Problems to Avoid Search CIO 10/15/2018 57
Cloud Top Disadvantages of Cloud Computing: What CIOs Can Do Search CIO 10/15/2018 57
Cloud SAP Chief Security Officer Talks Cloud, Security Trends Search CIO 10/15/2018 57
Security We're Killing off Passwords. but Are We Ready for What Will Replace Them? ZDnet 10/14/2018 58
Connectivity What is Port Scanning? How To Geek 10/14/2018 58
Security Cisco Says Crypto Bill Will Create Backdoors IT News 10/13/2018 59
Security Apple says Decryption Should 'Alarm Every Australian' IT News 10/13/2018 59
Management Are You Inviting Everyone to Dance? (Diversity and Inclusion) TLNT 10/12/2018 60
Bit bucket Take My Advice: The Only Safe ID Is a Fake ID The Register 10/12/2018 60
Bit bucket Have Some Scary Fun with These Halloween Techie Gifts and Gear TechRepublic 10/12/2018 60
Bit bucket The 3 Most Valuable IT Skills that Will Advance Your Career TechRepublic 10/12/2018 60
Technology Building a Better Battery Layer By Layer Science Daily 10/12/2018 60
Technology World's fastest camera freezes time at 10 trillion frames per second Science Daily 10/12/2018 60
Connectivity 4 Tips for Safeguarding Your SD-WAN NetworkComputing 10/12/2018 60
Data The Importance of Metadata in Enterprise Search and Aggregation Information Management 10/12/2018 60
Technology 10 Top Technology Trends to Watch in 2019 Information Management 10/12/2018 60
Technology HTG Explains: How Does a CPU Actually Work? How To Geek 10/12/2018 60
Operations Uptime Institute Rings Climate Change Warning Bell for Data Center Operators Data Center Knowledge 10/12/2018 60
Security Pair of Reports Paint Picture of Enterprise Security Struggling to Keep Up Dark Reading 10/12/2018 60
Security Threat Hunters & Security Analysts: A Dynamic Duo Dark Reading 10/12/2018 60
Security 12 Free, Ready-to-Use Security Tools Dark Reading 10/12/2018 60
Devops Transitioning from DevOps to Rugged DevOps: Avoiding the pitfalls SD Times 10/12/2018 60
Data Don't Ignore The Fundamentals (Artificial Intelligence) GCN 10/12/2018 60
Security Collaborating for Change in Cybersecurity (White Paper) ATLAS Council 10/12/2018 60
Management Smart Contract: What It Is and Why You Need One TechRepublic 10/11/2018 61
Security Phishing as an Endless Quest for Exploitable Data SC Magazine 10/11/2018 61
Administration Is There A White Box Server in Your Data Center's Future? Network World 10/11/2018 61
Management The 15 Most Valuable IT Certifications Today Networks Asia 10/11/2018 61
Devops 9 Best Practices for Managing Infrastructure in a Containerized Environment (Containers) NetworkComputing 10/11/2018 61
Operations 5 Reasons Why Hardware Choices are Critical for HCI NetworkComputing 10/11/2018 61
Data Rail Operator Aurizon's IoT Push Helps Save $380m in 3 Years IT News 10/11/2018 61
Management Experian CIO: IT Standardization Drives Agile Informationweek 10/11/2018 61
Cloud Cutting Cloud Waste, Painlessly Informationweek 10/11/2018 61
Operations Not Your Father's Immersion Cooling (Liquid Cooling) Data Center Knowledge 10/11/2018 61
Cloud Even if You're Not (Yet) Multi-Cloud, You Should Use Cloud Agnostic Tools Business 2 Community 10/11/2018 61
Management Giving Workers the Power to Automate GCN 10/11/2018 61
Operations Why Hyper-Converged Gear Needs to Go the Extra File: Merging Blocks and Filers To Break Out of the Niche The Register 10/10/2018 62
Connectivity 5 Best Practices to Boost Wi-Fi Performance Network World 10/10/2018 62
Operations Why You Should Use Docker and Containers InfoWorld 10/10/2018 62
Bit bucket What No One Has Told You About How to Land a Promotion Fast Company 10/10/2018 62
Security Security Researchers Struggle with Bot Management Programs Dark Reading 10/10/2018 62
Security Lessons Learned from the Facebook Security Breach Search CIO 10/10/2018 62
Management What Steps Can CIOs Take to Neutralize Cloud Shadow IT? Search CIO 10/10/2018 62
Cloud What Steps Can CIOs Take to Neutralize Cloud Shadow IT? Search CIO 10/10/2018 62
Cloud Big Bang Theory? Not for Cloud-Native Development SD Times 10/10/2018 62
Security Vendor Security Assessment: 40 Questions To Address (White Paper) BitSight Technologies 10/10/2018 62
Security Why Blockchain Belongs in Government GCN 10/10/2018 62
Bit bucket Why You Shouldn't Think Outside the Box The Ladders 10/09/2018 63
Connectivity Wi-Fi 6 Is Coming To a Router Near You Network World 10/09/2018 63
Operations Why Orchestration Does Not Equal Automation NetworkComputing 10/09/2018 63
Management Five Things I'm Thinking About After a Retreat With 30 CIOs IT World Canada 10/09/2018 63
Cloud Serverless Cloud Computing: Don't Go Overboard InfoWorld 10/09/2018 63
Devops Should You Migrate Your DevOps Architecture to the Cloud? Informationweek 10/09/2018 63
Cloud Should You Migrate Your DevOps Architecture to the Cloud? Informationweek 10/09/2018 63
Operations Four Critical KPIs for Securing Your IT Environment HelpNet Security 10/09/2018 63
Management This Is How You Can Disagree with Senior Management and Keep Your Job Fast Company 10/09/2018 63
Data 10 Interview Questions to Help Land the Best Data Pro Hires Digital Insurance 10/09/2018 63
Data Four Keys to Unlocking Cloud Data Management Data Center Knowledge 10/09/2018 63
Cloud Four Keys to Unlocking Cloud Data Management Data Center Knowledge 10/09/2018 63
Storage Software-Defined Storage Positions Agencies For Modernization GCN 10/09/2018 63
Security It's 2018, and Network Middleware Still Can't Handle TLS without Breaking Encryption ZDnet 10/08/2018 64
Bit bucket NASA's Voyager 2 Probe Detects Increase In Cosmic Rays as It Approaches the Heliosphere v3 co uk 10/08/2018 64
Management How Leaders Can Underpromise and Overdeliver The Ladders 10/08/2018 64
Management 5 Ways to Avoid Vendor Lock-In TechRepublic 10/08/2018 64
Cloud What is XaaS? A Way to Inject Agility into Your Digital Business Networks Asia 10/08/2018 64
Cloud What Is Cloud Computing? Everything You Need To Know Now Networks Asia 10/08/2018 64
Management How To Know When Your Intuition is Bad Fast Company 10/08/2018 64
Data Teach Your AI Well: A Potential New Bottleneck for Cybersecurity (Artificial intelligence) Dark Reading 10/08/2018 64
Compliance What You Don't Know About Data Privacy Laws Could Kill Your Startup Business 2 Community 10/08/2018 64
Data Does Your AI Need a Personality? (Artificial intelligence) Business 2 Community 10/08/2018 64
Data Archiving vs. Backup - What's the Difference? (White Paper) solarwinds 10/08/2018 64
Connectivity Current State Of SD-WAN Implementation and Deployment (White Paper) Talari Networks 10/08/2018 64
Bit bucket On The Seventh Anniversary Of Steve Jobs' Death, We Give You 7 Times He Served Humanity and Acted As An Example to Others The Register 10/05/2018 67
Operations My Biggest IT Mistake and What I Learned From It TechRepublic 10/05/2018 67
Administration How to Clean Inside Dirty Servers: Good Advice from Experts TechRepublic 10/05/2018 67
Data 4 Ways Organizations Can Play Ball with Analytics TechRepublic 10/05/2018 67
Security Why Cybersecurity Training Must Become a Priority NetworkComputing 10/05/2018 67
Security Cloud Misconfiguration: the Security Threat Too Often Overlooked InfoWorld 10/05/2018 67
Cloud Cloud Misconfiguration: the Security Threat Too Often Overlooked InfoWorld 10/05/2018 67
Management Why Organizations Should Regularly Assess The KPIs They Track (Part 2) Information Management 10/05/2018 67
Data Building Artificial Intelligence Aptitudes - Examining Myths and Realities Information Management 10/05/2018 67
Security Can We Trust Digital Forensic Evidence? HelpNet Security 10/05/2018 67
Security Most Enterprises Highly Vulnerable to Security Events Caused by Cloud Misconfiguration Dark Reading 10/05/2018 67
Cloud Most Enterprises Highly Vulnerable to Security Events Caused by Cloud Misconfiguration Dark Reading 10/05/2018 67
Management How Managers can Help Employees Avoid Burnout Fast Company 10/05/2018 67
Connectivity Don't forget SD-WAN During Your Next Network Infrastructure Upgrade Search SDN 10/05/2018 67
Bit bucket 15 Luxury Tech Products for Business Pros TechRepublic 10/04/2018 68
Devops Seven signs you might not be cut out to lead a DevOps team TechRepublic 10/04/2018 68
Management A Rough Guide to Your Next (or First) Fog Computing Deployment Network World 10/04/2018 68
Security SQL Injection Explained: How These Attacks Work and How to Prevent Them Networks Asia 10/04/2018 68
Connectivity 7 Common Network Latency Culprits NetworkComputing 10/04/2018 68
Technology CompTIA Names Top 10 Emerging Technologies Informationweek 10/04/2018 68
Data 5 Mistakes Even the Best Organizations Make with Product and Customer Data Information Management 10/04/2018 68
Connectivity Wi-Fi 6: What's Different, and Why it Matters (Wi-Fi 4, Wi-Fi 5) How To Geek 10/04/2018 68
Security Bridging the Priority Gap Between IT and Security in DevOps HelpNet Security 10/04/2018 68
Devops Bridging the Priority Gap Between IT and Security in DevOps HelpNet Security 10/04/2018 68
Bit bucket Never, Ever 'Wing It.' This is How To Prepare to Sound Spontaneous Fast Company 10/04/2018 68
Operations Boosting UPS Performance with Lithium-ion Technology Data Center Knowledge 10/04/2018 68
Security 7 Steps to Start Your Risk Assessment Dark Reading 10/04/2018 68
Technology Business Email Compromise Made Easy for Cyber Criminals ComputerWeekly 10/04/2018 68
Security Business Email Compromise Made Easy for Cyber Criminals ComputerWeekly 10/04/2018 68
Data What to Do When a BC/DR Plan Goes Awry Search Disaster Recovery 10/04/2018 68
Data Ten Business Continuity Risks to Monitor in 2018 Search Disaster Recovery 10/04/2018 68
Data How Does the ISO 22316 Standard Cover Resilience? Search Disaster Recovery 10/04/2018 68
Devops Defining Software Quality Metrics for Agile and DevOps SD Times 10/04/2018 68
Connectivity Wi-Fi is Rebranding Itself: Here's How to Understand the New Naming TechRepublic 10/03/2018 69
Security The 6 Most Popular Cyberattack Methods Hackers Use to Attack Your Business TechRepublic 10/03/2018 69
Bit bucket Follow These 6 Steps to Become a Better Negotiator at Work TechRepublic 10/03/2018 69
Technology Augmented Reality, Fog, and Vision: Duke Professor Outlines Importance of Smart Architectures Network World 10/03/2018 69
Cloud Augmented Reality, Fog, and Vision: Duke Professor Outlines Importance of Smart Architectures Network World 10/03/2018 69
Connectivity 6 Ways SD-WAN Simplifies Network Management NetworkComputing 10/03/2018 69
Devops DevOps Hiring: Look for the Right Mindset Informationweek 10/03/2018 69
Security Putting Security on Par with DevOps Dark Reading 10/03/2018 69
Devops Putting Security on Par with DevOps Dark Reading 10/03/2018 69