Category  |
Articles From 2018  |
Source  |
Posted Date  |
Age |
Security
|
It's The End Of 2018, and This Is Your Year in Security (End Of 2018)
|
The Register
|
12/31/2018 |
50 |
Compliance
|
GDPR: Four Letters That Put Fear Into Firms' Hearts in 2018 (High Profile GDPR, California Consumer Privacy Act)
|
The Register
|
12/31/2018 |
50 |
Storage
|
The Solid State of Storage in 2018 (Storage 2018)
|
The Register
|
12/31/2018 |
50 |
Connectivity
|
Assessing Performance Bottlenecks in Virtualized Networking (Network Virtualization Bottlenecks)
|
Search Networking
|
12/31/2018 |
50 |
Connectivity
|
100 GbE Switch Market Shifting to Large Enterprises (100 GbE Catching On)
|
Search Networking
|
12/31/2018 |
50 |
Administration
|
What Are the Pros And Cons of Deploying Containers? (Container Pros & Cons)
|
Search Networking
|
12/31/2018 |
50 |
Operations
|
How Do Virtual ADCs Benefit Enterprise Data Centers? (Virtual ADCs, Application Delivery Controllers)
|
Search Networking
|
12/31/2018 |
50 |
Cloud
|
How to Tame a Multicloud Enterprise by Using a Cloud Management Platform (Taming a Multicloud Enterprise)
|
ToolBox
|
12/31/2018 |
50 |
Management
|
How Not to Handle a Data Breach (What Not to Do in a Breach)
|
ToolBox
|
12/31/2018 |
50 |
Security
|
Privacy is the Ultimate Paradox: Why We Can’t Have Privacy Without Intrusion (Doublethink: Privacy with Intrusion, GDPR)
|
ToolBox
|
12/31/2018 |
50 |
Bit bucket
|
The 27 Best Websites for Wasting Time on the Internet in 2018 (Best Goofing Off Sites)
|
HubSpot
|
12/31/2018 |
50 |
Storage
|
Top Storage News of 2018 (2018 Top Stories)
|
TechRepublic
|
12/29/2018 |
52 |
Technology
|
10 Tech Trends That Will Actually Be Adopted In 2019 (Trends That Will Be Adopted in 2019)
|
TechRepublic
|
12/29/2018 |
52 |
Connectivity
|
One Byte at a Time – Protocol Analysis (Troubleshooting - One Byte At A Time (Video))
|
NetworkComputing
|
12/29/2018 |
52 |
Management
|
A Roadmap for Becoming a Customer-Centric CIO (Customer-Centric CIO Roadmap)
|
InformationWeek
|
12/29/2018 |
52 |
Bit bucket
|
After 60 Years, IT’s Time for a Name Change (Time for a Name Change)
|
InformationWeek
|
12/29/2018 |
52 |
Devops
|
How to Transition to DevOps in Less Than 30 Days (30 Day Transition)
|
InformationWeek
|
12/29/2018 |
52 |
Compliance
|
A Data Inventory Is Key to Maintaining Data Privacy Compliance (Data Inventory Is Critical to GDPR, GDPR Article 30)
|
Information Management
|
12/29/2018 |
52 |
Data
|
10 Steps To Success as a Data-Driven Organization (Data-Driven Success)
|
Information Management
|
12/29/2018 |
52 |
Data
|
Artificial Intelligence Enthusiasm Outpacing Adoption, Study Finds (AI Adoption Lags Enthusiasm)
|
Digital Insurance
|
12/29/2018 |
52 |
Security
|
7 Business Metrics Security Pros Need to Know (Need To Know Metrics)
|
Dark Reading
|
12/29/2018 |
52 |
Connectivity
|
Net Neutrality Battle Heads to Court In 2019 (Net Neutrality Back to Court)
|
cnet
|
12/29/2018 |
52 |
Management
|
When a Corporate Data Breach Happens: Critical Next Steps for 2019 (Critical Steps After A Breach)
|
Business 2 Community
|
12/29/2018 |
52 |
Connectivity
|
How Micro Modular Data Centers Simplify Complex Network Routes (Micro Modulars Simplify Complex Network Routes, Edge Computing)
|
Search Networking
|
12/29/2018 |
52 |
Data
|
Tips to Implement DRaaS Strategy (DRaaS Tips, DR as a Service)
|
Storage Newsletter
|
12/28/2018 |
53 |
Storage
|
Comparing Tape and Cloud Storage for Long-Term Data Preservation (Tape vs Cloud for Long Term Storage, LTO)
|
Storage Newsletter
|
12/28/2018 |
53 |
Cloud
|
Cloud Security Concerns: IT vs. LoB (Security Concerns IT vs LoB)
|
No Jitter
|
12/28/2018 |
53 |
Data
|
Debunking Four Myths about Flow Data (Flow Data Myths, NetFlow, IPFIX)
|
NetworkComputing
|
12/28/2018 |
53 |
Connectivity
|
Debunking Four Myths about Flow Data (Flow Data Myths, NetFlow, IPFIX)
|
NetworkComputing
|
12/28/2018 |
53 |
Operations
|
2019 Predictions with Infrastructure Implications (Infrastructure Implication Predictions)
|
NetworkComputing
|
12/28/2018 |
53 |
Connectivity
|
5G E Isn’t Real 5G. Here’s What You Need to Know (5G E Isn’t Real 5G, AT&T 5G E)
|
How To Geek
|
12/28/2018 |
53 |
Data
|
Artificial Intelligence: Future and Trends to Watch (Artificial Intelligence Trends)
|
ciol
|
12/28/2018 |
53 |
Data
|
AI's Dark Secret? A Desire for Data Without Bounds (AI's Dark Secret, Artificial Intelligence)
|
CIO
|
12/28/2018 |
53 |
Compliance
|
What You Need to Know About California’s New IoT Security Law (California’s New IoT Security Law, SB-327)
|
ToolBox
|
12/28/2018 |
53 |
Data
|
Data Management Trends That Will Impact 2019: Dark Data is on the Move (2019 Data Management Trends)
|
ToolBox
|
12/28/2018 |
53 |
Security
|
3 Ways to Protect Your Employees' Inboxes from Phishing Threats (Phishing Protection)
|
TechRepublic
|
12/22/2018 |
59 |
Management
|
3 Ways Project Leadership Will Evolve in 2019 (Project Management Will Evolve)
|
TechRepublic
|
12/22/2018 |
59 |
Bit bucket
|
13 In-Demand Tech Certifications That Will Help You Get a Better Job (13 In-Demand Tech Certifications, Agile, Scrum, AWS, CEH, CISSP, CCNA, CCNP, CompTIA, GIAC, ITIL, ITSM, MCSE, PMP)
|
TechRepublic
|
12/22/2018 |
59 |
Connectivity
|
Which Should You Choose for Your Next Server-Side Application – .NET Framework or .NET Core? (NET Framework vs NET Core)
|
Business 2 Community
|
12/22/2018 |
59 |
Security
|
The First 100 Days of the New CISO: How to Avoid the “Curse of Firefighting”? (CISO's First 100 Days)
|
Business 2 Community
|
12/22/2018 |
59 |
Management
|
2018 Cost of a Data Breach Study (2018 Breach Cost, White Paper)
|
IBM, Ponemon Institute LLC
|
12/22/2018 |
59 |
Compliance
|
Facebook Like, Social Sharing Buttons on Your Website May Land You In GDPR Hot Water If Data Goes a-Wanderin' (Possible Trouble with Like, Social Sharing Buttons on Your Website, GDPR, CJEU)
|
The Register
|
12/21/2018 |
60 |
Data
|
Google Lens Now Recognizes Over 1 Billion Products (Recognizing Over 1 Billion Products, Augmented Reality)
|
Venture Beat
|
12/21/2018 |
60 |
Cloud
|
The Cloud May Finally be Ready for Your Legacy Apps
|
InformationWeek
|
12/21/2018 |
60 |
Security
|
Why CXOs are Leading the Charge for AI-Based Security (Artificial Intelligence Based Security)
|
TechRepublic
|
12/20/2018 |
61 |
Management
|
What Got You Here won't Get You There (Past History Doesn't Cut It)
|
TechRepublic
|
12/20/2018 |
61 |
Security
|
5 Biggest Security Vulnerabilities Of 2018 (2018'a Biggest Vulnerabilities)
|
TechRepublic
|
12/20/2018 |
61 |
Security
|
Better Security Achieved with Randomly Generating Biological Encryption Keys (Randomly Generated Biological Encryption Keys)
|
Science Daily
|
12/20/2018 |
61 |
Connectivity
|
Juniper CTO Talks Cloud, High-Speed Networking (Juniper CTO on Networking)
|
Networks Asia
|
12/20/2018 |
61 |
Management
|
Crystal Balling Gazing into 2019 (2019 Crystal Ball)
|
Networks Asia
|
12/20/2018 |
61 |
Data
|
IT Leaders Frustrated With Complexity, Limited Insights of Analytics (Frustrated with Analytics Complexity)
|
Information Management
|
12/20/2018 |
61 |
Administration
|
How to Remotely Brick a Server (Bricking A Server)
|
Dark Reading
|
12/20/2018 |
61 |
Operations
|
Business Technology: 4 Threats to Watch Out For (Future Threats)
|
Business 2 Community
|
12/20/2018 |
61 |
Cloud
|
Serverless Computing: One Step Forward, Two Steps Back (Serverless Pitfalls, White Paper)
|
UC Berkeley
|
12/20/2018 |
61 |
Data
|
Sensored to Death: How Machine Learning In the Cloud Will Destroy All Privacy (The Death of Privacy, IoT, Cloud)
|
ZDnet
|
12/19/2018 |
62 |
Management
|
'A Very, Very Bad Thing': This Is What a No-Deal Brexit Means for Tech Companies And Jobs (No-Deal Brexit)
|
ZDnet
|
12/19/2018 |
62 |
Security
|
Why 2019 will Introduce Stricter Privacy Regulation (Stricter Privacy In 2019)
|
TechRepublic
|
12/19/2018 |
62 |
Connectivity
|
Two-Thirds of Organizations Plan to Launch 5G by 2020 (66% Launching 5G By 2020)
|
TechRepublic
|
12/19/2018 |
62 |
Technology
|
The Year in IT: Technologies that Shaped 2018 (2018 Centerstage Tech)
|
TechRepublic
|
12/19/2018 |
62 |
Cloud
|
Rethinking Disaster Recovery for the Cloud (Rethinking DR)
|
Networks Asia
|
12/19/2018 |
62 |
Cloud
|
Key Enterprise Cloud Trends for 2019 (2019 Enterprise Trends)
|
Networks Asia
|
12/19/2018 |
62 |
Data
|
Consolidating Data Silos: What Enterprises Need to Know to Harmonize Data (Data Silo Consolidation)
|
Information Management
|
12/19/2018 |
62 |
Compliance
|
Best Practices to Prepare for New Data U.S. Protection Regulations (Prepare For New Data Regulations, GDPR, California Consumer Privacy Act, CCPA)
|
Information Management
|
12/19/2018 |
62 |
Cloud
|
5 Top Cloud Computing Myths Debunked (Debunking The Myths)
|
Information Management
|
12/19/2018 |
62 |
Devops
|
Risk Based Access Control and the Role of Continuous Authentication (Continuous Authentication, DevOps)
|
ToolBox
|
12/19/2018 |
62 |
Data
|
How to Build And Run a Successful Data Team (Build A Successful Team)
|
GCN
|
12/19/2018 |
62 |
Operations
|
We Asked, You Answered: The Truth About Software Reliability (Software Reliability)
|
The Register
|
12/18/2018 |
63 |
Technology
|
5 Biggest IoT Security Failures Of 2018 (IoT Security Failures Of 2018)
|
TechRepublic
|
12/18/2018 |
63 |
Security
|
How A Personality Trait Puts You at Risk for Cybercrime (Personality Trait and Cybercrime)
|
Science Daily
|
12/18/2018 |
63 |
Storage
|
Data Storage Using Individual Molecules (Individual Molecules)
|
Science Daily
|
12/18/2018 |
63 |
Security
|
Hiding Images and Information in Plain Sight (Encryption In Plain Sight)
|
Science Daily
|
12/18/2018 |
63 |
Data
|
How Big Data Analytics will Transform UC Migrations (UC Migrations Transformed By Analytics, ETL UCaaS)
|
No Jitter
|
12/18/2018 |
63 |
Connectivity
|
SD-WAN Can Reduce WAN Costs by Half (Reduce WAN Costs by Half With SD-WAN)
|
No Jitter
|
12/18/2018 |
63 |
Security
|
Test-Drive Your Security Approach (Test-Drive Your Approach)
|
Networks Asia
|
12/18/2018 |
63 |
Connectivity
|
VPN: An Essential Tool in Your Security Toolbox (Essential Tool - VPN)
|
Business 2 Community
|
12/18/2018 |
63 |
Technology
|
How Wireless Recharging Works -- and Doesn’t, Yet (Wireless Recharging...Sorta)
|
GCN
|
12/18/2018 |
63 |
Technology
|
Why Email Phishing Persists (Phishing Here to Stay)
|
GCN
|
12/18/2018 |
63 |
Connectivity
|
If Most Punters Are Unlikely to Pay More for 5G, Why All the Rush? (2022 For 5G)
|
The Register
|
12/17/2018 |
64 |
Storage
|
The Future is Bright, The Future is NVMe (The Future is NVMe)
|
The Register
|
12/17/2018 |
64 |
Data
|
Top 5 Questions for Data Scientists (Data Scientists Questions)
|
TechRepublic
|
12/17/2018 |
64 |
Security
|
The Rise of EDR and MDR and What They Mean for Security Teams (The Rise of EDR and MDR)
|
Networks Asia
|
12/17/2018 |
64 |
Security
|
Browser Is the New Endpoint (A New Endpoint: The Browser)
|
Networks Asia
|
12/17/2018 |
64 |
Data
|
Are You Protecting Your Data from Human Error? (Protection From Human Error)
|
Networks Asia
|
12/17/2018 |
64 |
Compliance
|
Why Data Privacy Professionals Need a New Approach to Compliance (New Approach Needed, GDPR, PIA/DPIA)
|
Information Management
|
12/17/2018 |
64 |
Connectivity
|
What’s the Difference Between 5G and 5GHz Wi-Fi? (5G and 5GHz Wi-Fi Difference)
|
How To Geek
|
12/17/2018 |
64 |
Security
|
Cryptojacking: The Hot New Type of Attack on Data Centers (Cryptojacking)
|
Data Center Knowledge
|
12/17/2018 |
64 |
Security
|
2019 Attacker Playbook (Attacker Playbook 2019)
|
Dark Reading
|
12/17/2018 |
64 |
Bit bucket
|
Is Your Boss Spying on You? (Employee Monitoring)
|
Business 2 Community
|
12/17/2018 |
64 |
Devops
|
DevOps Is Causing Chaos for Enterprises (Causing Problems)
|
SD Times
|
12/17/2018 |
64 |
Operations
|
The Complete Guide To: Hyperconverged Infrastructure (Hyperconverged Infrastructure Guide, White Paper)
|
IDG
|
12/17/2018 |
64 |
Cloud
|
Chaos Engineering Aims to Avert Disasters (Availability Thru Chaos Engineering)
|
ToolBox
|
12/17/2018 |
64 |
Operations
|
The Staying Power of Mainframes (Mainframes Here To Stay)
|
GCN
|
12/17/2018 |
64 |
Cloud
|
Principles of Chaos Engineering (Chaos Engineering Principles0
|
PRINCIPLES OF CHAOS ENGINEERING
|
12/17/2018 |
64 |
Cloud
|
6 Cloud Security Predictions for 2019 (2019 Predictions)
|
Dark Reading
|
12/16/2018 |
65 |
Security
|
6 CISO Resolutions for 2019 (2019 CISO Resolutions)
|
Dark Reading
|
12/16/2018 |
65 |
Management
|
Save the Children Foundation Duped By Hackers into Paying Out $1 Million (BEC Scam)
|
ZDnet
|
12/15/2018 |
66 |
Security
|
How The Industry Expects to Secure Information In a Quantum World (Quantum Encryption, Quantum Computer)
|
ZDnet
|
12/15/2018 |
66 |
Security
|
How One Hacked Laptop Led To An Entire Network Being Compromised (One Hack Brings Disaster)
|
ZDnet
|
12/15/2018 |
66 |
Technology
|
2018 Technology Trends That Will Matter a Decade from Now (Today's Tech That Will Matter in 10 Years, Cloud Computing, Artificial Intelligence, IoT, Quantum Computing, Digital Transformation)
|
ZDnet
|
12/15/2018 |
66 |
Security
|
The Biggest Phishing Attacks of 2018 and How Companies Can Prevent It in 2019 (Phishing Prevention Tips)
|
TechRepublic
|
12/15/2018 |
66 |
Data
|
How Technology Might Solve our Impending Food Crisis (Technology and Food)
|
TechRepublic
|
12/15/2018 |
66 |
Management
|
4 Ways Leaders Destroy Team Morale (Morale Busters)
|
TechRepublic
|
12/15/2018 |
66 |
Security
|
15 Skills You Need to Be a Whitehat Hacker And Make Up to $145K Per Year (Whitehat Hacker Skills)
|
TechRepublic
|
12/15/2018 |
66 |
Data
|
10 Skills Employers Need In a Data Scientist (Data Scientist Skills)
|
TechRepublic
|
12/15/2018 |
66 |
Bit bucket
|
What Tech Mega Hubs Will Do to East Coast Cities (Mega Hub Issues)
|
InformationWeek
|
12/15/2018 |
66 |
Management
|
Top 10 Tech Predictions for 2019 (Top 10 Predictions 2019)
|
InformationWeek
|
12/15/2018 |
66 |
Management
|
Capital One CIO: We're a Software Company (Becoming A Software Company)
|
InformationWeek
|
12/15/2018 |
66 |
Data
|
5 Machine Learning Resolutions for 2019 (Machine Learning Considerations)
|
InformationWeek
|
12/15/2018 |
66 |
Data
|
6 AI Predictions for 2019 (2019 Artificial Intelligence Predictions)
|
Digital Insurance
|
12/15/2018 |
66 |
Security
|
Despite Breaches, Many Organizations Struggle to Quantify Cyber-Risks to Business (Quantifying Risk)
|
Dark Reading
|
12/15/2018 |
66 |
Security
|
Cybercrime Is World's Biggest Criminal Growth Industry ($3 Trillion in 3 Years)
|
Dark Reading
|
12/15/2018 |
66 |
Security
|
Who Are You, Really? A Peek at the Future of Identity (Future of Identity Management)
|
Dark Reading
|
12/15/2018 |
66 |
Technology
|
The State Of Email Security (Email Security, White Paper)
|
Mimecast Limited
|
12/14/2018 |
67 |
Cloud
|
Strategically Achieving Multicloud Success (Multicloud Success Strategy, White Paper)
|
F5/IBM
|
12/14/2018 |
67 |
Cloud
|
Top 10 Public Cloud Security Recommendations (Security Recommendations, White Paper)
|
Palo Alto Networks
|
12/14/2018 |
67 |
Connectivity
|
6 Things You Should Know About 802.11ax (802.11ax Insight, W-Fi)
|
NetworkComputing
|
12/13/2018 |
68 |
Technology
|
How SDN and Blockchain can help with IoT Privacy and Security? (IoT better With SDN & Blockchain
|
NetworkComputing
|
12/13/2018 |
68 |
Connectivity
|
Big Market for Smart Speakers, other Predictions About 5G, And. . . Radio? (5G Coming with Complications)
|
MediaPost
|
12/13/2018 |
68 |
Security
|
4 Lessons Die Hard Teaches About Combating Cyber Villains (Lessons From the Movie Die Hard)
|
Dark Reading
|
12/13/2018 |
68 |
Security
|
Worst Password Blunders of 2018 Hit Organizations East and West (Unbelievable Password Blunders)
|
Dark Reading
|
12/13/2018 |
68 |
Devops
|
Forget Shifting Security Left; It's Time to Race Left (DevOps Shift Left)
|
Dark Reading
|
12/13/2018 |
68 |
Operations
|
36% of Workers Would Rather Go to the DMV than Troubleshoot an IT Issue (DMV or Troubleshoot)
|
TechRepublic
|
12/11/2018 |
70 |
Technology
|
What can we expect from technology in 2019? (2019 Expectations)
|
Networks Asia
|
12/11/2018 |
70 |
Cloud
|
Key Considerations When Migrating Workloads to the Public Cloud (Migrating To The Public Cloud, White Paper)
|
Insight
|
12/11/2018 |
70 |
Data
|
How to Get Beyond AI Myths (Beyond AI Myths, Artificial Intelligence)
|
Washington Technology
|
12/11/2018 |
70 |
Data
|
How to Get Beyond AI Myths (Beyond AI Myths, Artificial Intelligence)
|
GCN
|
12/11/2018 |
70 |
Security
|
US Senate Computers will Use Disk Encryption (Disk Encryption for US Senate)
|
ZDnet
|
12/03/2018 |
78 |
Technology
|
A New Light on Significantly Faster Computer Memory Devices (Faster Computer Memory Devices)
|
Science Daily
|
12/03/2018 |
78 |
Management
|
End Users Are Winning the Shadow IT War (End Users Winning Shadow War)
|
InformationWeek
|
12/03/2018 |
78 |
Connectivity
|
HTTPS Is Almost Everywhere. So Why Isn’t the Internet Secure Now? (Why HTTPS Does Not Mean Secure)
|
How To Geek
|
12/03/2018 |
78 |
Management
|
Your People Problem With Emerging Technology and Innovation (People Problems and Technology)
|
Digital Insurance
|
12/03/2018 |
78 |
Data
|
The Complete Guide To: Data Science (Data Science Guide, White Paper)
|
TechWorld
|
12/03/2018 |
78 |
Technology
|
IoT and the Security Challenges That Tech Companies Face (IoT Security Challenges)
|
TechRepublic
|
11/30/2018 |
81 |
Security
|
How To Protect Your Business from Botnets: 6 Strategies (Botnet Protection Strategies)
|
TechRepublic
|
11/30/2018 |
81 |
Management
|
How Cyber-Attacks Will Change the Face of Company Boards (Cyber Attacks Changing Boards Of Directors)
|
Networks Asia
|
11/30/2018 |
81 |
Security
|
The Season of Fraud is Coming. Are You Prepared? (Checklist on How to Deal With Holiday Fraud)
|
Business 2 Community
|
11/30/2018 |
81 |
Operations
|
What Serverless Is and What it Means for You = Part 2: Challenges and Considerations for Choosing the Right Serverless Solution (Choosing the Right Serverless Solution)
|
Business 2 Community
|
11/30/2018 |
81 |
Data
|
Data Science for Marketers (Part 2): Descriptive v Diagnostic Analytics (Descriptive v Diagnostic Marketing Analytics)
|
Business 2 Community
|
11/30/2018 |
81 |
Connectivity
|
10 Tips for Diagnosing Slow Applications (Fixing Slow Applications)
|
No Jitter
|
11/29/2018 |
82 |
Connectivity
|
Higher Speed Ethernet Requirements Continue to Grow (Higher Speed Ethernet Growing)
|
NetworkComputing
|
11/29/2018 |
82 |
Connectivity
|
Preparing for 5G's Biggest Security Challenges (5G's Security Challenges)
|
NetworkComputing
|
11/29/2018 |
82 |
Security
|
Encrypted Traffic Reaches a New Threshold (Encrypted Traffic Breaking Point, Encryption)
|
NetworkComputing
|
11/29/2018 |
82 |
Data
|
Three Steps Toward Stronger Data Protection (Stronger Data Protection)
|
Information Management
|
11/29/2018 |
82 |
Security
|
Last Quarter Saw 137M Phishing Attacks, Up Nearly 30 Percent (Phishing Up 30% To 137MM/Qtr)
|
Information Management
|
11/29/2018 |
82 |
Security
|
Is Security the Real Stuff of Nightmares? (CISOs Manage Constant Risk)
|
HelpNet Security
|
11/29/2018 |
82 |
Operations
|
Blind Spots and How to See Them: Observability in a Serverless Environment (Observability in a Serverless Environment, FaaS, DevOps, VPC)
|
HelpNet Security
|
11/29/2018 |
82 |
Data
|
Incorrect Assessments of Data Value Putting Organizations at Risk (Incorrect Data Value Assessments)
|
Dark Reading
|
11/29/2018 |
82 |
Security
|
The "Typical" Security Engineer: Hiring Myths & Stereotypes (Security Engineer: Hiring Myths)
|
Dark Reading
|
11/29/2018 |
82 |
Management
|
7 Trends Driving Enterprise IT Transformation in 2019 (2019 Trends)
|
ciol
|
11/29/2018 |
82 |
Operations
|
What Serverless is and What it Means for You - Part 1 (What Is Serverless Computing)
|
Business 2 Community
|
11/29/2018 |
82 |
Technology
|
5 Ways to Help Robots Work Together with People (Robots Working With People)
|
GCN
|
11/29/2018 |
82 |
Compliance
|
Domain Name 'Admin' Role Eyed Up as Latest Victim in Whois System's GDPRrmeggdon (GDPRrmeggdon)
|
The Register
|
11/28/2018 |
83 |
Data
|
How Better Standards can Decrease Data Security Spending Needs (Better Standards Reduce Costs, FedRAMP)
|
Information Management
|
11/28/2018 |
83 |
Connectivity
|
Why You Shouldn't Trust Free VPNs (Don't Trust Free VPNs)
|
How To Geek
|
11/28/2018 |
83 |
Compliance
|
Why Compliance is Never Enough (Never Enough)
|
HelpNet Security
|
11/28/2018 |
83 |
Security
|
Take Cybersecurity Into Your Own Hands: Don't Rely on Tech Giants (Don't Put Your Security Into Someone Else's Hands)
|
HelpNet Security
|
11/28/2018 |
83 |
Security
|
Cybersecurity 2019: Predictions You Can't Ignore (Predictions You Can't Ignore)
|
HelpNet Security
|
11/28/2018 |
83 |
Operations
|
Lessons From This Year's Data Center Outages: Focus On the Fundamentals (Outage Fundamentals)
|
Data Center Knowledge
|
11/28/2018 |
83 |
Security
|
Who's the Weakest Link in Your Supply Chain? (Weakest Link: Third Parties)
|
Dark Reading
|
11/28/2018 |
83 |
Security
|
8 Tips for Preventing Credential Theft Attacks on Critical Infrastructure (Preventing Credential Theft Attacks)
|
Dark Reading
|
11/28/2018 |
83 |
Data
|
Data Science for Marketers (Part 1): Getting Your Data Ready (Getting Your Data Marketing Ready)
|
Business 2 Community
|
11/28/2018 |
83 |
Cloud
|
Options for Dedicated Cloud Interconnects and Their Benefits (Options for Dedicated Interconnects)
|
Search Networking
|
11/28/2018 |
83 |
Technology
|
Using Blockchain to Support Trustworthy Transactions on the IoT (Blockchain and IoT Trustworthiness)
|
InformationWeek
|
11/28/2018 |
83 |
Security
|
Blockchain Applications for Identity Verification (Blockchain for Identity Verification, White Paper)
|
Evident
|
11/28/2018 |
83 |
Technology
|
Racing Electrons Under Control (Computing At Petahertz Frequencies)
|
Science Daily
|
11/27/2018 |
84 |
Technology
|
Quantum Computing at Scale: Scientists Achieve Compact, Sensitive Qubit Readout (Sensitive Qubit Readout)
|
Science Daily
|
11/27/2018 |
84 |
Data
|
Mass Data Fragmentation Requires a Storage Rethink (Data Fragmentation)
|
Network World
|
11/27/2018 |
84 |
Security
|
The World of Wirearchy: The Future of Security Operation Centres (Wirearchy: The Future of SOCs)
|
Networks Asia
|
11/27/2018 |
84 |
Security
|
Transforming into a CISO Security Leader (Becoming a CISO, Leadership)
|
Dark Reading
|
11/27/2018 |
84 |
Compliance
|
Learning from a $150 Billion Compliance Failure ($150 Billion Compliance Failure)
|
Security Today
|
11/27/2018 |
84 |
Cloud
|
7 Factors to Consider When Designing a Cloud Migration Plan (Migration Factors)
|
TechRepublic
|
11/27/2018 |
84 |
Technology
|
Building The Tricorder: The Race To Create A Real-Life Star Trek Medical Scanner (Building A Real-Life Tricorder
|
ZDnet
|
11/26/2018 |
85 |
Connectivity
|
Mobile Networks are Killing Wi-Fi for Speed Around the World (Mobile Killing Wi-Fi)
|
The Register
|
11/26/2018 |
85 |
Connectivity
|
A 5G Day May Come When the Courage of Cable and DSL Fails ... But it Is Not This Day (Cable & DSL Face 5G, 5G FWA)
|
The Register
|
11/26/2018 |
85 |
Security
|
Why Military Veterans Might Be Key to Closing the Cybersecurity Jobs Gap (Hire Military Cyber Professionals)
|
TechRepublic
|
11/26/2018 |
85 |
Operations
|
8 Strategies To Keep Legacy Systems Running (Keep Legacy Systems Running)
|
TechRepublic
|
11/26/2018 |
85 |
Data
|
6 Ways To Include Dark Data In Analytic Strategies (Using Dark Data)
|
TechRepublic
|
11/26/2018 |
85 |
Technology
|
How to Tell Which IoT Predictions to Pay Attention to (Real Or Fake IoT Predictions, IIoT)
|
Network World
|
11/26/2018 |
85 |
Data
|
Meeting the Intelligent Data Management Needs of 2019 (Data Management In 2019)
|
Networks Asia
|
11/26/2018 |
85 |
Cloud
|
Why Banking Industry Cloud Strategies Lag Behind (Banking Industry Lags Behind)
|
InformationWeek
|
11/26/2018 |
85 |
Security
|
Fundamental Concepts of Cyber Resilience: Introduction and Overview (Fundamentals of Cyber Resistance, White Paper)
|
R&D Center
|
11/26/2018 |
85 |
Security
|
Edge Computing Security Dos and Don'ts (Edge Dos and Don'ts)
|
NetworkComputing
|
11/24/2018 |
87 |
Technology
|
6 Mobile Security Threats You Should Take Seriously in 2019 (2019 Mobile Threats)
|
Networks Asia
|
11/23/2018 |
88 |
Management
|
Decision Making During Crises And How To Avoid Groupthink (Avoid Groupthink During A Crisis)
|
Continuity Central
|
11/23/2018 |
88 |
Data
|
Gone Phishing: Everything You Need to Know About the Ever Present Threat to Your Data (Ever Present Threat)
|
Business 2 Community
|
11/23/2018 |
88 |
Cloud
|
Closing the Cloud Security Business Gap (Mitigate Data Threats, White Paper)
|
SalesForce
|
11/23/2018 |
88 |
Technology
|
Real Talk: You're Gonna Have to Get Real About Real-Time Analytics If You Wanna Make IoT Work (Making IoT Work)
|
The Register
|
11/22/2018 |
89 |
Connectivity
|
Net Neutrality Is Heading To the Courts (Again): So Will the Current Rules Stand or Be Overturned (Again)? (Net Neutrality Round Three)
|
The Register
|
11/22/2018 |
89 |
Data
|
What is Catastrophic Forgetting and How Does it Affect AI Development? (Catastrophic Forgetting, Artificial Intelligence)
|
TechWorld
|
11/22/2018 |
89 |
Data
|
5 Trends To Expect For Artificial Intelligence In 2019 (AI Trends in 2019)
|
Digital Insurance
|
11/22/2018 |
89 |
Security
|
How to Stay Safe in a World Where Phishing is More Sophisticated Than Ever (Stay Safe from Phishing)
|
Business 2 Community
|
11/22/2018 |
89 |
Security
|
3 Steps That Will Lower Your Cybersecurity Risk (Steps to Lower Risk)
|
Business 2 Community
|
11/22/2018 |
89 |
Operations
|
Data Center Power Distribution and Capacity Planning (Understanding Power, White paper)
|
Raritan
|
11/22/2018 |
89 |
Data
|
How Big Data Is Helping To Power Mercedes To F1 Glory (Mercedes + Big Data = F1 Victory)
|
ZDnet
|
11/21/2018 |
90 |
Bit bucket
|
Photos: 25 Bad Tech Gifts to Avoid Giving this Holiday Season (Really Bad Tech Gifts)
|
TechRepublic
|
11/21/2018 |
90 |
Connectivity
|
How 5G Technology will Change Data Centers (5G Impact)
|
TechRepublic
|
11/21/2018 |
90 |
Security
|
85% of Enterprises Allow Employees to Access Data From Personal Devices, Security Risks Abound (Bad Idea -Employees Accessing Data From Personal Devices)
|
TechRepublic
|
11/21/2018 |
90 |
Data
|
Inside the Chief Data Privacy Officer Role with Barbara Lawler (Data Privacy Officer Role)
|
Information Management
|
11/21/2018 |
90 |
Cloud
|
Why a Multi-Cloud Strategy Is Critical for Enterprise Data Protection (Multi-Cloud Strategy Is Essential)
|
Data Center Knowledge
|
11/21/2018 |
90 |
Management
|
Consumers are Forgiving After a Data Breach, but Companies Need to Respond Well (Consumers Forgive After a Breach; Provided....)
|
Dark Reading
|
11/21/2018 |
90 |
Security
|
What We Can Learn from the Recent Singapore Data Breach (Singapore Data Breach Lessons)
|
Networks Asia
|
11/20/2018 |
91 |
Connectivity
|
Why SDN and IBN Demand Better Network Visibility (Better Visibility for SDN & IBN)
|
NetworkComputing
|
11/20/2018 |
91 |
Storage
|
How Do SSDs Work? (Inside SSDs)
|
ExtremeTech
|
11/20/2018 |
91 |
Security
|
Securities Markets at High Risk of Cyberattack (Highest Risk of Attack)
|
Dark Reading
|
11/20/2018 |
91 |
Security
|
9 Traits of a Strong InfoSec Resume (Elements of a Strong InfoSec Resume)
|
Dark Reading
|
11/20/2018 |
91 |
Security
|
Can a New Standard Prevent An Encryption Meltdown. (Could Quantum Prevent An Encryption Meltdown)
|
GCN
|
11/20/2018 |
91 |
Management
|
Be Accessible, Not Open-Door (Accessible Not Open-Door)
|
Project Management Advisor
|
11/20/2018 |
91 |
Security
|
A Little Phishing Knowledge May Be a Dangerous Thing (Phishing Is Really Dangerous And Effective)
|
The Register
|
11/19/2018 |
92 |
Technology
|
Securing the IoT Has Become Business-Critical (Business Critical: IoT Security)
|
Network World
|
11/19/2018 |
92 |
Cloud
|
Gotcha Pricing from the Cloud Pushes Workloads Back on Premises (It's Not Cheaper)
|
Network World
|
11/19/2018 |
92 |
Data
|
Tips for Protecting Your Data When Losing an Employee (Protect Your Data When Losing An Employee)
|
Information Management
|
11/19/2018 |
92 |
Technology
|
What Is Augmented Reality, Anyway? (Long Way To Go for Augmented Reality)
|
GCN
|
11/19/2018 |
92 |
Security
|
How to Prepare for Your Next Security Breach (Prepare Now For The Next Breach)
|
PC Magazine
|
11/18/2018 |
93 |
Data
|
Building An Artificial General Intelligence Begins by Asking 'What is Intelligence?' (What is Artificial Intelligence)
|
Information Management
|
11/18/2018 |
93 |
Security
|
Would You Know if You've Been Breached? (Have You Been Breached, White Paper)
|
thycotic
|
11/18/2018 |
93 |
Data
|
Discriminate for Fairness (Fairness)
|
DeadSalmonData
|
11/18/2018 |
93 |
Technology
|
The Impact of Popular IoT Devices on Our Lives (IoT's Impact)
|
Read IT Quick
|
11/17/2018 |
94 |
Technology
|
7 Questions Boards Need to Ask About Artificial Intelligence (Questions the Board Must Ask About AI)
|
Information Management
|
11/17/2018 |
94 |
Security
|
95% of Organizations Have Cultural Issues Around Cybersecurity (Embedding Cybersecurity into the Organization)
|
Dark Reading
|
11/17/2018 |
94 |
Cloud
|
10 Challenges in Taking off on a Bold Multi-Cloud Strategy (Multi-Cloud Strategy Challenges)
|
ciol
|
11/17/2018 |
94 |
Security
|
Artificial Intelligence, Cybersecurity, and Common Sense (Common Sense)
|
Business 2 Community
|
11/17/2018 |
94 |
Operations
|
Bridging the Divide between Software Developers and Operators using Logs (White Pape)
|
Queen’s University, Canada
|
11/17/2018 |
94 |
Bit bucket
|
31 Books Every Techie Should Read (Must Reads for Techies)
|
TechRepublic
|
11/16/2018 |
95 |
Cloud
|
The Top 5 Myths about Cloud-Based Security (Cloud Security Myths)
|
TechRepublic
|
11/16/2018 |
95 |
Connectivity
|
SD-WAN Puts Traditional Routers on Notice (SD-WAN Is Arriving, Routers, MPLS)
|
Network World
|
11/16/2018 |
95 |
Cloud
|
Cloud Security: The Essential Checklist (Essential Security Checklist, IAM, LDAP)
|
InfoWorld
|
11/16/2018 |
95 |
Storage
|
Performance Benefits of NVMe over Fibre Channel (NVMe vs Fibre, White Paper)
|
Demartek
|
11/16/2018 |
95 |
Technology
|
How to Choose a Safer Analytics SDK for Your Mobile App (Safer Analytics SDK)
|
Business 2 Community
|
11/16/2018 |
95 |
Connectivity
|
OM5 and OM4+ Fiber (OM5 vs OM4+ fiber , White Paper)
|
Commscope
|
11/16/2018 |
95 |
Security
|
AI and Cybersecurity for Dummies (Artificial Intelligence & Cybersecurity For Dummies, White Paper)
|
IBM
|
11/16/2018 |
95 |
Operations
|
Six Critical Systems, Four Months To Brexit - And No Completed Testing (Brexit: Four Months Not Looking Good)
|
The Register
|
11/15/2018 |
96 |
Technology
|
How to Improve Enterprise IoT Security: 5 Tips (5 Tips for IoT Security)
|
TechRepublic
|
11/15/2018 |
96 |
Connectivity
|
5G Mobile Networks: A Cheat Sheet (5G Cheat Sheet, eMBB, URLCC, mMTC)
|
TechRepublic
|
11/15/2018 |
96 |
Connectivity
|
Performance Testing: WinPcap versus Npcap (WinPcap vs Npcap, Wireshark)
|
NetworkComputing
|
11/15/2018 |
96 |
Connectivity
|
5 Tips to Harden Network Security in a Connected Enterprise (Harden Security, IoT, Zero Trust)
|
NetworkComputing
|
11/15/2018 |
96 |
Data
|
Employees Aren't Taking The Proper Steps To Keep Information Safe While Traveling (Safe While Traveling)
|
HelpNet Security
|
11/15/2018 |
96 |
Security
|
What's Keeping Europe's Top Infosec Pros Awake at Night? (Keeping Europe Awake At Night, GDPR)
|
HelpNet Security
|
11/15/2018 |
96 |
Compliance
|
Practical Guidance for Complying with Canada's New Privacy Breach Rules (Complying with Canada's PIPEDA)
|
Data Center Dynamics
|
11/15/2018 |
96 |
Security
|
To Click or Not to Click: The Answer Is Easy (Spearphishing Works)
|
Dark Reading
|
11/15/2018 |
96 |
Devops
|
Security Teams Struggle with Container Security Strategy (Strategy for Container Security)
|
Dark Reading
|
11/15/2018 |
96 |
Security
|
Understanding Evil Twin AP Attacks and How to Prevent Them (Evil Twin AP Attacks, MitM, 802.11b, SSID)
|
Dark Reading
|
11/15/2018 |
96 |
Security
|
Why Cryptojacking Malware Is a Bigger Threat to Your PC Than You Realize (Huge Threat: Cryptojacking Malware)
|
ZDnet
|
11/14/2018 |
97 |
Management
|
CEOs are the Least Tech-Savvy Executives, Harming Enterprise Digital Transformation (Least Tech-Savvy Executives)
|
TechRepublic
|
11/14/2018 |
97 |
Bit bucket
|
10 Signs You May Not Be Cut Out for IT (Decide if IT Is Your Career)
|
TechRepublic
|
11/14/2018 |
97 |
Security
|
Don't Underestimate the Power of Privilege (Danger From Privileged Accounts)
|
SC Magazine
|
11/14/2018 |
97 |
Security
|
RIP, 'IT Security' (Making Sense)
|
Dark Reading
|
11/14/2018 |
97 |
Data
|
Who is Your Data Expert? (Expert For Data)
|
Business 2 Community
|
11/14/2018 |
97 |
Devops
|
DevOps Done Right (Barriers To Success, White Paper)
|
New Relic
|
11/14/2018 |
97 |
Cloud
|
An Introduction To the New IT Approach Called Hybrid IT (Hybrid Introduction, White Paper)
|
WEI
|
11/14/2018 |
97 |
Storage
|
When You Play the Game Of Storage Arrays, You Win or You - Where are the Visionaries? (Gartner's Magical Square)
|
The Register
|
11/13/2018 |
98 |
Technology
|
Why 5G, AI, Cloud, and Blockchain Will Dominate The Digital Future Of The Enterprise (Dominating The Future, Artificial Intelligence)
|
TechRepublic
|
11/13/2018 |
98 |
Security
|
How CIOs Can Manage Blockchain Security: 4 Tips (Tips For Managing Blockchain)
|
TechRepublic
|
11/13/2018 |
98 |
Cloud
|
5 Ways Cloud Computing Will Change In the Next Year (2019 Changes)
|
TechRepublic
|
11/13/2018 |
98 |
Operations
|
Making the Right Hyperconvergence Choice: HCI Hardware or Software? (HW Or SW For HCI, Hyperconverged Infrastructure)
|
Network World
|
11/13/2018 |
98 |
Connectivity
|
What is Transport Layer Security (TLS)? (TLS 1.3 Improvements, SSL)
|
Network World
|
11/13/2018 |
98 |
Data
|
Fix Your Data Before You Move It To The Cloud (Migrating To The Cloud with Bad Data)
|
InfoWorld
|
11/13/2018 |
98 |
Data
|
Data Silos: Now and Forever? (Data Silos Forever)
|
InformationWeek
|
11/13/2018 |
98 |
Operations
|
What Special Ops Taught Me about TechOps (TechOps Lessons From Special Ops)
|
InformationWeek
|
11/13/2018 |
98 |
Data
|
Are You Sure You Want to Build that Data Warehouse? (Building A Data Warehouse - Bad Idea)
|
Business 2 Community
|
11/13/2018 |
98 |
Cloud
|
What Are Likely to Be the Key Barriers to Embracing Serverless Computing? (Serverless Barriers)
|
ZDnet
|
11/12/2018 |
99 |
Cloud
|
Hybrid Cloud's Growing Pains - And How To Beat Them: a Guide To Raising a Good Platform, So You Can Raise a Glass Later (Hybrid's Growing Pains)
|
The Register
|
11/12/2018 |
99 |
Technology
|
10 Predictions for How the Tech Industry Will Change In 2019 and Beyond (2019 And Beyond Predictions)
|
TechRepublic
|
11/12/2018 |
99 |
Data
|
Big Data Used to Predict the Future (Predicting The Future)
|
Science Daily
|
11/12/2018 |
99 |
Storage
|
Making Steps Toward Improved Data Storage (Improved Data Storage)
|
Science Daily
|
11/12/2018 |
99 |
Management
|
Trends that CTOs should pay attention to in 2019 (Trends for CTOs in 2019)
|
Networks Asia
|
11/12/2018 |
99 |
Technology
|
12 Certifications for Enterprise Architects (Enterprise Architect Certifications)
|
Networks Asia
|
11/12/2018 |
99 |
Cloud
|
Don't Make Your Cloud Migration a House of Cards (Cruddy In, Cruddy Out)
|
InfoWorld
|
11/12/2018 |
99 |
Connectivity
|
How to Improve Wireless Network Capacity And Performance in 3 Steps (Improve Wireless Capacity)
|
Search Networking
|
11/12/2018 |
99 |
Operations
|
Vulnerabilities in Our Infrastructure: 5 Ways to Mitigate the Risk (Mitigate the Risk)
|
Dark Reading
|
11/11/2018 |
100 |
Data
|
Disaster Recovery on AWS, Azure and Google Cloud: Head to Head (Head to Head Cloud DR Comparison, Cloud DR)
|
Business 2 Community
|
11/11/2018 |
100 |
Management
|
Google, Microsoft, Amazon: When Employees are Mad, Make Sure They Feel Heard (Make Sure They Feel Heard)
|
ToolBox
|
11/11/2018 |
100 |
Bit bucket
|
The Best Holiday Gifts for Co-Workers (Co-Worker Holiday Gifts)
|
TechRepublic
|
11/10/2018 |
101 |
Operations
|
Not Just for Google: ML-Assisted Data Center Cooling You Can Do Today (Over Cooling, Machine Learning, Artificial Intelligence)
|
Data Center Knowledge
|
11/10/2018 |
101 |
Data
|
Forrester's 2019 AI Predictions Include Pragmatic AI (Artificial Intelligence Predictions)
|
TechRepublic
|
11/09/2018 |
102 |
Security
|
10 Top Cybersecurity Predictions for 2019 (Top 10 Predictions)
|
Information Management
|
11/09/2018 |
102 |
Security
|
What is a 'Dark Web Scan' and Should You Use One? (Dark Web Scan)
|
How To Geek
|
11/09/2018 |
102 |
Technology
|
What Is A Solid-State Battery and Will They Solve Our Battery Life Problems? (Solid State Battery)
|
How To Geek
|
11/09/2018 |
102 |
Security
|
5 Things the Most Secure Software Companies Do (and How You Can Be Like Them) (Secure Companies Approaches
|
Dark Reading
|
11/09/2018 |
102 |
Data
|
Five Steps For Successfully Implementing An ISO 27001 Risk Assessment Framework (Implementing ISO 27001)
|
Continuity Central
|
11/09/2018 |
102 |
Management
|
Leading Through a Crisis: How to Pass the Acid Test Of Management (Passing the Acid Test)
|
Continuity Central
|
11/09/2018 |
102 |
Security
|
Zero Trust Security For Dummies (Security Zero Trust, White Paper)
|
Centrify
|
11/09/2018 |
102 |
Administration
|
We Don't Want to Spoil All of This Article, But Have You Patched, Taken Away Admin Rights, Made Backups Yet? (Ahead Of the Game, Threats, Patching)
|
The Register
|
11/08/2018 |
103 |
Technology
|
Dollar for Dollar, Crafting Cryptocurrency Sucks Up 'More Energy' Than Mining Gold, Copper, etc. (Bitcoin Is Expensive to Mine)
|
The Register
|
11/08/2018 |
103 |
Technology
|
Batteryless Smart Devices Closer To Reality (Batteryless IoT Devices
|
Science Daily
|
11/08/2018 |
103 |
Bit bucket
|
Scientists Theorize New Origin Story for Earth's Water (Origins of Water)
|
Science Daily
|
11/08/2018 |
103 |
Management
|
Trends That CIOs Should Pay Attention to In 2019 (Trends For CIOs)
|
Networks Asia
|
11/08/2018 |
103 |
Security
|
Five Key Considerations When Developing A Security Operations Center (SOC Considerations)
|
HelpNet Security
|
11/08/2018 |
103 |
Storage
|
NVMe: Four Key Trends Set to Drive Its Adoption in 2019 and Beyond (NVMe Trends)
|
DCIG
|
11/08/2018 |
103 |
Security
|
Why the CISSP Remains Relevant to Cybersecurity After 28 Years (Is CISSP Still Relevant)
|
Dark Reading
|
11/08/2018 |
103 |
Security
|
Why Password Management and Security Strategies Fall Short (Rethink Passwords & Strategies)
|
Dark Reading
|
11/08/2018 |
103 |
Data
|
Why Disaster Recovery Should Become A Thing of the Past…(DR is Passé)
|
Continuity Central
|
11/08/2018 |
103 |
Cloud
|
4 Mistakes Cloud Users Make when Purchasing Amazon Reserved Instances (Amazon Reserved Instances Mistakes)
|
Business 2 Community
|
11/08/2018 |
103 |
Operations
|
A 6-Step Approach For ITSM And ITOM To Work Better Together (Getting ITSM & ITOM Working Together, White Paper)
|
servicenow
|
11/08/2018 |
103 |
Compliance
|
Updates to PIPEDA, Canada's Own 'GDPR' (PIPEDA Canada's GDPR)
|
Risk Management Monitor
|
11/08/2018 |
103 |
Bit bucket
|
Why Your First Programming Language doesn't Really Matter (First Language Doesn't Matter)
|
TechRepublic
|
11/07/2018 |
104 |
Security
|
Humans vs Machines: AI and Machine Learning in Cyber Security (Artificial Intelligence Machine Learning)
|
Networks Asia
|
11/07/2018 |
104 |
Data
|
5 Best Practices For Third-Party Data Risk Management (Third-Party Risk Management)
|
Information Management
|
11/07/2018 |
104 |
Devops
|
DevOps and Security: How to Make Disjointed Security and DevOps Teams Work Effectively (DevOps Working With Security)
|
HelpNet Security
|
11/07/2018 |
104 |
Data
|
3 Leading AI Concerns for Insurers (Artificial Intelligence Machine Learning)
|
Digital Insurance
|
11/07/2018 |
104 |
Security
|
Keeping Your Business Safe: 5 Simple Ways to Provide Cybersecurity Solutions (Keeping Safe)
|
Business 2 Community
|
11/07/2018 |
104 |
Data
|
A Chilling Tale: Data and Vendors Gone Wrong (Vendors Gone Wrong)
|
Business 2 Community
|
11/07/2018 |
104 |
Management
|
Hire Great Talent, Train Them, Then Get Out of Their Way (Get Out Of Their Way, Hiring)
|
TLNT
|
11/06/2018 |
105 |
Security
|
How Automation Can Fill the Enterprise Cybersecurity Skills Gap (Automation Compliment Skills)
|
TechRepublic
|
11/06/2018 |
105 |
Technology
|
Coping With Errors In The Quantum Age (Correcting Quantum Errors)
|
Science Daily
|
11/06/2018 |
105 |
Storage
|
Physicists Create New, Simpler-than-Ever Quantum 'Hard Drive for Light' (Quantum Hard Drive)
|
Science Daily
|
11/06/2018 |
105 |
Cloud
|
The 'Born In the Cloud' Advantage Is Real, But Not Absolute (Cloud From the Start)
|
InfoWorld
|
11/06/2018 |
105 |
Cloud
|
How to Get Your Company to Handle the Cloud Truth (Cloud Culture Change)
|
InfoWorld
|
11/06/2018 |
105 |
Compliance
|
Post Implementation, GDPR Costs Higher than Expected (GDPR Higher Costs)
|
HelpNet Security
|
11/06/2018 |
105 |
Management
|
After the Breach: Tracing the 'Smoking Gun' (Find the Smoking Gun
|
Dark Reading
|
11/06/2018 |
105 |
Management
|
Five Winning Strategies for Attracting Top Talent (Attracting Talent, Hiring)
|
Washington Technology
|
11/06/2018 |
105 |
Cloud
|
Vendors Tell OMB to Keep It Simple in Cloud (Keeping The Cloud Simple)
|
FCW
|
11/06/2018 |
105 |
Storage
|
NVMe in the Data Centre (NVMe, White Paper)
|
architectingIT
|
11/06/2018 |
105 |
Devops
|
Time to Marry DevOps, Agile and Lean IT, Advocates Urge (Time To Get Hitched)
|
ZDnet
|
11/05/2018 |
106 |
Operations
|
Data Center Automation: 2 Acronyms You Should Know (Data Center Acronyms)
|
ZDnet
|
11/05/2018 |
106 |
Operations
|
Data Center Automation: 10 Vendors You should Know (10 Automation Vendors)
|
ZDnet
|
11/05/2018 |
106 |
Cloud
|
Cloud Computing will Virtually Replace Traditional Data Centers Within Three Years (95% in Three Years)
|
ZDnet
|
11/05/2018 |
106 |
Management
|
The True Value of a Project Management Professional
|
TechRepublic
|
11/05/2018 |
106 |
Data
|
5 Reasons Why Your Company Doesn't Take Analytics Seriously, and 5 Ways to Change That (Taking Analytics Seriously)
|
TechRepublic
|
11/05/2018 |
106 |
Connectivity
|
SD-WAN: The Inside Scoop from Real-World Deployments (Real World SD-WAN)
|
Network World
|
11/05/2018 |
106 |
Connectivity
|
What Is WPA3? And Some Gotchas to Watch Out for In This Wi-Fi Security Upgrade (WPA3 Gotchas, WPA2)
|
Network World
|
11/05/2018 |
106 |
Compliance
|
Not Ready for New Reporting Obligations Yet? Here's Five Things to Think About (Canada's Breach Law, Compliance)
|
IT World Canada
|
11/05/2018 |
106 |
Devops
|
Companies Implementing DevSecOps Address Vulnerabilities Faster Than Others (Faster Vulnerability Solutions, DevOps)
|
HelpNet Security
|
11/05/2018 |
106 |
Management
|
Top 10 Predictions and Key Drivers for the IT Industry for the Next Five Years (5 Year Predictions & Drivers)
|
HelpNet Security
|
11/05/2018 |
106 |
Technology
|
Most CIOs say IoT will become a Major Burden (IoT To Become Burden)
|
HelpNet Security
|
11/05/2018 |
106 |
Security
|
Worst Malware and Threat Actors of 2018 (Worst Threats of 2018)
|
Dark Reading
|
11/05/2018 |
106 |
Data
|
Embedded Analytics: Easier to Create, More Accurate Than Ever (Embedded Analytics)
|
SD Times
|
11/05/2018 |
106 |
Operations
|
Six Pillars Of Monitoring Automation (Automation Monitoring)
|
SD Times
|
11/05/2018 |
106 |
Security
|
11 Critical Visualizations for SD-WAN Success (Success With SD-WAN)
|
NetworkComputing
|
11/04/2018 |
107 |
Cloud
|
Is a Cloud-Native Strategy Right for You? (Correct Strategy)
|
NetworkComputing
|
11/04/2018 |
107 |
Management
|
5 Lessons from New Technology Leaders: Alex Benay, CIO of the Government of Canada (Leadership Lessons)
|
IT World Canada
|
11/04/2018 |
107 |
Security
|
Tackling Cybersecurity from the Inside Out (Looking From The Inside)
|
Dark Reading
|
11/04/2018 |
107 |
Security
|
Gaining Ground On The Cyber Attacker (White Paper, State of Resilience)
|
Accenture
|
11/04/2018 |
107 |
Security
|
Fighting Email Scammers By Taking A Different View. Literally (Fighting Scammers)
|
Homeland Security News
|
11/04/2018 |
107 |
Security
|
Pinpointing Risky Employee Behaviors Enables IT Leaders to Reduce Risk (Employee Risky Behaviors)
|
SC Magazine
|
11/02/2018 |
109 |
Connectivity
|
What to expect from Wi-Fi 6 in 2019 (Wi-Fi 6 Expectations, 802.11ax)
|
Network World
|
11/02/2018 |
109 |
Connectivity
|
What is WPA3? Wi-Fi Security Protocol Strengthens Connections (Strength From WPA3)
|
Network World
|
11/02/2018 |
109 |
Technology
|
What's New in IoT: Trends for 2019 (IoT Trends)
|
Networks Asia
|
11/02/2018 |
109 |
Security
|
Where Is the Consumer Outrage about Data Breaches? (No Outrage From Consumers)
|
Dark Reading
|
11/02/2018 |
109 |
Devops
|
DevOps Done Right: How To Break Down The IT Department Silos without Alienating Developers (Doing It Right)
|
ComputerWeekly
|
11/02/2018 |
109 |
Security
|
The Current State of Cybersecurity Shows Now Is the Time for Zero Trust (Don't Trust Anyone)
|
Business 2 Community
|
11/02/2018 |
109 |
Administration
|
Grasp Container Basics To Plan Enterprise Adoption (Basics of Containers)
|
Search IT Operations
|
11/02/2018 |
109 |
Technology
|
Present and Future of Quantum Computing (Quantum Future)
|
ToolBox
|
11/02/2018 |
109 |
Connectivity
|
Optical Networking Breakthrough Will Run Networks 100x Faster (Spiral Fiber 100 Times Faster)
|
Network World
|
11/01/2018 |
110 |
Technology
|
Your Wearable is Always Watching You
|
v3 co uk
|
10/31/2018 |
111 |
Connectivity
|
It's Been a Week Since Engineers Approved a New DNS Encryption Standard and Everyone is Still Yelling (RFC 8484; DoH, Encryption Standard Under Fire)
|
The Register
|
10/31/2018 |
111 |
Security
|
Catching all Threats - Known, Unknown, and Unknown Unknown - Before They Can Harm You (The Unknowns)
|
SC Magazine
|
10/31/2018 |
111 |
Technology
|
Integrated Quantum Chip Operations Possible, Tests Show (Quantum Possibilities)
|
Science Daily
|
10/31/2018 |
111 |
Connectivity
|
Users Tell What You Need to Know About SD-WAN (SD-WAN from Users)
|
Network World
|
10/31/2018 |
111 |
Operations
|
Infrastructure Monitoring Software: Can You Afford It? (White Paper, Monitoring the Infrastructure)
|
NetApp
|
10/31/2018 |
111 |
Security
|
SMEs Ignore Cyber Security at Their Peril (Ransomware, Ignore At Your Peril)
|
IT Web
|
10/31/2018 |
111 |
Data
|
15 Top Platforms for MDM And Data Governance (Top MDM Platforms)
|
Information Management
|
10/31/2018 |
111 |
Devops
|
The Case for MarDevSecOps (Security in DevOps)
|
Dark Reading
|
10/31/2018 |
111 |
Compliance
|
How Security, Compliance Standards Prevent OSI Layer Vulnerabilities
|
Search Compliance
|
10/31/2018 |
111 |
Data
|
10 Ways to Use Machine Learning and AI in ITSM to Improve Processes (ITSM, 10 Ways for Artificial Intelligence)
|
Search CIO
|
10/31/2018 |
111 |
Cloud
|
Gartner Symposium 2018: Enterprise Cloud Strategy Mistakes to Avoid (Avoiding Mistakes)
|
Search CIO
|
10/31/2018 |
111 |
Operations
|
Hyperconverged Infrastructure as a Catalyst for Change (White Paper, Hyperconverged Catalyst for Change)
|
Freeform Dynamics/VMware
|
10/31/2018 |
111 |
Technology
|
US Rubber Stamps Right to Repair: What It Means for IT, SMBs, and Tinkerers
|
TechRepublic
|
10/30/2018 |
112 |
Security
|
How the FBI Weighs Cybersecurity Risks Against Other Criminal Threats (FBI Risk Weighting)
|
TechRepublic
|
10/30/2018 |
112 |
Compliance
|
1 Billion Reasons Why Compliance Matters (GDPR, Non-Compliance Expensive)
|
SC Magazine
|
10/30/2018 |
112 |
Technology
|
IoT Security by Design (Security in IoT)
|
No Jitter
|
10/30/2018 |
112 |
Technology
|
What's the IoT Doing to Your Data Center? (Data Center IoT)
|
Network World
|
10/30/2018 |
112 |
Security
|
The Need for a Secure Content Sharing Ecosystem with IAM (Secure Sharing)
|
Networks Asia
|
10/30/2018 |
112 |
Cloud
|
Application Security - A Shared Responsibility in the Cloud?
|
NetworkComputing
|
10/30/2018 |
112 |
Cloud
|
How to Deal With Big Cloud Acquisitions Like IBM's Red Hat Purchase
|
InfoWorld
|
10/30/2018 |
112 |
Devops
|
A Wake-Up Call for Software Development Practices?(SW Wakeup Call)
|
Informationweek
|
10/30/2018 |
112 |
Cloud
|
Rethinking IT for Cloud Computing
|
Informationweek
|
10/30/2018 |
112 |
Data
|
21% of All Files in the Cloud Contain Sensitive Data (Cloud Holds Sensitive Data)
|
HelpNet Security
|
10/30/2018 |
112 |
Technology
|
IoT Now Top Internet Attack Target (White Paper, IoT Attacks)
|
F5
|
10/30/2018 |
112 |
Security
|
Stay Ahead of Security Threats: Focusing on Your High-Risk Assets (One Step Ahead)
|
Business 2 Community
|
10/30/2018 |
112 |
Bit bucket
|
Best Gifts: 20 Luxury Gadgets for the Billionaire Who Has Everything (Billionaire Gadgets)
|
ZDnet
|
10/29/2018 |
113 |
Connectivity
|
Scientists to Create 'Truly Unhackable' Network Based on Quantum Physics (Unhackable Quantum)
|
v3 co uk
|
10/29/2018 |
113 |
Connectivity
|
Why 5G (And Even 6G) Could Put Your Business at Risk for a Cyberattack (Cyberattack from 5G/6G)
|
TechRepublic
|
10/29/2018 |
113 |
Security
|
Dark Web: A Cheat Sheet for Business Professionals (Cheat Sheet for the Dark Web)
|
TechRepublic
|
10/29/2018 |
113 |
Technology
|
21 New Tech Jobs That Will Define the Next Decade of IT Work (Future Tech Jobs)
|
TechRepublic
|
10/29/2018 |
113 |
Connectivity
|
Meet the Professor Who Was There When the Internet Was Turned On (Day One of the Internet)
|
PC Magazine
|
10/29/2018 |
113 |
Security
|
How To Protect Your Organization from Insider Threats, The #1 Risk for Data Loss (Insiders Still #1)
|
HelpNet Security
|
10/29/2018 |
113 |
Data
|
Organizations Feel Ready to Put Highly Sensitive Data in the Cloud (Sensitive Data to the Cloud)
|
HelpNet Security
|
10/29/2018 |
113 |
Security
|
8 Threats that Could Sink Your Company (Threats That Can Sink You)
|
Dark Reading
|
10/29/2018 |
113 |
Connectivity
|
How 5G Aims to End Network Delays That Slow Everything Down (5G Ends Delays)
|
cnet
|
10/29/2018 |
113 |
Connectivity
|
Be Prepared for SD-WAN Implementation Complexities
|
Search SDN
|
10/29/2018 |
113 |
Security
|
The Changing Face of Cyber Attacks (White Paper, Cyber's Changing Face)
|
Neustar, Inc.
|
10/29/2018 |
113 |
Cloud
|
Containers At-Risk: A Review of 21,000 Cloud Environments (White Paper, Risky Containers)
|
Lacework, Inc.
|
10/29/2018 |
113 |
Security
|
Internet Security Threat Report (White Paper, Report on Threats)
|
Symantec
|
10/29/2018 |
113 |
Connectivity
|
Highest Recommended SIP Trunk Providers, Friend to Friend (Providers for SIP)
|
No Jitter
|
10/28/2018 |
114 |
Connectivity
|
Preparing Your Workplace for 5G (Get Ready for 5G)
|
NetworkComputing
|
10/28/2018 |
114 |
Connectivity
|
Preparing for the Intent-Based Network (Networks Based on Intent)
|
NetworkComputing
|
10/28/2018 |
114 |
Cloud
|
Cloudy with a Chance of Threats (Threats)
|
NetworkComputing
|
10/28/2018 |
114 |
Security
|
Recent Security Breaches Come at Great Cost--Including Jobs--Including Jobs (Breach Guillotines)
|
Data Center Knowledge
|
10/28/2018 |
114 |
Security
|
3 Keys to Reducing the Threat of Ransomware (Reducing Ransomware Threats)
|
Dark Reading
|
10/28/2018 |
114 |
Security
|
Cybersecurity Best Practices - In and Out of the Office (Office Best Practices)
|
Business 2 Community
|
10/28/2018 |
114 |
Management
|
3 Factors Marginalizing the Historical Role of the CISO (Marginalizing the CISO)
|
Business 2 Community
|
10/28/2018 |
114 |
Bit bucket
|
The Best Tech Gifts for 2018 (Gifts for Your Techie)
|
TechRepublic
|
10/27/2018 |
115 |
Data
|
Should a Robo-Car Run Over A Kid or a Grandad?
|
The Register
|
10/26/2018 |
116 |
Security
|
82% of Security Pros Fear Hackers Using AI to Attack Their Company (Artificial Intelligence, AI Being Used by Hackers)
|
TechRepublic
|
10/26/2018 |
116 |
Data
|
3 Steps to Improve The Quality of Your Organization's Data (Data Improvement)
|
TechRepublic
|
10/26/2018 |
116 |
Security
|
Six Tips to Stop Phishing Attacks (Phishing Stop Tips)
|
SC Magazine
|
10/26/2018 |
116 |
Compliance
|
The Privacy Professional: A Modern Day Renaissance Man (GDPR, Renaissance Man & Privacy)
|
SC Magazine
|
10/26/2018 |
116 |
Security
|
Bridging the Cybersecurity Skills Gap Through Artificial Intelligence (Skills Gap)
|
SC Magazine
|
10/26/2018 |
116 |
Technology
|
Spinning the Light: The World's Smallest Optical Gyroscope (Smallest Gyroscope)
|
Science Daily
|
10/26/2018 |
116 |
Data
|
Artificial Intelligence Controls Quantum Computers (Quantum Computers and AI)
|
Science Daily
|
10/26/2018 |
116 |
Technology
|
What's the IoT Doing to Your Data Center?
|
Network World
|
10/26/2018 |
116 |
Management
|
Top Data and Analytics Risks that Will Concern Audit Executives in 2019 (Auditor Concerns About Data)
|
HelpNet Security
|
10/26/2018 |
116 |
Cloud
|
Securing Serverless: Defend or Attack? (Best Defense)
|
Dark Reading
|
10/26/2018 |
116 |
Operations
|
10 Must-Have Skills for ITSM Pros (ITSM Skills)
|
CIO
|
10/26/2018 |
116 |
Cloud
|
Cloud Smart: Practical Considerations on Where To Focus (Smart Considerations)
|
GCN
|
10/26/2018 |
116 |
Bit bucket
|
Scientists Develop Cell-Sized Robots to Seek Out Disease While Floating In the Bloodstream
|
v3 co uk
|
10/25/2018 |
117 |
Operations
|
Edge Data Centers (White Paper)
|
TIA
|
10/25/2018 |
117 |
Bit bucket
|
20 Most Important Tech Inventions of the Past 100 Years
|
TechRepublic
|
10/25/2018 |
117 |
Technology
|
Quantum Computing: A Cheat Sheet
|
TechRepublic
|
10/25/2018 |
117 |
Connectivity
|
One Simple Change in Fiber Optics Could Boost Your Internet Speed by 100x
|
TechRepublic
|
10/25/2018 |
117 |
Cloud
|
Hybrid Cloud: A Cheat Sheet
|
TechRepublic
|
10/25/2018 |
117 |
Administration
|
How to Detect Hardware-Based Server Bugs
|
TechRepublic
|
10/25/2018 |
117 |
Connectivity
|
10 Things Your Next Firewall Must Do (White Paper)
|
Palo Alto Networks
|
10/25/2018 |
117 |
Operations
|
The Importance of Hyper-Availability for Critical Infrastructure
|
Networks Asia
|
10/25/2018 |
117 |
Management
|
Winning Board Presentations for CIOs
|
InformationWeek
|
10/25/2018 |
117 |
Management
|
Bridging the IT Talent Gap: Find Scarce Experts
|
Informationweek
|
10/25/2018 |
117 |
Security
|
Insiders are Still the Greatest Security Threat Facing Most Organizations
|
Information Management
|
10/25/2018 |
117 |
Management
|
AI, Cybersecurity Top CIO List of Most Disruptive Technologies (Artificial Intelligence)
|
Digital Insurance
|
10/25/2018 |
117 |
Storage
|
The State of Software-Defined Storage, Hyperconverged and Cloud Storage (White Paper)
|
DataCore Software
|
10/25/2018 |
117 |
Storage
|
Storage Availability, Vendor Lock-In Remain Pain Points for IT Pros
|
Channel Partners
|
10/25/2018 |
117 |
Operations
|
Software-Defined Data Center - Get The Most Out of Today's Infrastructure (White Paper)
|
IBM
|
10/25/2018 |
117 |
Security
|
The Five News Headlines You Don't Want to Be About YOUR Organization (White Paper)
|
Juniper Networks
|
10/25/2018 |
117 |
Connectivity
|
The Inmates Have Taken Over the Asylum: DNS Godfather Blasts DNS Over HTTPS Adoption (RFC 8484)
|
The Register
|
10/24/2018 |
118 |
Bit bucket
|
The 25 most Underappreciated Science Fiction/Fantasy Characters
|
TechRepublic
|
10/24/2018 |
118 |
Security
|
Why It's Pivotal to Relook Cybersecurity with a Security-First Approach
|
Networks Asia
|
10/24/2018 |
118 |
Data
|
Real-Time Social Media Location Data Used to Predict Crime
|
IT News
|
10/24/2018 |
118 |
Security
|
Giving CISOs The Tools to Measure and Improve Password Security
|
Information Management
|
10/24/2018 |
118 |
Management
|
Giving CISOs The Tools to Measure and Improve Password Security
|
Information Management
|
10/24/2018 |
118 |
Security
|
How Science can Fight Insider Threats
|
HelpNet Security
|
10/24/2018 |
118 |
Security
|
Good Times in Security Come When You Least Expect Them
|
Dark Reading
|
10/24/2018 |
118 |
Connectivity
|
With 5G, You Won't Just be Watching Video. It'll Be Watching You, Too
|
cnet
|
10/24/2018 |
118 |
Administration
|
Why It's Important to Assign User Rights
|
Business 2 Community
|
10/24/2018 |
118 |
Data
|
Do You Really Need Online Data Backups? (White Paper)
|
Enterprise Technology Services
|
10/24/2018 |
118 |
Technology
|
How Rants On Social Media Can Come Back to Haunt You
|
Science Daily
|
10/23/2018 |
119 |
Operations
|
Wave Energy to Power Undersea Data Centers
|
Network World
|
10/23/2018 |
119 |
Security
|
What's Luck Got To Do With Cybersecurity
|
Networks Asia
|
10/23/2018 |
119 |
Compliance
|
Privacy as a Business Practice (GDPR)
|
Networks Asia
|
10/23/2018 |
119 |
Cloud
|
The Forced March to Cloud Computing
|
InfoWorld
|
10/23/2018 |
119 |
Technology
|
The Coming Wave of Regulation over Facial Recognition
|
Informationweek
|
10/23/2018 |
119 |
Security
|
How to Make the CFO Your Best Cybersecurity Friend
|
HelpNet Security
|
10/23/2018 |
119 |
Management
|
10 Tech Predictions for 2019
|
Digital Insurance
|
10/23/2018 |
119 |
Security
|
Understanding SOCs' 4 Top Deficiencies
|
Dark Reading
|
10/23/2018 |
119 |
Security
|
Blockchain Developer Salaries Now Command As Much as $175K
|
ComputerWorld
|
10/23/2018 |
119 |
Technology
|
Congress Takes First Steps Toward Regulating Artificial Intelligence
|
GCN
|
10/23/2018 |
119 |
Data
|
Start The Long Journey To AI Gains Now, Or Risk Missing Out On The Benefits (Artificial Intelligence)
|
IT World Canada
|
10/22/2018 |
120 |
Connectivity
|
What is WiGig, and How is It Different from Wi-Fi 6?
|
How To Geek
|
10/22/2018 |
120 |
Management
|
Seven Key Digital Disruptions CIOs May not Seeing Coming
|
HelpNet Security
|
10/22/2018 |
120 |
Data
|
A Data Protection System Plus Management Creates Value, Risk
|
Search Data Backup
|
10/22/2018 |
120 |
Storage
|
How Do Secondary Storage and Primary Storage Differ?
|
Search Data Backup
|
10/22/2018 |
120 |
Security
|
When Cybersecurity Capabilities are Paid for, But Untapped
|
GCN
|
10/22/2018 |
120 |
Security
|
In Cybersecurity, the A.I. Debate is 'How', Not 'If' (Artificial Intelligence)
|
SC Magazine
|
10/20/2018 |
122 |
Connectivity
|
Roadmap for Quantum Internet Development
|
Science Daily
|
10/20/2018 |
122 |
Security
|
Computer Security: Preventing Attacks Made Possible by Meltdown/Spectre
|
Science Daily
|
10/20/2018 |
122 |
Storage
|
Tape vs. Disk Storage: Why isn't Tape Dead Yet?
|
Network World
|
10/20/2018 |
122 |
Operations
|
Uptime Institute Issues a Weather Warning for Data Centers
|
Network World
|
10/20/2018 |
122 |
Connectivity
|
What to Look for in a Network Monitoring Application
|
NetworkComputing
|
10/20/2018 |
122 |
Connectivity
|
The Network Automation Paradox: Why People are Key to Its Success
|
NetworkComputing
|
10/20/2018 |
122 |
Devops
|
Devops Is Mandatory for Multicloud Deployments
|
InfoWorld
|
10/20/2018 |
122 |
Cloud
|
Devops Is Mandatory for Multicloud Deployments
|
InfoWorld
|
10/20/2018 |
122 |
Data
|
How TiDB Combines OLTP and OLAP in a Distributed Database
|
InfoWorld
|
10/20/2018 |
122 |
Management
|
Amazon's HR Gaffe Demonstrates Important Points
|
InformationWeek
|
10/20/2018 |
122 |
Security
|
Weighing the Pros and Cons of Data Security Outsourcing
|
Information Management
|
10/20/2018 |
122 |
Data
|
Weighing the Pros and Cons of Data Security Outsourcing
|
Information Management
|
10/20/2018 |
122 |
Data
|
I'm Sorry, Dave: 9 Real Times AI Has Given Us the Creeps (Artificial Intelligence)
|
ZDnet
|
10/19/2018 |
123 |
Compliance
|
Ding Ding! Round Two: Second Annual Review for Transatlantic Data Flow Deal Privacy Shield
|
The Register
|
10/19/2018 |
123 |
Operations
|
20 Innovative Data Centers That Give Us A Glimpse Into the Future of Computing
|
TechRepublic
|
10/19/2018 |
123 |
Management
|
CIOs Watch Out: Here are 7 Disruptions You Might Not See Coming
|
TechRepublic
|
10/19/2018 |
123 |
Technology
|
First Proof of Quantum Computer Advantage
|
Science Daily
|
10/19/2018 |
123 |
Data
|
The Big Problem of Small Data: A New Approach
|
Science Daily
|
10/19/2018 |
123 |
Data
|
Conquering the Five Deadly Data Sins
|
Networks Asia
|
10/19/2018 |
123 |
Security
|
Australia's Encryption-Busting Bill Also after PINs, Passwords
|
IT News
|
10/19/2018 |
123 |
Connectivity
|
How 5G Pits Big Carriers and Government Against Small Towns
|
cnet
|
10/19/2018 |
123 |
Security
|
How to Protect Your Company from Getting Hacked
|
Business 2 Community
|
10/19/2018 |
123 |
Data
|
What 5 Skills Should a Disaster Recovery Team Leader Have?
|
Search Disaster Recovery
|
10/18/2018 |
124 |
Data
|
Inline Deduplication vs. Post-Processing: Data Dedupe Best Practices
|
Search Data Backup
|
10/18/2018 |
124 |
Data
|
Data Backup Planning: 10 Best Practices for Protection
|
Search Data Backup
|
10/18/2018 |
124 |
Bit bucket
|
Supermassive Black Holes and Supercomputers
|
Science Daily
|
10/17/2018 |
125 |
Cloud
|
Why Switch to the Cloud?
|
Networks Asia
|
10/17/2018 |
125 |
Management
|
10 Top Strategic Predictions for 2019
|
InformationWeek
|
10/17/2018 |
125 |
Cloud
|
Avoiding Reputational Risk When Moving To the Cloud
|
Data Center Dynamics
|
10/17/2018 |
125 |
Connectivity
|
5G is Almost a Reality. Here's What It'll Really Feel Like
|
cnet
|
10/17/2018 |
125 |
Storage
|
The Future of the Cloud Depends on Magnetic Tape
|
Bloomberg
|
10/17/2018 |
125 |
Cloud
|
The Future of the Cloud Depends on Magnetic Tape
|
Bloomberg
|
10/17/2018 |
125 |
Security
|
Prepping Your SIEM Architecture for the Future
|
Search Security
|
10/17/2018 |
125 |
Data
|
Can Common Sense Be Built into AI? (Artificial Intelligence)
|
GCN
|
10/17/2018 |
125 |
Management
|
Don't Wait For a Lawsuit to Close Your Pay Gaps
|
TLNT
|
10/16/2018 |
126 |
Security
|
How to Train Your Employees to Avoid Online Scams: 5 Tips
|
TechRepublic
|
10/16/2018 |
126 |
Technology
|
Here Are the 10 Top Tech Trends You Need to Understand Right Now
|
TechRepublic
|
10/16/2018 |
126 |
Cloud
|
What Is a Private Cloud? (and Some Things That It's Not)
|
Network World
|
10/16/2018 |
126 |
Data
|
Does China Have the Answer To Closing the AI Skills Gap? (Artificial Intelligence)
|
Networks Asia
|
10/16/2018 |
126 |
Cloud
|
Steel Yourself for the Cloud Hangover
|
InfoWorld
|
10/16/2018 |
126 |
Cloud
|
Solving the Cloud Infrastructure Misconfiguration Problem
|
HelpNet Security
|
10/16/2018 |
126 |
Technology
|
Spies Among Us: Tracking, IoT & the Truly Inside Threat
|
Dark Reading
|
10/16/2018 |
126 |
Security
|
Spies Among Us: Tracking, IoT & the Truly Inside Threat
|
Dark Reading
|
10/16/2018 |
126 |
Security
|
6 Reasons Why Employees Violate Security Policies
|
Dark Reading
|
10/16/2018 |
126 |
Security
|
Tackling Privileged-Access Security
|
GCN
|
10/16/2018 |
126 |
Technology
|
IoT Security: Follow These Rules to Protect Your Users from Hackers, Gadget Makers Told
|
ZDnet
|
10/15/2018 |
127 |
Bit bucket
|
The 51 Coolest Laptop Stickers of All Time
|
TechRepublic
|
10/15/2018 |
127 |
Connectivity
|
Security Vulnerabilities in Terahertz Data Links
|
Science Daily
|
10/15/2018 |
127 |
Technology
|
Lift Off for World-First Ultrasound Levitation that Bends Around Barriers
|
Science Daily
|
10/15/2018 |
127 |