Being able to easily access archived documents, emails and messages takes the guesswork out of certain situations and will ultimately protect your company if used correctly.More >
Tech companies and fashion designers both seem to agree that the wearables of tomorrow will likely be fashion that incorporates technology instead of the other way around.More >
We've compiled this lineup of 15 high-tech items to simplify shopping this season. Some are just fun to use and a few of these devices are things.... More >
Datalink CIO Dave Brady keeps IT's customers in mind at all.... More >
If your app is missing any of these features, you need to rethink how and why you're designing and building for.... More >
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employed within federal information systems and organizations.
The cybersecurity program manager will support the execution of product cybersecurity elements across global programs and services.
This paper explores a methodology to score adherence of a web page to WCAG 2.0 conformance requirements.
This excerpt from chapters 1:00 and 1:30 focuses on the causes and manifestations of time lost as a result of unwanted, unnecessary and wasteful interruptions, and provides a calculator to measure how much of your time is wasted by interruption time-loss factors.
This SharePoint 2013 Cheat Sheet covers program fundamentals, as well as tips on managing documents, accessing wikis and blogs, and task management.