Misc49-290x195

Five Tips to Build a Brand in 2015

In the coming year, the technological connectedness of everyone on Earth will reach a level never before experienced by humanity. The old rules don't apply in this world. New rules must be developed.

More >
Global6-290x195.jpg

Apple/IBM vs. Google vs. Microsoft: Who Wins the Battle for the 202...

Rob Enderle thinks the odds favor Microsoft winning the 2020 desktop, but it’ll be a battle that will make the 1990s seem amazingly easy by comparison.

More >
Analytics7-290x195.jpg

This Week’s Two Big Data Power Plays

Teradata announced a partnership with MapR this week, but some wonder how this will affect the Hortonworks IPO.

More >
ISACAWearables290

Survey Finds North American Workplaces Are Not Ready for Wearable Tech

Are workplaces ready for this invasion of wearable tech? According to new research from global IT association ISACA, the answer is no.

More >
Global1-290x195.jpg

The Focus of Connectivity and Mobility Is Moving to Developing Econ...

The mobile device and connectivity markets in developing nations are far different than in mature economies such as the U.S. and Europe.

More >
infra4-290x195.jpg

ClusterHQ Moves to Manage Docker Containers at Scale

ClusterHQ bets that IT organizations will want a management framework optimized for Docker containers instead of one designed for traditional VMs.

More >
IT Downloads

Time4 The Time Bandit Solution: Recovering Stolen Time You Never Knew You Had

This excerpt from chapters 1:00 and 1:30 focuses on the causes and manifestations of time lost as a result of unwanted, unnecessary and wasteful interruptions, and also provides a calculator to measure how much of your time is wasted by interruption time-loss factors.

Learn more >

IT_Man31 Microsoft SharePoint 2013 Cheat Sheet

This SharePoint 2013 Cheat Sheet covers program fundamentals, as well as tips on managing documents, accessing wikis and blogs, and task management.

Learn more >

Infra4 Screening for Factors Affecting Application Performance in Profiling Measurements

This report provides an example application of screening techniques in experimental computer science, including validation and selection of metrics and measures, the screening experiment itself, and supporting statistical methods.

Learn more >

Misc6 Powered by Purpose

This excerpt from chapter 2 focuses on identifying your values and how they affect the decisions you make in your personal and professional life every day.

Learn more >

DataCtr1 BIOS Protection Guidelines for Servers

The guidelines in this document include requirements on servers to mitigate the execution of malicious or corrupt BIOS code.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date