Articles From 2014

Header
1: Data
Ten Huge Multi-Tenant Data Centers that Came Online in 2014
Published by: Data Center Knowledge
Publish Date: 12/31/2014 | Posted 1570 Days Ago
2: Bit bucket
3D Printing Medical Breakthroughs -- Including Dog Legs
Published by: ComputerWorld
Publish Date: 12/31/2014 | Posted 1570 Days Ago
3: Security
How Sony Used Old Tech to Function After Hack
Published by: CIO Today
Publish Date: 12/31/2014 | Posted 1570 Days Ago
4: Security
The Biggest Security Stories of 2014
Published by: Security InfoWatch
Publish Date: 12/30/2014 | Posted 1571 Days Ago
5: Management
5 Hyperscale Lessons for Mainstream Datacenters
Published by: InformationWeek
Publish Date: 12/30/2014 | Posted 1571 Days Ago
6: Bit bucket
Reclaim Your Schedule in 2015: 7 Tips
Published by: InformationWeek
Publish Date: 12/30/2014 | Posted 1571 Days Ago
7: Technology
IoT Market Growing Amid Privacy Concerns
Published by: CIO Today
Publish Date: 12/30/2014 | Posted 1571 Days Ago
8: Connectivity
Internet of Things Growing Despite Security Concerns
Published by: CIO Today
Publish Date: 12/30/2014 | Posted 1571 Days Ago
9: Security
8 Tips to Improve Cyber Security In the New Year
Published by: Network World
Publish Date: 12/29/2014 | Posted 1572 Days Ago
10: Cloud
Retailer Takes Control of Its Cloud
Published by: IT World
Publish Date: 12/29/2014 | Posted 1572 Days Ago
11: Data
Big Data Industry Predictions 2015
Published by: Insurance Networking
Publish Date: 12/29/2014 | Posted 1572 Days Ago
12: Management
New Data, Same Old Dumb Bosses: 3 Lessons
Published by: InformationWeek
Publish Date: 12/29/2014 | Posted 1572 Days Ago
13: Cloud
9 Cloud Trends For 2015
Published by: InformationWeek
Publish Date: 12/29/2014 | Posted 1572 Days Ago
14: Bit bucket
Mainframe Futures: Reading the Tea Leaves
Published by: Information Management
Publish Date: 12/29/2014 | Posted 1572 Days Ago
15: Bit bucket
A 2014 Lookback: Predictions vs. Reality
Published by: Dark Reading
Publish Date: 12/29/2014 | Posted 1572 Days Ago
16: Security
The Separation of Information Security & IT
Published by: Bank Systems & Technology
Publish Date: 12/29/2014 | Posted 1572 Days Ago
17: Management
25 Must-Reads for IT Leaders in 2015
Published by: Insurance Networking
Publish Date: 12/27/2014 | Posted 1574 Days Ago
18: Technology
12 Life-Changing Social Media Resolutions
Published by: ComputerWorld
Publish Date: 12/27/2014 | Posted 1574 Days Ago
19: Data
The World's Biggest Data Breaches, in One Interactive Chart
Published by: IT World
Publish Date: 12/26/2014 | Posted 1575 Days Ago
20: Connectivity
The Internet of Things, Explained
Published by: IT World
Publish Date: 12/26/2014 | Posted 1575 Days Ago
21: Data
How to Recruit, Retain Analytics Talent
Published by: Insurance Networking
Publish Date: 12/26/2014 | Posted 1575 Days Ago
22: Connectivity
Top 10 Social Network Blunders of 2014
Published by: InformationWeek
Publish Date: 12/26/2014 | Posted 1575 Days Ago
23: Cloud
Planning for the Future: Enterprise Cloud Trends in 2015
Published by: Data Center Knowledge
Publish Date: 12/26/2014 | Posted 1575 Days Ago
24: Bit bucket
Top 10 Tech Conspiracy Theories of All Time
Published by: ComputerWorld
Publish Date: 12/25/2014 | Posted 1576 Days Ago
25: Bit bucket
Bloopers, Breakdowns, and Bad Jobs: The IT Chronicles
Published by: InfoWorld
Publish Date: 12/24/2014 | Posted 1577 Days Ago
26: Data
The Future of Data Scientists
Published by: Information Management
Publish Date: 12/24/2014 | Posted 1577 Days Ago
27: Bit bucket
Why Digital Forensics in Incident Response Matter More Now
Published by: Dark Reading
Publish Date: 12/24/2014 | Posted 1577 Days Ago
28: Cloud
The 10 Biggest Cloud Outages of 2014
Published by: CRN
Publish Date: 12/24/2014 | Posted 1577 Days Ago
29: Technology
Court Reaffirms: Think Before you Email
Published by: ComputerWorld
Publish Date: 12/24/2014 | Posted 1577 Days Ago
30: Technology
Coke Cuts Voicemail: Sign of the Times, or Mistake?
Published by: No Jitter
Publish Date: 12/23/2014 | Posted 1578 Days Ago
31: Administration
Scaling Servers: A Cost Breakdown
Published by: NetworkComputing
Publish Date: 12/23/2014 | Posted 1578 Days Ago
32: Bit bucket
Computer Vision Finally Matches Primates' Ability
Published by: IT World
Publish Date: 12/23/2014 | Posted 1578 Days Ago
33: Security
4 positive predictions for security in 2015
Published by: InfoWorld
Publish Date: 12/23/2014 | Posted 1578 Days Ago
34: Data
Sports Analytics: The Extra Man
Published by: Information Management
Publish Date: 12/23/2014 | Posted 1578 Days Ago
35: Technology
Speech Recognition Technology Better than Human's Exists
Published by: Information Management
Publish Date: 12/23/2014 | Posted 1578 Days Ago
36: Security
What the Sony Breach Means for Security In 2015
Published by: CSO Online
Publish Date: 12/23/2014 | Posted 1578 Days Ago
37: Compliance
The 10 Biggest Storage Stories Of 2014
Published by: CRN
Publish Date: 12/23/2014 | Posted 1578 Days Ago
38: Bit bucket
Are Personality Assessments Effective Hiring Tools?
Published by: Network World
Publish Date: 12/22/2014 | Posted 1579 Days Ago
39: Management
5 Lessons To Help Security Pros Craft a New Year's Resolution
Published by: Network World
Publish Date: 12/22/2014 | Posted 1579 Days Ago
40: Bit bucket
2015's Most Ridiculous Tech Predictions
Published by: NetworkComputing
Publish Date: 12/22/2014 | Posted 1579 Days Ago
41: Data
5 Big Data Technology Predictions for 2015
Published by: CIO
Publish Date: 12/22/2014 | Posted 1579 Days Ago
42: Management
3 Reasons Why Company Leaders Should be Worried About Mobile Surveillance
Published by: Business 2 Community
Publish Date: 12/20/2014 | Posted 1581 Days Ago
43: Security
What We Know about North Korea's Cyberarmy
Published by: Network World
Publish Date: 12/19/2014 | Posted 1582 Days Ago
44: Bit bucket
10 Predictions for IT in 2015
Published by: Network World
Publish Date: 12/19/2014 | Posted 1582 Days Ago
45: Bit bucket
10 IT Roles to Target when Poaching Talent
Published by: Network World
Publish Date: 12/19/2014 | Posted 1582 Days Ago
46: Technology
It's Okay to Take a Breather from the Technology Maelstrom
Published by: Insurance Networking
Publish Date: 12/19/2014 | Posted 1582 Days Ago
47: Bit bucket
5 Pitfalls to Avoid When Running Your SOC
Published by: Dark Reading
Publish Date: 12/18/2014 | Posted 1583 Days Ago
48: Connectivity
Sponsored Link - DEAC Superfast Data Center Services Maximize One of the Fastest Internet Connections in the World
Published by: DEAC
Publish Date: 12/17/2014 | Posted 1584 Days Ago
49: Security
10 routes to IT job security
Published by: TechRepublic
Publish Date: 12/17/2014 | Posted 1584 Days Ago
50: Cloud
Do You Know the Laws that Govern Personal Information In the Cloud?
Published by: IT World
Publish Date: 12/15/2014 | Posted 1586 Days Ago
51: Bit bucket
Predictions for 2015
Published by: CSO Online
Publish Date: 12/15/2014 | Posted 1586 Days Ago
52: Bit bucket
9 Key Enterprise Tech Trends for 2015 And Beyond
Published by: InfoWorld
Publish Date: 12/01/2014 | Posted 1600 Days Ago
53: Management
8 Feel-Good Tales of Life In IT
Published by: InfoWorld
Publish Date: 11/26/2014 | Posted 1605 Days Ago
54: Security
3 Security Practices IoT will Disrupt
Published by: InfoWorld
Publish Date: 09/11/2014 | Posted 1682 Days Ago
55: Security
The 7 Deadly Sins of Startup Security
Published by: IT World
Publish Date: 09/10/2014 | Posted 1683 Days Ago
56: Connectivity
Making Sense of Net Neutrality
Published by: Security InfoWatch
Publish Date: 09/09/2014 | Posted 1684 Days Ago
57: Bit bucket
Why You Don't need Long, Complex Passwords
Published by: InfoWorld
Publish Date: 09/03/2014 | Posted 1690 Days Ago
58: Cloud
Shadow Cloud Services Pose a Growing Risk to Enterprises
Published by: InfoWorld
Publish Date: 08/25/2014 | Posted 1699 Days Ago
59: Management
To Poach or Not to Poach Talent? It's Just Unhttp://www.csoonline.com/article/2884205/security-leadership/8-areas-where-csos-and-cios-will-converge-in-2015.html?phint=newt%3Dcso_update&phint=idg_eid%3D8e883ce00dd91cc3ac7d464b86019bdf#slide2American If You Don't
Published by: TLNT
Publish Date: 08/14/2014 | Posted 1710 Days Ago
60: Management
5 Ways to Help Get Employees to Think More Strategically
Published by: TLNT
Publish Date: 07/03/2014 | Posted 1752 Days Ago
61: Management
Getting Outside the Box: The 5 Behaviors of Successful Leaders
Published by: TLNT
Publish Date: 06/10/2014 | Posted 1775 Days Ago
62: Bit bucket
7 Blowhard Bosses Bollix up IT
Published by: InfoWorld
Publish Date: 04/02/2014 | Posted 1844 Days Ago
63: Cloud
Cloud's Nightmare: A "Run on the Bank"
Published by: Network World
Publish Date: 03/20/2014 | Posted 1857 Days Ago
64: Operations
Realizing the Power of Small Data
Published by: InformationWeek
Publish Date: 03/20/2014 | Posted 1857 Days Ago
65: Bit bucket
5 Radical Ideas to Help You Find Focus at Work
Published by: Information Management
Publish Date: 03/20/2014 | Posted 1857 Days Ago
66: Technology
Technology and Expectations are Changing - Don't Ignore Support Requirements
Published by: Business 2 Community
Publish Date: 03/20/2014 | Posted 1857 Days Ago
67: Bit bucket
5 Tips for Getting a Handle on Information Growth
Published by: Business 2 Community
Publish Date: 03/20/2014 | Posted 1857 Days Ago
68: Administration
How 13 Programming Languages Got Their Names
Published by: Network World
Publish Date: 03/19/2014 | Posted 1858 Days Ago
69: Management
Shortage of Project Managers Sends Businesses Scrambling
Published by: Network World
Publish Date: 03/19/2014 | Posted 1858 Days Ago
70: Management
15 Great Skype Interview Tips
Published by: IT World
Publish Date: 03/19/2014 | Posted 1858 Days Ago
71: Cloud
There's No Future in On-Premises IT -- It's Time to Move to the Cloud
Published by: InfoWorld
Publish Date: 03/19/2014 | Posted 1858 Days Ago
72: Bit bucket
Metadata Poses Both Risks and Rewards
Published by: Dark Reading
Publish Date: 03/19/2014 | Posted 1858 Days Ago
73: Bit bucket
IBM Watson and Genome Center Join to Find Cancer Treatments
Published by: ComputerWorld
Publish Date: 03/19/2014 | Posted 1858 Days Ago
74: Management
CIOs to Rip Up Outsourcing Rule Book
Published by: ComputerWeekly
Publish Date: 03/19/2014 | Posted 1858 Days Ago
75: Management
The Digital CIO: How Digital Technology Will Change the Role of IT Leaders
Published by: ComputerWeekly
Publish Date: 03/19/2014 | Posted 1858 Days Ago
76: Management
A Papal Lesson on How to Be a Successful Leader by Being Yourself
Published by: TLNT
Publish Date: 03/18/2014 | Posted 1859 Days Ago
77: Bit bucket
WTF is ... the Multiverse?
Published by: The Register
Publish Date: 03/18/2014 | Posted 1859 Days Ago
78: Security
The Year of Encryption
Published by: Technology Review
Publish Date: 03/18/2014 | Posted 1859 Days Ago
79: Data
17 Steps to Implement a Public Sector Big Data Project
Published by: Network World
Publish Date: 03/18/2014 | Posted 1859 Days Ago
80: Bit bucket
BYOD is Fraught with Legal Peril, Audience Told
Published by: Network World
Publish Date: 03/18/2014 | Posted 1859 Days Ago
81: Cloud
Can Data Lakes Solve Cloud Security Challenges?
Published by: Network World
Publish Date: 03/18/2014 | Posted 1859 Days Ago
82: Security
Eight Cyber Security Tips I Learned from the Walking Dead
Published by: HelpNet Security
Publish Date: 03/18/2014 | Posted 1859 Days Ago
83: Security
Target Breach: Where the Weak Points Were
Published by: Dark Reading
Publish Date: 03/18/2014 | Posted 1859 Days Ago
84: Data
Many Organizations Don't Go Public with Data Breaches or Share Intel
Published by: Dark Reading
Publish Date: 03/18/2014 | Posted 1859 Days Ago
85: Bit bucket
Ambitious IT Pros Seek COO Role
Published by: ComputerWorld
Publish Date: 03/18/2014 | Posted 1859 Days Ago
86: Connectivity
8 Ways to Improve Wired Network Security
Published by: Network World
Publish Date: 03/17/2014 | Posted 1860 Days Ago
87: Bit bucket
Stupid User Tricks: The Most Embarrassing Flubs Yet
Published by: Network World
Publish Date: 03/17/2014 | Posted 1860 Days Ago
88: Management
4 Lessons CIOs Can Learn from the Target Breach
Published by: Network World
Publish Date: 03/17/2014 | Posted 1860 Days Ago
89: Security
Attorney General's New War On Encrypted Web Services
Published by: IT News Australia
Publish Date: 03/17/2014 | Posted 1860 Days Ago
90: Data
The Joy of Data Center Automation -- And Its Hidden Dangers
Published by: InfoWorld
Publish Date: 03/17/2014 | Posted 1860 Days Ago
91: Bit bucket
Considering SDN? Adopt Chaos Monkey
Published by: NetworkComputing
Publish Date: 03/17/2014 | Posted 1860 Days Ago
92: Management
7 Strategies for a Successful DLP Strategy
Published by: CSO Online
Publish Date: 03/17/2014 | Posted 1860 Days Ago
93: Data
Court Approves First-of-its-Kind Data Breach Settlement
Published by: ComputerWorld
Publish Date: 03/17/2014 | Posted 1860 Days Ago
94: Technology
NSA Can Track Every Email, But it Can't Find a Plane
Published by: ComputerWorld
Publish Date: 03/17/2014 | Posted 1860 Days Ago
95: Bit bucket
I Quit! 10 Things that Drove Me Out of IT
Published by: TechRepublic
Publish Date: 03/16/2014 | Posted 1861 Days Ago
96: Connectivity
Laser makes Internet Backbone Speeds Four-Times Faster
Published by: Network World
Publish Date: 03/16/2014 | Posted 1861 Days Ago
97: Administration
Unix: Networking Basics for the Beginner
Published by: IT World
Publish Date: 03/16/2014 | Posted 1861 Days Ago
98: Bit bucket
Ready for Your Electronic Tattoo?
Published by: ComputerWorld
Publish Date: 03/15/2014 | Posted 1862 Days Ago
99: Connectivity
Self-Driving Cars, Amazon, and Networking
Published by: Business 2 Community
Publish Date: 03/15/2014 | Posted 1862 Days Ago
100: Data
Big Data, Bioinformatics, and Blurring the Human-Robot Battle Lines
Published by: Business 2 Community
Publish Date: 03/15/2014 | Posted 1862 Days Ago
101: Cloud
How Clouds Are Making Sys Admins Extinct
Published by: The Register
Publish Date: 03/14/2014 | Posted 1863 Days Ago
102: Data
Define These Two Points before Choosing Your Big Data Approach
Published by: TechRepublic
Publish Date: 03/14/2014 | Posted 1863 Days Ago
103: Management
CIOs Destined to Be Kings of Customer Data
Published by: Network World
Publish Date: 03/14/2014 | Posted 1863 Days Ago
104: Bit bucket
Top 10 Worst Resume Terms
Published by: IT World
Publish Date: 03/14/2014 | Posted 1863 Days Ago
105: Cloud
The Top 3 Reasons to Fire Your Public Cloud Provider
Published by: InfoWorld
Publish Date: 03/14/2014 | Posted 1863 Days Ago
106: Data
Target Ignored Data Breach Alarms
Published by: InformationWeek
Publish Date: 03/14/2014 | Posted 1863 Days Ago
107: Security
Defense Department Adopts NIST Security Standards
Published by: InformationWeek
Publish Date: 03/14/2014 | Posted 1863 Days Ago
108: Compliance
Data Storage -- Then and Now
Published by: ComputerWorld
Publish Date: 03/14/2014 | Posted 1863 Days Ago
109: Bit bucket
Major Companies, Like Target, Often Fail to Act on Malware Alerts
Published by: ComputerWorld
Publish Date: 03/14/2014 | Posted 1863 Days Ago
110: Bit bucket
Tiny Heat-Sucker Helps Keep Moore's Law Going
Published by: The Register
Publish Date: 03/13/2014 | Posted 1864 Days Ago
111: Data
8 Ways Big Data and Analytics Will Change Sports
Published by: Network World
Publish Date: 03/13/2014 | Posted 1864 Days Ago
112: Bit bucket
11 Tips to Prepare for SDN
Published by: Network World
Publish Date: 03/13/2014 | Posted 1864 Days Ago
113: Compliance
Flashy, Storage-Happy Supercomputers Due in 2015
Published by: Network World
Publish Date: 03/13/2014 | Posted 1864 Days Ago
114: Cloud
Cloud Computing's Future: Bigger, with Fewer Options
Published by: InfoWorld
Publish Date: 03/13/2014 | Posted 1864 Days Ago
115: Bit bucket
The Web's Anniversary: 25 Websites from 25 Years Ago
Published by: ComputerWorld
Publish Date: 03/13/2014 | Posted 1864 Days Ago
116: Security
Everything You Know About Cyberwar is Wrong
Published by: Network World
Publish Date: 03/12/2014 | Posted 1865 Days Ago
117: Bit bucket
12 Unique Laptop Bags Mobile Pros will Love
Published by: IT World
Publish Date: 03/12/2014 | Posted 1865 Days Ago
118: Bit bucket
9 Lies that Programmers Tell Themselves
Published by: IT World
Publish Date: 03/12/2014 | Posted 1865 Days Ago
119: Data
Europe Approves new Data Protection Law
Published by: IT World
Publish Date: 03/12/2014 | Posted 1865 Days Ago
120: Bit bucket
Think Deleted Text Messages are Gone Forever? Think Again
Published by: IT World
Publish Date: 03/12/2014 | Posted 1865 Days Ago
121: Data
Return of the Chief Data Officer
Published by: IT World
Publish Date: 03/12/2014 | Posted 1865 Days Ago
122: Cloud
Agencies Going 'Cloud First' Face a Records Riddle
Published by: InformationWeek
Publish Date: 03/12/2014 | Posted 1865 Days Ago
123: Technology
Web Turns 25: 10 Graphics to See
Published by: InformationWeek
Publish Date: 03/12/2014 | Posted 1865 Days Ago
124: Data
Big Data Reaches Inflection Point
Published by: InformationWeek
Publish Date: 03/12/2014 | Posted 1865 Days Ago
125: Bit bucket
Who Owns the Data?
Published by: Information Management
Publish Date: 03/12/2014 | Posted 1865 Days Ago
126: Bit bucket
California Preparing for Self Driving Cars by 2015
Published by: Government Technology
Publish Date: 03/12/2014 | Posted 1865 Days Ago
127: Connectivity
10 Predictions for the Future of the Internet
Published by: CRN
Publish Date: 03/12/2014 | Posted 1865 Days Ago
128: Bit bucket
US Energy Dept. Deals $10M to Ride Ocean Wave Energy
Published by: Network World
Publish Date: 03/11/2014 | Posted 1866 Days Ago
129: Cloud
Without Security, Clouds can't Reign
Published by: HelpNet Security
Publish Date: 03/11/2014 | Posted 1866 Days Ago
130: Cloud
Security Pros: 5 Ways We're Being Shut Out of the Cloud Discussion
Published by: CRN
Publish Date: 03/11/2014 | Posted 1866 Days Ago
131: Security
Data Breach Disclosures: 'Nightmare Patchwork'
Published by: CIO Today
Publish Date: 03/11/2014 | Posted 1866 Days Ago
132: Connectivity
Navy Network Hack has Valuable Lessons for Companies
Published by: Network World
Publish Date: 03/10/2014 | Posted 1867 Days Ago
133: Connectivity
Simply Put: How Does Certificate-Based Authentication Work?
Published by: Network World
Publish Date: 03/10/2014 | Posted 1867 Days Ago
134: Connectivity
IPv6 Could Open Networks Up to Zero-Day Attacks
Published by: IT World
Publish Date: 03/10/2014 | Posted 1867 Days Ago
135: Bit bucket
The Future is Here - And it's Biometric
Published by: IT Web
Publish Date: 03/10/2014 | Posted 1867 Days Ago
136: Data
Inside Facebook's 'IKEA-Style' Data Centre Build
Published by: IT News Australia
Publish Date: 03/10/2014 | Posted 1867 Days Ago
137: Bit bucket
Hey Verizon, We're Not as Stupid as You Think We Are
Published by: InfoWorld
Publish Date: 03/10/2014 | Posted 1867 Days Ago
138: Security
What Hollywood Teaches Us about Cybersecurity
Published by: Business 2 Community
Publish Date: 03/10/2014 | Posted 1867 Days Ago
139: Security
Cybersecurity not Just an IT Problem Anymore
Published by: Bank Systems & Technology
Publish Date: 03/10/2014 | Posted 1867 Days Ago
140: Administration
UNIX: Pranks that Sys Admins Play
Published by: IT World
Publish Date: 03/09/2014 | Posted 1867 Days Ago
141: Security
Ten Recommendations for Security Awareness Programs
Published by: Government Technology
Publish Date: 03/09/2014 | Posted 1867 Days Ago
142: Bit bucket
How to Protect Against Attacks Via Your Third-Party Vendors
Published by: Dark Reading
Publish Date: 03/09/2014 | Posted 1867 Days Ago
143: Bit bucket
Bugger the Jetpack, Where's My 21st-Century Psion?
Published by: The Register
Publish Date: 03/07/2014 | Posted 1869 Days Ago
144: Data
Focus on Fundamentals to Reduce Data Breaches, Expert Advises
Published by: Network World
Publish Date: 03/07/2014 | Posted 1869 Days Ago
145: Security
Encrypted communications take center stage
Published by: Network World
Publish Date: 03/07/2014 | Posted 1869 Days Ago
146: Security
What CISOs Can do About the Cybersecurity Skills Shortage
Published by: Network World
Publish Date: 03/07/2014 | Posted 1869 Days Ago
147: Bit bucket
European IT Pros Reveal Top Reasons to Monitor Privileged Users
Published by: HelpNet Security
Publish Date: 03/07/2014 | Posted 1869 Days Ago
148: Cloud
True sense of private cloud
Published by: InformationWeek
Publish Date: 03/07/2014 | Posted 1869 Days Ago
149: Bit bucket
4 Signs You're Being Digitally Disrupted
Published by: InformationWeek
Publish Date: 03/07/2014 | Posted 1869 Days Ago
150: Management
Building a Social Business: 10 Questions
Published by: InformationWeek
Publish Date: 03/07/2014 | Posted 1869 Days Ago
151: Data
Defining Big Data
Published by: Information Management
Publish Date: 03/07/2014 | Posted 1869 Days Ago
152: Management
Target Exec's Departure Puts Spotlight on CIOs
Published by: CIO Today
Publish Date: 03/07/2014 | Posted 1869 Days Ago
153: Bit bucket
Monopoly Isn't Just a Board Game
Published by: Business 2 Community
Publish Date: 03/07/2014 | Posted 1869 Days Ago
154: Compliance
5 Trends Disrupting the Storage Industry in 2014
Published by: Business 2 Community
Publish Date: 03/07/2014 | Posted 1869 Days Ago
155: Bit bucket
Happy 75th birthday, Adam Osborne
Published by: The Register
Publish Date: 03/06/2014 | Posted 1870 Days Ago
156: Bit bucket
Trust Issue Looms Large for Tech Companies Capitalizing on Personal Data
Published by: Network World
Publish Date: 03/06/2014 | Posted 1870 Days Ago
157: Bit bucket
At Goldman Sachs SDN Is Deja Vu All Over Again
Published by: Network World
Publish Date: 03/06/2014 | Posted 1870 Days Ago
158: Bit bucket
Five Things to Know About Malware Before Driving it Out
Published by: Network World
Publish Date: 03/06/2014 | Posted 1870 Days Ago
159: Data
US School Offers First-of-a-Kind Graduate Degree in Data Center Engineering
Published by: Network World
Publish Date: 03/06/2014 | Posted 1870 Days Ago
160: Connectivity
Take Back the Network
Published by: Network World
Publish Date: 03/06/2014 | Posted 1870 Days Ago
161: Management
Target CIO Resignation Puts Retail CIOs On Alert
Published by: IT World
Publish Date: 03/06/2014 | Posted 1870 Days Ago
162: Bit bucket
10 Questions on the Mt. Gox Implosion
Published by: IT World
Publish Date: 03/06/2014 | Posted 1870 Days Ago
163: Bit bucket
Railroads, Superhighways, and the Fight for Fair Access
Published by: InfoWorld
Publish Date: 03/06/2014 | Posted 1870 Days Ago
164: Cloud
7 Truths About Data in the Cloud
Published by: InfoWorld
Publish Date: 03/06/2014 | Posted 1870 Days Ago
165: Bit bucket
Do You Have a Future In IT?
Published by: InformationWeek
Publish Date: 03/06/2014 | Posted 1870 Days Ago
166: Bit bucket
Breaking the Cycle of Legacy IT Investment
Published by: InformationWeek
Publish Date: 03/06/2014 | Posted 1870 Days Ago
167: Security
9 Security Trends to Keep an Eye On
Published by: CRN
Publish Date: 03/06/2014 | Posted 1870 Days Ago
168: Security
Defining How a No-Holds-Barred Russia-Ukraine Cyberwar Would Play Out
Published by: ComputerWorld
Publish Date: 03/06/2014 | Posted 1870 Days Ago
169: Bit bucket
Connected Cars For Safer Roads...Or Is It Too Much?
Published by: Business 2 Community
Publish Date: 03/06/2014 | Posted 1870 Days Ago
170: Cloud
Tips to Optimize BYOD Payoffs With Cloud Technology
Published by: Business 2 Community
Publish Date: 03/06/2014 | Posted 1870 Days Ago
171: Bit bucket
The Dark Side of 3D Printing: 10 Things to Watch
Published by: TechRepublic
Publish Date: 03/05/2014 | Posted 1871 Days Ago
172: Bit bucket
7 Historical Decisions that Continue to Pain Programmers
Published by: Network World
Publish Date: 03/05/2014 | Posted 1871 Days Ago
173: Bit bucket
SDNs Move from Theory to Reality
Published by: Network World
Publish Date: 03/05/2014 | Posted 1871 Days Ago
174: Connectivity
Network Firewalls aren't Dead Yet
Published by: Network World
Publish Date: 03/05/2014 | Posted 1871 Days Ago
175: Cloud
Inside Cisco's private cloud
Published by: Network World
Publish Date: 03/05/2014 | Posted 1871 Days Ago
176: Management
CIOs Battle Worker Apathy Towards Lost or Stolen Mobile Phone
Published by: Network World
Publish Date: 03/05/2014 | Posted 1871 Days Ago
177: Operations
73% Of Companies are Unprepared for Disaster Recovery
Published by: HelpNet Security
Publish Date: 03/05/2014 | Posted 1871 Days Ago
178: Bit bucket
Tracking with Metadata: It's Not All Bad
Published by: IT World
Publish Date: 03/05/2014 | Posted 1871 Days Ago
179: Bit bucket
How to be an Effective Listener
Published by: Business 2 Community
Publish Date: 03/05/2014 | Posted 1871 Days Ago
180: Cloud
Beware the Perils Of Dealing with a 'Nested Cloud' Solution
Published by: TechRepublic
Publish Date: 03/04/2014 | Posted 1872 Days Ago
181: Security
The Risk of Offshoring Security
Published by: Network World
Publish Date: 03/04/2014 | Posted 1872 Days Ago
182: Bit bucket
12 Terrific Techie TED Talks
Published by: IT World
Publish Date: 03/04/2014 | Posted 1872 Days Ago
183: Bit bucket
How to Build Trust as a New IT Executive
Published by: IT World
Publish Date: 03/04/2014 | Posted 1872 Days Ago
184: Data
Big Data: Ready for Takeoff?
Published by: Insurance & Technology
Publish Date: 03/04/2014 | Posted 1872 Days Ago
185: Security
Everything I Know About Computer Security I Learned in Kindergarten
Published by: InfoWorld
Publish Date: 03/04/2014 | Posted 1872 Days Ago
186: Bit bucket
What Disney World Teaches Us About Mobile Payments
Published by: InfoWorld
Publish Date: 03/04/2014 | Posted 1872 Days Ago
187: Data
IBM Watson's Impressive Healthcare Analytics Capabilities Continue to Evolve
Published by: TechRepublic
Publish Date: 03/03/2014 | Posted 1873 Days Ago
188: Bit bucket
10 Attempts to Reinvent the World that Flopped
Published by: Network World
Publish Date: 03/03/2014 | Posted 1873 Days Ago
189: Bit bucket
So You Want to Adopt SDN: Where do You Start?
Published by: Network World
Publish Date: 03/03/2014 | Posted 1873 Days Ago
190: Bit bucket
IPv6: Sweet Spots of Adoption
Published by: NetworkComputing
Publish Date: 03/03/2014 | Posted 1873 Days Ago
191: Bit bucket
Amsterdam's 3D-Printed Canal House
Published by: IT World
Publish Date: 03/03/2014 | Posted 1873 Days Ago
192: Technology
What Employers Look for When they Check Social Media
Published by: IT World
Publish Date: 03/03/2014 | Posted 1873 Days Ago
193: Connectivity
The Simple, Sensible -- And Impossible -- Fix for the Internet In the USA
Published by: InfoWorld
Publish Date: 03/03/2014 | Posted 1873 Days Ago
194: Technology
Wearables at Work: Hello Big Brother?
Published by: InformationWeek
Publish Date: 03/03/2014 | Posted 1873 Days Ago
195: Bit bucket
Make BYOD Work: 9 Key Considerations
Published by: InformationWeek
Publish Date: 03/03/2014 | Posted 1873 Days Ago
196: Cloud
9 Worst Cloud Security Threats
Published by: InformationWeek
Publish Date: 03/03/2014 | Posted 1873 Days Ago
197: Data
In-Memory Databases: Do You Need the Speed?
Published by: InformationWeek
Publish Date: 03/03/2014 | Posted 1873 Days Ago
198: Management
Information Management: A Love Triangle
Published by: Information Management
Publish Date: 03/03/2014 | Posted 1873 Days Ago
199: Security
NIST's Voluntary Cybersecurity Framework May be Regarded as De Facto Mandatory
Published by: Homeland Security News
Publish Date: 03/03/2014 | Posted 1873 Days Ago
200: Bit bucket
Tablets: Not Mobile Enough or Productive Enough for Many Professionals
Published by: ZDnet
Publish Date: 03/02/2014 | Posted 1874 Days Ago
201: Bit bucket
Ethernet Boffins Get Ready to Kick Off 400G Development
Published by: The Register
Publish Date: 03/02/2014 | Posted 1874 Days Ago
202: Administration
UNIX: Making Better Use of the Find Command
Published by: IT World
Publish Date: 03/01/2014 | Posted 1875 Days Ago
203: Bit bucket
Secure Smartphones are Nice, but Not Enough
Published by: ComputerWorld
Publish Date: 03/01/2014 | Posted 1875 Days Ago
204: Cloud
HSBC Chief Fears IT Leaders will Face Jail for Cloud Breaches
Published by: v3 co uk
Publish Date: 02/28/2014 | Posted 1876 Days Ago
205: Security
Six Things Companies do that Thwart Their IT Security Efforts
Published by: Network World
Publish Date: 02/28/2014 | Posted 1876 Days Ago
206: Security
Is SDN Your Next Security Nightmare?
Published by: Network World
Publish Date: 02/28/2014 | Posted 1876 Days Ago
207: Connectivity
Today's Network Security Challenges: No Easy Answers
Published by: NetworkComputing
Publish Date: 02/28/2014 | Posted 1876 Days Ago
208: Bit bucket
Everyone's Doing It, But is It Legal?
Published by: Wall Street & Technology
Publish Date: 02/27/2014 | Posted 1877 Days Ago
209: Cloud
Cloud Security Concerns are Overblown, Experts Say
Published by: Network World
Publish Date: 02/27/2014 | Posted 1877 Days Ago
210: Bit bucket
FBI Director Comey: People Must Question Government Authority
Published by: CRN
Publish Date: 02/27/2014 | Posted 1877 Days Ago
211: Data
5 Questions You Need to Answer About Your DR Plan
Published by: Business 2 Community
Publish Date: 02/27/2014 | Posted 1877 Days Ago
212: Technology
How to Craft a Legal Social Media Policy for Employees
Published by: Bank Systems & Technology
Publish Date: 02/27/2014 | Posted 1877 Days Ago
213: Connectivity
13 of Today's Coolest Network Research Projects
Published by: Network World
Publish Date: 02/26/2014 | Posted 1878 Days Ago
214: Bit bucket
High-Profile US National Labs Team to Build 200 Petaflop Supercomputers
Published by: Network World
Publish Date: 02/26/2014 | Posted 1878 Days Ago
215: Bit bucket
People are Not Your Biggest Asset
Published by: IT World Canada
Publish Date: 02/26/2014 | Posted 1878 Days Ago
216: Cloud
Cloud Service Providers Fight Back, Challenge NSA
Published by: InfoWorld
Publish Date: 02/26/2014 | Posted 1878 Days Ago
217: Bit bucket
What You Need to Know About 3D Printers for Today And Tomorrow
Published by: InfoWorld
Publish Date: 02/26/2014 | Posted 1878 Days Ago
218: Data
Big Data Oscar Picks
Published by: InformationWeek
Publish Date: 02/26/2014 | Posted 1878 Days Ago
219: Security
Juniper Security Chief Takes Swipe at Security Apathy
Published by: Dark Reading
Publish Date: 02/26/2014 | Posted 1878 Days Ago
220: Compliance
Compliance is Not Hard
Published by: Dark Reading
Publish Date: 02/26/2014 | Posted 1878 Days Ago
221: Bit bucket
Why CYOD is Hotter than BYOD
Published by: Business 2 Community
Publish Date: 02/26/2014 | Posted 1878 Days Ago
222: Technology
7 Hidden Dangers of Wearable Computers
Published by: Network World
Publish Date: 02/25/2014 | Posted 1879 Days Ago
223: Security
Will Software Eat the Security Industry?
Published by: Network World
Publish Date: 02/25/2014 | Posted 1879 Days Ago
224: Data
NOAA Wants to Turn Its Ocean of Data Into Jobs
Published by: ComputerWorld
Publish Date: 02/25/2014 | Posted 1879 Days Ago
225: Technology
Robot Challenges Top German Player at Ping-Pong
Published by: The Register
Publish Date: 02/24/2014 | Posted 1880 Days Ago
226: Cloud
How IT Can Establish Better Cloud Control
Published by: Network World
Publish Date: 02/24/2014 | Posted 1880 Days Ago
227: Bit bucket
DARPA Wants to Scrub Scourge of Counterfeit Computer Gear
Published by: Network World
Publish Date: 02/24/2014 | Posted 1880 Days Ago
228: Cloud
Data Protection in the Cloud: The Basics
Published by: NetworkComputing
Publish Date: 02/24/2014 | Posted 1880 Days Ago
229: Bit bucket
The Mobile Spy in Your Pocket
Published by: InfoWorld
Publish Date: 02/24/2014 | Posted 1880 Days Ago
230: Bit bucket
To Build the Best Defense, Know Which Attack is Which
Published by: InfoWorld
Publish Date: 02/24/2014 | Posted 1880 Days Ago
231: Management
6 Lessons Learned About the Scariest Security Threats
Published by: InfoWorld
Publish Date: 02/24/2014 | Posted 1880 Days Ago
232: Bit bucket
The Broadband Barbarians Will Soon Control the Gates
Published by: InfoWorld
Publish Date: 02/24/2014 | Posted 1880 Days Ago
233: Data
Why Big Data in the enterprise is mostly lip service
Published by: InformationWeek
Publish Date: 02/24/2014 | Posted 1880 Days Ago
234: Cloud
How I Secure My Personal Cloud
Published by: InformationWeek
Publish Date: 02/24/2014 | Posted 1880 Days Ago
235: Bit bucket
From Burgers to Buildings: 10 Things You Didn't Know 3D Printers Could Make
Published by: ComputerWorld
Publish Date: 02/24/2014 | Posted 1880 Days Ago
236: Security
How to Test the Security Savvy of Your Staff
Published by: ComputerWorld
Publish Date: 02/24/2014 | Posted 1880 Days Ago
237: Bit bucket
5 Signs It's Time to Ditch Your IT Hardware
Published by: Business 2 Community
Publish Date: 02/24/2014 | Posted 1880 Days Ago
238: Bit bucket
Poorly Managed SSH Keys Pose Serious Risks for Most Companies
Published by: CSO Online
Publish Date: 02/22/2014 | Posted 1882 Days Ago
239: Cloud
The Mainframe Evolves Into a New Beast in the Cloud Era
Published by: TechRepublic
Publish Date: 02/21/2014 | Posted 1883 Days Ago
240: Data
Master the Mechanics of Facilitating a Decision with Your Data Science Team
Published by: TechRepublic
Publish Date: 02/21/2014 | Posted 1883 Days Ago
241: Bit bucket
Techiest U.S. Postage Stamps of All Time
Published by: Network World
Publish Date: 02/21/2014 | Posted 1883 Days Ago
242: Bit bucket
Beware of Employees' Cheap Android Phones
Published by: Network World
Publish Date: 02/21/2014 | Posted 1883 Days Ago
243: Bit bucket
The Evolution of the Ethernet Switch
Published by: NetworkComputing
Publish Date: 02/21/2014 | Posted 1883 Days Ago
244: Management
8 Tips to Deal with Liability When Outsourcing to Multiple IT Vendors
Published by: IT World
Publish Date: 02/21/2014 | Posted 1883 Days Ago
245: Data
Weapons of Mass Data Destruction
Published by: IT Pro
Publish Date: 02/21/2014 | Posted 1883 Days Ago
246: Data
Thirst for Better Data Analysis Drives Demand for Data Architecture Skills
Published by: InfoWorld
Publish Date: 02/21/2014 | Posted 1883 Days Ago
247: Security
Is the Hypervisor Security's Goldilocks Zone?
Published by: Dark Reading
Publish Date: 02/21/2014 | Posted 1883 Days Ago
248: Data
Three Essential Steps to a Software Defined Data Center
Published by: Network World
Publish Date: 02/20/2014 | Posted 1884 Days Ago
249: Bit bucket
Situation Normal, All Farked Up
Published by: Network World
Publish Date: 02/20/2014 | Posted 1884 Days Ago
250: Data
Trust Me: Big Data is a Huge Security Risk
Published by: InfoWorld
Publish Date: 02/20/2014 | Posted 1884 Days Ago
251: Bit bucket
When BYOD Equals Bring Your Own Malware
Published by: InformationWeek
Publish Date: 02/20/2014 | Posted 1884 Days Ago
252: Connectivity
FCC: We're Not Done with Net Neutrality
Published by: InformationWeek
Publish Date: 02/20/2014 | Posted 1884 Days Ago
253: Bit bucket
Companies That Go All-In with SaaS Can Save Big
Published by: ComputerWorld
Publish Date: 02/20/2014 | Posted 1884 Days Ago
254: Management
Don't Make the Mistake of Thinking the CIO is Irrelevant
Published by: TechRepublic
Publish Date: 02/19/2014 | Posted 1885 Days Ago
255: Bit bucket
3D Printing: 10 Factors Still Holding it Back
Published by: TechRepublic
Publish Date: 02/19/2014 | Posted 1885 Days Ago
256: Bit bucket
Time to Drop Unnecessary Admin Privileges
Published by: Network World
Publish Date: 02/19/2014 | Posted 1885 Days Ago
257: Connectivity
Building an Information Security Policy Part 1: Network Devices
Published by: NetworkComputing
Publish Date: 02/19/2014 | Posted 1885 Days Ago
258: Bit bucket
Parsing Google's Glass Etiquette: What Those Do's and Don'ts Really Mean
Published by: IT World
Publish Date: 02/19/2014 | Posted 1885 Days Ago
259: Bit bucket
5 Tactics To Help Triage Patching
Published by: Dark Reading
Publish Date: 02/19/2014 | Posted 1885 Days Ago
260: Data
Pulling the Reins on Data Breach Costs
Published by: CSO Online
Publish Date: 02/19/2014 | Posted 1885 Days Ago
261: Compliance
The Surprise Power Hog for Mobile Storage: Software
Published by: ComputerWorld
Publish Date: 02/19/2014 | Posted 1885 Days Ago
262: Cloud
California Fights Drought with Big Data, Cloud Computing
Published by: ComputerWorld
Publish Date: 02/19/2014 | Posted 1885 Days Ago
263: Connectivity
SDN, Network Packaging, and Separation of Control and Forwarding
Published by: Business 2 Community
Publish Date: 02/19/2014 | Posted 1885 Days Ago
264: Security
Why Security Pros Should Care about Bitcoin's Troubles
Published by: Network World
Publish Date: 02/18/2014 | Posted 1886 Days Ago
265: Bit bucket
The Erosion of IT's Middle Class
Published by: Network World
Publish Date: 02/18/2014 | Posted 1886 Days Ago
266: Bit bucket
Five Tips on Fighting DDoS Attacks
Published by: IT World Canada
Publish Date: 02/18/2014 | Posted 1886 Days Ago
267: Connectivity
How to Disinfect a Compromised Network
Published by: InfoWorld
Publish Date: 02/18/2014 | Posted 1886 Days Ago
268: Bit bucket
Whatever Happened to the IPv4 Address Crisis?
Published by: InfoWorld
Publish Date: 02/18/2014 | Posted 1886 Days Ago
269: Cloud
5 Tips for Smarter Collaboration in a Mobile And Cloud World
Published by: InfoWorld
Publish Date: 02/18/2014 | Posted 1886 Days Ago
270: Bit bucket
Why Data-as-a-Service Has Taken off So Fast
Published by: InfoWorld
Publish Date: 02/18/2014 | Posted 1886 Days Ago
271: Bit bucket
Why Data-as-a-Service Has Taken Off so Fast
Published by: InfoWorld
Publish Date: 02/18/2014 | Posted 1886 Days Ago
272: Data
Big Data Platform Comparisons: 3 Key Points
Published by: InformationWeek
Publish Date: 02/18/2014 | Posted 1886 Days Ago
273: Management
How Sandy Changed Social Media Strategies in New York City
Published by: Government Technology
Publish Date: 02/18/2014 | Posted 1886 Days Ago
274: Technology
Geographical Passwords as a Solution to the Password Problem
Published by: HelpNet Security
Publish Date: 02/17/2014 | Posted 1887 Days Ago
275: Management
11 Project Management Tips for Setting and Managing Expectations
Published by: IT World
Publish Date: 02/17/2014 | Posted 1887 Days Ago
276: Management
Are CIOs Losing Power?
Published by: IT World
Publish Date: 02/17/2014 | Posted 1887 Days Ago
277: Bit bucket
Is it Really Possible to Achieve a Single Version of Truth?
Published by: Information Management
Publish Date: 02/17/2014 | Posted 1887 Days Ago
278: Security
Why Security Should Monitor Social Media to Prevent Violence
Published by: CSO Online
Publish Date: 02/17/2014 | Posted 1887 Days Ago
279: Bit bucket
5 Questions to Ask an IT Support Services Company
Published by: Business 2 Community
Publish Date: 02/17/2014 | Posted 1887 Days Ago
280: Technology
Wearable Computers Could Act Like a Sixth Sense
Published by: ComputerWorld
Publish Date: 02/15/2014 | Posted 1889 Days Ago
281: Bit bucket
More Retailers -- and Ballparks -- Take a Swing at Location-Based Data
Published by: ComputerWorld
Publish Date: 02/15/2014 | Posted 1889 Days Ago
282: Bit bucket
Unused IT Equipment, What Do You Do?
Published by: Business 2 Community
Publish Date: 02/15/2014 | Posted 1889 Days Ago
283: Cloud
Prevent "Cloud Spare": Professional Services in the Cloud Era
Published by: Business 2 Community
Publish Date: 02/15/2014 | Posted 1889 Days Ago
284: Security
Consider A Unidirectional Security Gateway When a Firewall Just Isn't Strong Enough
Published by: Network World
Publish Date: 02/14/2014 | Posted 1890 Days Ago
285: Security
Experts Question Security Used in Target Breach
Published by: Network World
Publish Date: 02/14/2014 | Posted 1890 Days Ago
286: Bit bucket
Are We Too Stupid to Let Watson Make Us Smarter?
Published by: Network World
Publish Date: 02/14/2014 | Posted 1890 Days Ago
287: Connectivity
Can the FIDO Alliance Help Obsolete User Name/Password Authentication?
Published by: Network World
Publish Date: 02/14/2014 | Posted 1890 Days Ago
288: Management
Most Organizations are Unable to Resolve a Cyber Attack
Published by: HelpNet Security
Publish Date: 02/14/2014 | Posted 1890 Days Ago
289: Cloud
3 CIO No-No's When Moving to the Cloud
Published by: InfoWorld
Publish Date: 02/14/2014 | Posted 1890 Days Ago
290: Cloud
Preventing Computer Disasters In The Age Of The Cloud
Published by: Business 2 Community
Publish Date: 02/14/2014 | Posted 1890 Days Ago
291: Bit bucket
Fibre Channel Industry Association Extends Roadmap to 128G Bps
Published by: The Register
Publish Date: 02/13/2014 | Posted 1891 Days Ago
292: Technology
Wearables Have a Dirty Little Secret: 50% of Users Lose Interest
Published by: TechRepublic
Publish Date: 02/13/2014 | Posted 1891 Days Ago
293: Management
How to choose the ideal IT leader
Published by: TechRepublic
Publish Date: 02/13/2014 | Posted 1891 Days Ago
294: Security
Cybersecurity Skills Haves and Have Nots
Published by: Network World
Publish Date: 02/13/2014 | Posted 1891 Days Ago
295: Operations
SSDs: A Guide to Using Flash in the Datacenter
Published by: NetworkComputing
Publish Date: 02/13/2014 | Posted 1891 Days Ago
296: Bit bucket
Ford Exec Says it Doesn't Collect or Share Car Location Data
Published by: IT World
Publish Date: 02/13/2014 | Posted 1891 Days Ago
297: Security
Data Security Dos & Don'ts from the Target Breach
Published by: InformationWeek
Publish Date: 02/13/2014 | Posted 1891 Days Ago
298: Data
Big Data: Dead by Definition, Alive in Practice
Published by: InformationWeek
Publish Date: 02/13/2014 | Posted 1891 Days Ago
299: Bit bucket
Scientists Achieve Nuclear Fusion with Giant Laser
Published by: ComputerWorld
Publish Date: 02/13/2014 | Posted 1891 Days Ago
300: Connectivity
Network Design in a Virtual World: Applications and Operations Must Rule
Published by: Business 2 Community
Publish Date: 02/13/2014 | Posted 1891 Days Ago
301: Management
Five Tech Essentials Every Business Should Have
Published by: Business 2 Community
Publish Date: 02/13/2014 | Posted 1891 Days Ago
302: Cloud
Can the Cloud Handle Enterprise Big Data? New Data Center Tech Expands Horizons
Published by: Business 2 Community
Publish Date: 02/13/2014 | Posted 1891 Days Ago
303: Management
The Sometimes Hidden Costs of a Leader Asking Question
Published by: TLNT
Publish Date: 02/12/2014 | Posted 1892 Days Ago
304: Bit bucket
10 Industries 3D Printing Will Disrupt or Decimate
Published by: TechRepublic
Publish Date: 02/12/2014 | Posted 1892 Days Ago
305: Bit bucket
Enterprise SDN Use Lags Service Providers'
Published by: Network World
Publish Date: 02/12/2014 | Posted 1892 Days Ago
306: Bit bucket
Researchers Show-Off High-Speed Laser Communications Device for Space
Published by: Network World
Publish Date: 02/12/2014 | Posted 1892 Days Ago
307: Security
Beware SDN Security Risks, Experts Warn
Published by: NetworkComputing
Publish Date: 02/12/2014 | Posted 1892 Days Ago
308: Bit bucket
Step Forward And Face the Music
Published by: IT World Canada
Publish Date: 02/12/2014 | Posted 1892 Days Ago
309: Security
Mobile Security - and Why It Pays to Test!
Published by: IT News Australia
Publish Date: 02/12/2014 | Posted 1892 Days Ago
310: Cloud
Building a Private Cloud? Don't Overlook Orchestration
Published by: InfoWorld
Publish Date: 02/12/2014 | Posted 1892 Days Ago
311: Management
IT Is at the Center of Your Business
Published by: InformationWeek
Publish Date: 02/12/2014 | Posted 1892 Days Ago
312: Bit bucket
Data Visualization: 3 Questions for Passing the Eye Candy Test
Published by: Information Management
Publish Date: 02/12/2014 | Posted 1892 Days Ago
313: Security
Locking Down E-Mail With Security Services
Published by: Dark Reading
Publish Date: 02/12/2014 | Posted 1892 Days Ago
314: Security
Measuring the Effectiveness of Your Security Awareness Program
Published by: CSO Online
Publish Date: 02/12/2014 | Posted 1892 Days Ago
315: Security
6 Failures that Led to Target Hack
Published by: ComputerWorld
Publish Date: 02/12/2014 | Posted 1892 Days Ago
316: Data
Effective Information Management: Using Data as a Competitive Weapon
Published by: ComputerWeekly
Publish Date: 02/12/2014 | Posted 1892 Days Ago
317: Bit bucket
A Glimpse of the Future Through Google Glass
Published by: Business 2 Community
Publish Date: 02/12/2014 | Posted 1892 Days Ago
318: Bit bucket
U.S. Bank Pilots Voice Biometrics As Secure Way To Access Card Accounts
Published by: Bank Systems & Technology
Publish Date: 02/12/2014 | Posted 1892 Days Ago
319: Operations
Liquid-Cooled Supercomputers, to Trim the Power Bill
Published by: New York Times Technology
Publish Date: 02/11/2014 | Posted 1893 Days Ago
320: Bit bucket
Hands On: Trying a 3D Printer -- A Beginner's Tale
Published by: Network World
Publish Date: 02/11/2014 | Posted 1893 Days Ago
321: Administration
Understanding the Differences Between Software Defined Networking, Network Virtualization and Network Functions Virtualization
Published by: Network World
Publish Date: 02/11/2014 | Posted 1893 Days Ago
322: Security
Encryption Use Continues to Grow
Published by: HelpNet Security
Publish Date: 02/11/2014 | Posted 1893 Days Ago
323: Cloud
The Key Knowledge Gap Hindering Your Cloud
Published by: InfoWorld
Publish Date: 02/11/2014 | Posted 1893 Days Ago
324: Management
The Business Hell We Must Escape: Meetings
Published by: InformationWeek
Publish Date: 02/11/2014 | Posted 1893 Days Ago
325: Bit bucket
BYOD Is Like Botox
Published by: InformationWeek
Publish Date: 02/11/2014 | Posted 1893 Days Ago
326: Compliance
Tips to Get Ready for
Published by: Network World
Publish Date: 02/10/2014 | Posted 1894 Days Ago
327: Connectivity
How to Avoid Network Outages: Go Back to Basics
Published by: NetworkComputing
Publish Date: 02/10/2014 | Posted 1894 Days Ago
328: Bit bucket
Are InfiniBand's Days Numbered?
Published by: NetworkComputing
Publish Date: 02/10/2014 | Posted 1894 Days Ago
329: Bit bucket
Governments Unprepared for the Impact of the Big Five IT Trends
Published by: HelpNet Security
Publish Date: 02/10/2014 | Posted 1894 Days Ago
330: Security
Target Breach Takeaway: Secure Your Remote Access
Published by: InformationWeek
Publish Date: 02/10/2014 | Posted 1894 Days Ago
331: Data
Big Data is Nothing if Not Visual
Published by: InformationWeek
Publish Date: 02/10/2014 | Posted 1894 Days Ago
332: Data
To Succeed with Big Data, Begin with the Decision in Mind
Published by: Information Management
Publish Date: 02/10/2014 | Posted 1894 Days Ago
333: Cloud
How Protected are Your Cloud Assets?
Published by: Continuity Central
Publish Date: 02/10/2014 | Posted 1894 Days Ago
334: Bit bucket
Why Would they DoS Us?
Published by: ComputerWeekly
Publish Date: 02/10/2014 | Posted 1894 Days Ago
335: Bit bucket
Simple Ways Employees and Employers Benefit From BYOD Policy
Published by: Business 2 Community
Publish Date: 02/09/2014 | Posted 1895 Days Ago
336: Technology
Think Wearables Are the Next Tech Boom?
Published by: The Register
Publish Date: 02/07/2014 | Posted 1897 Days Ago
337: Data
The Mobile Data Explosion: All Signs Point Upward
Published by: InfoWorld
Publish Date: 02/07/2014 | Posted 1897 Days Ago
338: Bit bucket
California Bill Proposes Mandatory Kill-Switch on Phones and Tablets
Published by: InfoWorld
Publish Date: 02/07/2014 | Posted 1897 Days Ago
339: Cloud
The 3 Stages of Cloud Computing Resistance
Published by: InfoWorld
Publish Date: 02/07/2014 | Posted 1897 Days Ago
340: Security
The 7 Deadly Sins of Application Security
Published by: InformationWeek
Publish Date: 02/07/2014 | Posted 1897 Days Ago
341: Bit bucket
Outages & The Inconvenience of Convenience
Published by: InformationWeek
Publish Date: 02/07/2014 | Posted 1897 Days Ago
342: Data
Big Data Analytics: The Enterprise's Next Great Security Weapon?
Published by: ZDnet
Publish Date: 02/06/2014 | Posted 1898 Days Ago
343: Bit bucket
Companies Are Banning E-mail to Improve Efficiency
Published by: Wall Street & Technology
Publish Date: 02/06/2014 | Posted 1898 Days Ago
344: Data
First Man/Machine Nerve Grafts Restore Amputee's Sense Of Touch
Published by: The Register
Publish Date: 02/06/2014 | Posted 1898 Days Ago
345: Connectivity
Target Breach Happened Because of a Basic Network Segmentation Error
Published by: Network World
Publish Date: 02/06/2014 | Posted 1898 Days Ago
346: Bit bucket
Secret Video and Audio Recordings a Legal Minefield for Employers
Published by: Network World
Publish Date: 02/06/2014 | Posted 1898 Days Ago
347: Bit bucket
Effective Incident Response
Published by: HelpNet Security
Publish Date: 02/06/2014 | Posted 1898 Days Ago
348: Data
Insecure File Sharing Puts Corporate Data at Risk
Published by: HelpNet Security
Publish Date: 02/06/2014 | Posted 1898 Days Ago
349: Data
The Dirty Truth About Big Data and NoSQL
Published by: InfoWorld
Publish Date: 02/06/2014 | Posted 1898 Days Ago
350: Management
CFO's Don't Want to Get it When it Comes to Risk and Security...Until it's Too Late.
Published by: InfoSec Island
Publish Date: 02/06/2014 | Posted 1898 Days Ago
351: Bit bucket
Top 4 Things to Keep In Mind When Evaluating MDM Vendors
Published by: Information Management
Publish Date: 02/06/2014 | Posted 1898 Days Ago
352: Bit bucket
Create a Mobile Policy Employees Can Trust
Published by: ComputerWeekly
Publish Date: 02/06/2014 | Posted 1898 Days Ago
353: Cloud
7 Considerations For Moving To The Cloud
Published by: Business 2 Community
Publish Date: 02/06/2014 | Posted 1898 Days Ago
354: Data
Most Employees Are Unaware of Their Company's Data Security Protocols
Published by: Bank Systems & Technology
Publish Date: 02/06/2014 | Posted 1898 Days Ago
355: Cloud
23 Signs Your Cloud Project May Be in Trouble
Published by: Network World
Publish Date: 02/05/2014 | Posted 1899 Days Ago
356: Bit bucket
Will Open Source SDNs Provide Relief?
Published by: Network World
Publish Date: 02/05/2014 | Posted 1899 Days Ago
357: Compliance
Five Lessons We Can Learn from Financial Services and Compliance
Published by: HelpNet Security
Publish Date: 02/05/2014 | Posted 1899 Days Ago
358: Management
When CIOs and CMOs Talk
Published by: IT World Canada
Publish Date: 02/05/2014 | Posted 1899 Days Ago
359: Data
Mobile Data Traffic is Expected to Explode 11-Fold by 2018
Published by: InfoWorld
Publish Date: 02/05/2014 | Posted 1899 Days Ago
360: Data
The Dangers of Bling Data Visualizations
Published by: Information Management
Publish Date: 02/05/2014 | Posted 1899 Days Ago
361: Bit bucket
NAC Comes Back
Published by: Dark Reading
Publish Date: 02/05/2014 | Posted 1899 Days Ago
362: Bit bucket
The Future of Drones
Published by: Business 2 Community
Publish Date: 02/05/2014 | Posted 1899 Days Ago
363: Security
Why BYOD Security Matters
Published by: Business 2 Community
Publish Date: 02/05/2014 | Posted 1899 Days Ago
364: Cloud
7 Trends In Cloud Computing To Watch Out For In 2014
Published by: Business 2 Community
Publish Date: 02/05/2014 | Posted 1899 Days Ago
365: Security
No One Solution in the Cybersecurity War
Published by: Bank Systems & Technology
Publish Date: 02/05/2014 | Posted 1899 Days Ago
366: Data
THUNDERING GAS Destroys Disks During Data Centre Incident
Published by: The Register
Publish Date: 02/04/2014 | Posted 1900 Days Ago
367: Connectivity
802.11ac Wi-Fi Part 3: Adoption
Published by: NetworkComputing
Publish Date: 02/04/2014 | Posted 1900 Days Ago
368: Security
Top Enterprise Security Threats Identified
Published by: HelpNet Security
Publish Date: 02/04/2014 | Posted 1900 Days Ago
369: Bit bucket
The Future of Mobile is Stupid, Futile -- And Irresistible
Published by: InfoWorld
Publish Date: 02/04/2014 | Posted 1900 Days Ago
370: Management
Interview with Woz: To Innovate, Get Personal
Published by: InfoWorld
Publish Date: 02/04/2014 | Posted 1900 Days Ago
371: Bit bucket
Future Cars will Talk to Each Other
Published by: InformationWeek
Publish Date: 02/04/2014 | Posted 1900 Days Ago
372: Bit bucket
What the Boss Learns About You in Every Conversation
Published by: Information Management
Publish Date: 02/04/2014 | Posted 1900 Days Ago
373: Bit bucket
Does Your Title Match Your Authority?
Published by: CSO Online
Publish Date: 02/04/2014 | Posted 1900 Days Ago
374: Management
5 Datacenter Management Tips You Shouldn't Ignore
Published by: Business 2 Community
Publish Date: 02/04/2014 | Posted 1900 Days Ago
375: Bit bucket
Argonne Lab Grows Chia Pet Style Hairy Electronic Fibers
Published by: Network World
Publish Date: 02/03/2014 | Posted 1901 Days Ago
376: Management
4 Mistakes to Avoid When Your Business Gets Bashed Online
Published by: IT World
Publish Date: 02/03/2014 | Posted 1901 Days Ago
377: Cloud
Prepare for the Cloud Data Explosion
Published by: InfoWorld
Publish Date: 02/03/2014 | Posted 1901 Days Ago
378: Connectivity
Video: How Google Backs Up the Internet
Published by: InfoWorld
Publish Date: 02/03/2014 | Posted 1901 Days Ago
379: Security
Big Fines for Big Breaches: The Only Way to Stop Shoddy Security
Published by: InfoWorld
Publish Date: 02/03/2014 | Posted 1901 Days Ago
380: Administration
12 Predictions for the Future of Programming
Published by: InfoWorld
Publish Date: 02/03/2014 | Posted 1901 Days Ago
381: Bit bucket
5 Salary Negotiation Mistakes to Avoid
Published by: InformationWeek
Publish Date: 02/03/2014 | Posted 1901 Days Ago
382: Technology
Technology Automation: Who's the Boss?
Published by: InformationWeek
Publish Date: 02/03/2014 | Posted 1901 Days Ago
383: Data
Big Data's 2 Big Years
Published by: InformationWeek
Publish Date: 02/03/2014 | Posted 1901 Days Ago
384: Data
Find Your Big Data 'Question Space'
Published by: InformationWeek
Publish Date: 02/03/2014 | Posted 1901 Days Ago
385: Data
What is Driving the Need for Chief Data Officers?
Published by: Information Management
Publish Date: 02/03/2014 | Posted 1901 Days Ago
386: Data
Big Data Goes Legal
Published by: Information Management
Publish Date: 02/03/2014 | Posted 1901 Days Ago
387: Technology
Employee Uniforms? Why not Employee Wearables?
Published by: Business 2 Community
Publish Date: 02/03/2014 | Posted 1901 Days Ago
388: Security
Can Security Be More Than the Topic du Jour?
Published by: Bank Systems & Technology
Publish Date: 02/03/2014 | Posted 1901 Days Ago
389: Security
New Devices. Same Old Security Issues?
Published by: Business 2 Community
Publish Date: 02/02/2014 | Posted 1902 Days Ago
390: Administration
Unix: Tracking Down Ghost Accounts
Published by: IT World
Publish Date: 02/01/2014 | Posted 1903 Days Ago
391: Compliance
MIT Scientists Craft a Storage System Fit for THE ENTIRE UNIVERSE
Published by: The Register
Publish Date: 01/31/2014 | Posted 1904 Days Ago
392: Compliance
Why Governance and Policy can Strengthen Compliance Efforts
Published by: HelpNet Security
Publish Date: 01/31/2014 | Posted 1904 Days Ago
393: Cloud
Cloud Availability Trumps Security Concerns When it Comes To Shadow IT
Published by: Network World
Publish Date: 01/30/2014 | Posted 1905 Days Ago
394: Bit bucket
MacGyver IT: 21 tools for IT heroes
Published by: Network World
Publish Date: 01/30/2014 | Posted 1905 Days Ago
395: Connectivity
802.11ac Wi-Fi Part 2: Wave 1 and Wave 2 Products
Published by: NetworkComputing
Publish Date: 01/30/2014 | Posted 1905 Days Ago
396: Security
"Honey Encryption" Overwhelms Attackers with Fake Results
Published by: HelpNet Security
Publish Date: 01/30/2014 | Posted 1905 Days Ago
397: Bit bucket
Risky Online Behaviour is Putting Teens in Danger
Published by: HelpNet Security
Publish Date: 01/30/2014 | Posted 1905 Days Ago
398: Technology
What You Really Need to Know about Artificial Intelligence
Published by: Information Management
Publish Date: 01/30/2014 | Posted 1905 Days Ago
399: Cloud
Cloud Vendors Face Deeper Security Questions
Published by: Wall Street & Technology
Publish Date: 01/29/2014 | Posted 1906 Days Ago
400: Bit bucket
Is It Time for an IT Reorg?
Published by: Wall Street & Technology
Publish Date: 01/29/2014 | Posted 1906 Days Ago
401: Management
Five Tips from a CIO On Dealing with Massive DDoS Attacks
Published by: Network World
Publish Date: 01/29/2014 | Posted 1906 Days Ago
402: Bit bucket
The 'Click Me!' Contracts You must Avoid
Published by: IT World Canada
Publish Date: 01/29/2014 | Posted 1906 Days Ago
403: Bit bucket
6 Dirty Secrets of the IT Industry
Published by: IT World
Publish Date: 01/29/2014 | Posted 1906 Days Ago
404: Bit bucket
SDN Success in the Real World
Published by: InfoWorld
Publish Date: 01/29/2014 | Posted 1906 Days Ago
405: Compliance
Facebook Uses 10,000 Blu-Ray Discs in Low-Power Storage System
Published by: InfoWorld
Publish Date: 01/29/2014 | Posted 1906 Days Ago
406: Bit bucket
Bio-Printing Human Parts will Spark Ethical, Regulatory Debate
Published by: ComputerWorld
Publish Date: 01/29/2014 | Posted 1906 Days Ago
407: Technology
Future Technology For The Year Ahead
Published by: Business 2 Community
Publish Date: 01/29/2014 | Posted 1906 Days Ago
408: Storage
Is There an Alternative to Physically Destroying SSDs?
Published by: Business 2 Community
Publish Date: 01/29/2014 | Posted 1906 Days Ago
409: Bit bucket
Understanding How SDN and NFV Can Work Together
Published by: Network World
Publish Date: 01/28/2014 | Posted 1907 Days Ago
410: Cloud
Security Professionals Identify IT Risks Associated with Cloud Computing
Published by: Network World
Publish Date: 01/28/2014 | Posted 1907 Days Ago
411: Security
Eight More Security Best Practices
Published by: IT World Canada
Publish Date: 01/28/2014 | Posted 1907 Days Ago
412: Data
It's Your Data, Dummy: Make Every Day Data Privacy Day
Published by: InfoWorld
Publish Date: 01/28/2014 | Posted 1907 Days Ago
413: Security
13 Tough Questions about Computer Security
Published by: InfoWorld
Publish Date: 01/28/2014 | Posted 1907 Days Ago
414: Technology
7 Ways Wearables Will Go to Work
Published by: InformationWeek
Publish Date: 01/28/2014 | Posted 1907 Days Ago
415: Data
Get Ready, It's the Year for Big Data Heists
Published by: Information Management
Publish Date: 01/28/2014 | Posted 1907 Days Ago
416: Data
Stumbling Blocks that Faceplant Security Analytics Programs
Published by: Dark Reading
Publish Date: 01/28/2014 | Posted 1907 Days Ago
417: Connectivity
802.11ac Wi-Fi Part 1: Building Blocks
Published by: NetworkComputing
Publish Date: 01/27/2014 | Posted 1908 Days Ago
418: Operations
Think of Scheduled Downtime as Disaster Recovery on Your Terms
Published by: InfoWorld
Publish Date: 01/27/2014 | Posted 1908 Days Ago
419: Cloud
5 Things Every CIO Needs to Know About Cloud Sprawl
Published by: Information Management
Publish Date: 01/27/2014 | Posted 1908 Days Ago
420: Data
Do the Big Data Balancing Act
Published by: Big Data Republic
Publish Date: 01/27/2014 | Posted 1908 Days Ago
421: Bit bucket
BYOC Is the New BYOD
Published by: Business 2 Community
Publish Date: 01/25/2014 | Posted 1910 Days Ago
422: Technology
3 Key Benefits of Email Archiving
Published by: Business 2 Community
Publish Date: 01/25/2014 | Posted 1910 Days Ago
423: Bit bucket
"Astonishingly Accurate" Optical Clock Could Be New World Time Standard
Published by: Network World
Publish Date: 01/24/2014 | Posted 1911 Days Ago
424: Storage
The Myth of the Supersonic Disk Drive
Published by: NetworkComputing
Publish Date: 01/24/2014 | Posted 1911 Days Ago
425: Connectivity
Fixing the Internet of Things
Published by: HelpNet Security
Publish Date: 01/24/2014 | Posted 1911 Days Ago
426: Management
Better Business through Technology: Logging Processes
Published by: Business 2 Community
Publish Date: 01/24/2014 | Posted 1911 Days Ago
427: Bit bucket
How Proper Etiquette can Help You Land Your Dream Tech Job
Published by: Network World
Publish Date: 01/23/2014 | Posted 1912 Days Ago
428: Data
Why CNA Sold a Data Center
Published by: Insurance & Technology
Publish Date: 01/23/2014 | Posted 1912 Days Ago
429: Bit bucket
Why IT Should Spend More Time Focusing on Passengers, and Less Time on the Locomotive
Published by: Business 2 Community
Publish Date: 01/23/2014 | Posted 1912 Days Ago
430: Cloud
Why the Cloud Battle is Already Won
Published by: Business 2 Community
Publish Date: 01/23/2014 | Posted 1912 Days Ago
431: Compliance
Compliance Officers Stand Alone, But not Apart
Published by: FCPA
Publish Date: 01/22/2014 | Posted 1913 Days Ago
432: Data
Mobile Users Will Provide Data to 100 Apps a Day By 2017
Published by: ComputerWeekly
Publish Date: 01/22/2014 | Posted 1913 Days Ago
433: Management
Ways Businesses Can Reduce IT Costs in 2014
Published by: Business 2 Community
Publish Date: 01/22/2014 | Posted 1913 Days Ago
434: Compliance
The Future of Storage: Disk-Based or Just Discombobulated?
Published by: The Register
Publish Date: 01/21/2014 | Posted 1914 Days Ago
435: Bit bucket
12 Privacy-Destroying Technologies that Should Scare You
Published by: Network World
Publish Date: 01/21/2014 | Posted 1914 Days Ago
436: Bit bucket
Survey Sheds Light on Mobile-Manic Young Workers
Published by: Network World
Publish Date: 01/21/2014 | Posted 1914 Days Ago
437: Bit bucket
Companies must Improve Incident Response Plans
Published by: HelpNet Security
Publish Date: 01/21/2014 | Posted 1914 Days Ago
438: Security
8 Tips for Improving Enterprise Security
Published by: IT World Canada
Publish Date: 01/21/2014 | Posted 1914 Days Ago
439: Cloud
Defining Cloud Computing by Its Characteristics
Published by: IT World Canada
Publish Date: 01/21/2014 | Posted 1914 Days Ago
440: Cloud
Is It Time To Embrace The Cloud?
Published by: Business 2 Community
Publish Date: 01/21/2014 | Posted 1914 Days Ago
441: Bit bucket
What a 21st Century Privacy Law Could-and Should-Achieve
Published by: Privacy Association
Publish Date: 01/20/2014 | Posted 1915 Days Ago
442: Bit bucket
Although 'Password' is No Longer the #1 Sesame Opener, It's Still STUPID
Published by: The Register
Publish Date: 01/20/2014 | Posted 1915 Days Ago
443: Security
Social Media is the Weakest Link in Enterprise Security
Published by: IT News
Publish Date: 01/20/2014 | Posted 1915 Days Ago
444: Security
8 Ways Physical Security Has Evolved
Published by: CSO Online
Publish Date: 01/20/2014 | Posted 1915 Days Ago
445: Security
Target Breach Notifications Are a Perfect Example of What Not To Do
Published by: IT World
Publish Date: 01/19/2014 | Posted 1916 Days Ago
446: Bit bucket
C-Level Execs Value Data, Have No Idea What to Do With It
Published by: Network World
Publish Date: 01/17/2014 | Posted 1918 Days Ago
447: Data
Major Developments that Will Drive Big Data in 2014
Published by: HelpNet Security
Publish Date: 01/17/2014 | Posted 1918 Days Ago
448: Cloud
How to Implement Incident Reporting in Cloud Computing
Published by: HelpNet Security
Publish Date: 01/17/2014 | Posted 1918 Days Ago
449: Storage
SSD Prices Face Uncertain Future in 2014
Published by: IT World
Publish Date: 01/17/2014 | Posted 1918 Days Ago
450: Cloud
10 Cloud Security Startups to Watch In 2014
Published by: IT World
Publish Date: 01/17/2014 | Posted 1918 Days Ago
451: Connectivity
Net Neutrality: Mostly Dead or All Dead?
Published by: InfoWorld
Publish Date: 01/17/2014 | Posted 1918 Days Ago
452: Data
This Data will Self-Destruct: Snapchat Meets Encrypted Messaging
Published by: InfoWorld
Publish Date: 01/17/2014 | Posted 1918 Days Ago
453: Data
This Data Will Self-Destruct: Snapchat Meets Encrypted Messaging
Published by: InfoWorld
Publish Date: 01/17/2014 | Posted 1918 Days Ago
454: Bit bucket
How to Bring Shadow IT Under Control
Published by: Network World
Publish Date: 01/16/2014 | Posted 1919 Days Ago
455: Data
How to Restore Your SSD to Peak Performance
Published by: IT News
Publish Date: 01/16/2014 | Posted 1919 Days Ago
456: Security
New Fujitsu Labs Tech can do Batch Searches of Encrypted Data
Published by: IT News
Publish Date: 01/16/2014 | Posted 1919 Days Ago
457: Cloud
5 Cloud Tools That Will Help Your Business
Published by: Business 2 Community
Publish Date: 01/16/2014 | Posted 1919 Days Ago
458: Bit bucket
Avoid these 4 Visualization Mistakes
Published by: Big Data Republic
Publish Date: 01/16/2014 | Posted 1919 Days Ago
459: Cloud
Disaster recovery in the cloud
Published by: IT Web
Publish Date: 01/15/2014 | Posted 1920 Days Ago
460: Cloud
Disaster Recovery in the cloud
Published by: IT Web
Publish Date: 01/15/2014 | Posted 1920 Days Ago
461: Connectivity
Net Neutrality: We Need a Hero, from the Unlikeliest of Places
Published by: InfoWorld
Publish Date: 01/15/2014 | Posted 1920 Days Ago
462: Management
10 Ways to Prep for - and Ace - a Security Job Interview
Published by: CSO Online
Publish Date: 01/15/2014 | Posted 1920 Days Ago
463: Cloud
The Difference Between Public and Private Cloud
Published by: Business 2 Community
Publish Date: 01/15/2014 | Posted 1920 Days Ago
464: Bit bucket
Do Good Manners Still Matter on the Job?
Published by: TLNT
Publish Date: 01/14/2014 | Posted 1921 Days Ago
465: Bit bucket
The Future of Tech Support, Taking Over Your Brain
Published by: Network World
Publish Date: 01/14/2014 | Posted 1921 Days Ago
466: Security
Understanding Mobile Security Pressure Points and Vulnerabilities
Published by: HelpNet Security
Publish Date: 01/14/2014 | Posted 1921 Days Ago
467: Security
Top 7 Security Concerns for 2014
Published by: HelpNet Security
Publish Date: 01/14/2014 | Posted 1921 Days Ago
468: Security
Dropbox Glitch Makes a Strong Case for Encryption by Default
Published by: InfoWorld
Publish Date: 01/14/2014 | Posted 1921 Days Ago
469: Security
10 Common Misconceptions About Security Professionals
Published by: CSO Online
Publish Date: 01/14/2014 | Posted 1921 Days Ago
470: Bit bucket
3 Mobile Marketing Trends for 2014
Published by: CIO Today
Publish Date: 01/14/2014 | Posted 1921 Days Ago
471: Management
Virtual Reality: Coming to a Business Near You
Published by: Business 2 Community
Publish Date: 01/14/2014 | Posted 1921 Days Ago
472: Bit bucket
5 CES Takeaways
Published by: Business 2 Community
Publish Date: 01/14/2014 | Posted 1921 Days Ago
473: Security
Nanotechnology Holds Promise for Security Applications
Published by: Security InfoWatch
Publish Date: 01/13/2014 | Posted 1922 Days Ago
474: Data
The World's Coolest, Greenest Data Centers
Published by: Network World
Publish Date: 01/13/2014 | Posted 1922 Days Ago
475: Bit bucket
3 Things Enterprise IT can Learn from the 2014 International CES
Published by: Network World
Publish Date: 01/13/2014 | Posted 1922 Days Ago
476: Bit bucket
Metadata has had 'Minimal' Effect on Catching Terrorists: Report
Published by: IT World Canada
Publish Date: 01/13/2014 | Posted 1922 Days Ago
477: Bit bucket
Foiled! How to Beat Software Vendors' Sneaky Price Increases
Published by: InfoWorld
Publish Date: 01/13/2014 | Posted 1922 Days Ago
478: Bit bucket
Coming Soon: Control Your Computer With Your Brain Via Open Source
Published by: InfoWorld
Publish Date: 01/13/2014 | Posted 1922 Days Ago
479: Technology
Your 2014 Heat Map for Enterprise Technology
Published by: InfoWorld
Publish Date: 01/13/2014 | Posted 1922 Days Ago
480: Security
RIP, Information Security, Done In by Backdoors and Secret Deals
Published by: InfoWorld
Publish Date: 01/13/2014 | Posted 1922 Days Ago
481: Compliance
Compliance is Hot -- Why Hiring is On the Upswing
Published by: FCPA
Publish Date: 01/13/2014 | Posted 1922 Days Ago
482: Bit bucket
3D Printing is IT's Next Big Challenge
Published by: ComputerWorld
Publish Date: 01/13/2014 | Posted 1922 Days Ago
483: Compliance
3 Best Practices for Regulatory Compliance
Published by: Bank Systems & Technology
Publish Date: 01/13/2014 | Posted 1922 Days Ago
484: Bit bucket
3 Things to Consider When Deciding If BYOD is Right for You
Published by: Business 2 Community
Publish Date: 01/12/2014 | Posted 1923 Days Ago
485: Bit bucket
The 25 Geekiest Moments from 25 Years Ago
Published by: InfoWorld
Publish Date: 01/11/2014 | Posted 1924 Days Ago
486: Cloud
IBM's Watson-As-A-Cloud: Is It A Bird? Is It a Plane? No, It's Another Mainframe
Published by: The Register
Publish Date: 01/10/2014 | Posted 1925 Days Ago
487: Data
Fear of Data Sharing on the Rise
Published by: HelpNet Security
Publish Date: 01/10/2014 | Posted 1925 Days Ago
488: Bit bucket
The Vice that Can Squeeze IS Departments
Published by: IT World Canada
Publish Date: 01/10/2014 | Posted 1925 Days Ago
489: Technology
17 Hot New Wearable Computers
Published by: IT World
Publish Date: 01/10/2014 | Posted 1925 Days Ago
490: Bit bucket
The Coolest 3D Printers of CES 2014
Published by: InfoWorld
Publish Date: 01/10/2014 | Posted 1925 Days Ago
491: Bit bucket
Top 5 Trends to Watch in 2014
Published by: Business 2 Community
Publish Date: 01/10/2014 | Posted 1925 Days Ago
492: Management
The 5 Critical Lessons CES Taught Us about Wearable Tech
Published by: IT World
Publish Date: 01/09/2014 | Posted 1926 Days Ago
493: Bit bucket
Let Them See You Sweat
Published by: InformationWeek
Publish Date: 01/09/2014 | Posted 1926 Days Ago
494: Cloud
Cloud's Worst-Case Scenario: What to do if Your Provider Goes Belly Up
Published by: Network World
Publish Date: 01/08/2014 | Posted 1927 Days Ago
495: Security
Hacking Cars is 'Already A Serious Problem'
Published by: Network World
Publish Date: 01/06/2014 | Posted 1929 Days Ago
496: Management
IT Leadership Lessons You Can Learn from Failure
Published by: IT World
Publish Date: 01/06/2014 | Posted 1929 Days Ago
497: Compliance
7 Ways to Work Around Security Compliance Problems
Published by: CSO Online
Publish Date: 01/06/2014 | Posted 1929 Days Ago
498: Cloud
The Demise Of Nirvanix Shines A Light On The Broken Cloud Model
Published by: CRN
Publish Date: 01/06/2014 | Posted 1929 Days Ago
499: Bit bucket
New Types of RAM Could Revolutionize Your PC
Published by: ComputerWorld
Publish Date: 01/05/2014 | Posted 1930 Days Ago
500: Bit bucket
10 Free Router and IP Admin Tools You Should Know About
Published by: Network World
Publish Date: 01/04/2014 | Posted 1931 Days Ago

56 Articles Added in the Last 7 Days
12,852 Articles with 15,514 subscribers
3,392 C-Level and 7,495 LinkedIn Connections


People ask the difference between a leader and a boss. The leader leads, and the boss drives.
- Theodore Roosevelt – (1858-1919) 26th president of the U.S. -
The only IT and Data Center Newsletter that is 100% unbiased in its content and delivery. We cut through the spin and get to the facts. Clean, unvarnished and fresh. Every week there are more than 400 online sources that contain articles of interest to IT and DC Professionals at all levels. Every week the IT Weekly Newsletter compiles 40+ of the absolute best technical articles with no product, company or press release bias, no pop-up ads, no sales angles. addressing everyday IT and Data Center issues involving:
  • Reducing Business and IT Risk
  • Improving Infrastructure Quality of Service
  • Increasing Availability and Reliability
  • Reducing Application Response Time
  • Increasing Business Productivity and Agility
  • Improving Server, Storage and Networks
  • Improving Security and Compliance
  • Protecting, Preserving and Restoring Data
  • Improving Regulatory Compliance
  • Reducing Audit Errors
  • Reducing IT and DC Costs
  • Developing Proactive Business Solutions
Header
Copyright © 2019 Promethean Data Solutions, Inc.   -   Warren Avery   -   602-463-6558   -   wavery@ITWeeklyNewsletter.com