eweek.com

Eight Signs Your Team Is in Trouble

Eight common behaviors that team leaders should look for and address before they escalate into big organizational failures - lost contracts, missed deadlines, budget overruns, and the loss of key team members.

More >
eweek.com

VMware Seeks Desktop Virtualization Converts

VMware is betting that a substantially improved user experience will drive more customers to embrace both desktop and application virtualization.

More >
eweek.com

Better Internal Collaboration Can Keep Hackers Away

The collaboration breakdown often stems from how security is viewed within the company.

More >
eweek.com

Quantum Makes Backup Capacity Available on Demand

Only a handful of vendors have developed purpose-built appliances that come loaded with software that automates the workflow surrounding the backup and recovery process.

More >
eweek.com

How to Tackle Communication Problems in a Multigenerational Workplace

In workplaces with as many as four generations struggling to communicate with each other, even simple exchanges can result in misunderstandings that can create serious problems.

More >
eweek.com

Debunking Five Myths About Cloud-Based Phone Service

Cloud-based communications are becoming increasingly mainstream and businesses will benefit from adapting now, rather than scrambling to catch up later.

More >

IT Downloads

IT_Man21 Trust and Betrayal in the Workplace: Building Effective Relationships in Your Organization

The excerpt from chapter 8 focuses on how to rebuild trust with the seven steps for healing, which are intended to serve as a framework to help readers work through the painful feelings of betrayal toward renewal.

Learn more >

DataM14 Large Scale and Big Data: Processing and Management

In this excerpt from chapter 9, readers are provided on overview of the NoSQL world, exploring the recent advancements and the new approaches of Web-scale data management.

Learn more >

Approximate Matching: Definition and Terminology

Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics.

Learn more >

Job Description: Senior Software Engineer/Big Data

The ideal candidate will have previous Big Data experience using Hadoop/Storm and machine learning to solve large-scale problems. .

Learn more >

cloud20 Protection Options for Virtualized Infrastructures in IaaS Cloud

The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the architecture that governs their deployment.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.