While we have much to accomplish in our quest for the mobile enterprise, many lessons have already been learned; lessons we can apply moving forward.More >
While offshoring can certainly be viewed as a way to save money on development, the expectation of getting something for nothing – that is, an ideal developer for half the price – is sheer fantasy.More >
Phishing and spearphishing are in the news, and many more frightening attacks will never be widely discussed. Investing in user training is a little-used defense.More >
Commerce Department CDO Ian Kalin believes in the importance of data quality, but runs into the question as to whether quality data has a cost.More >
IBM is trying to create a community through which IT security professionals can collaborate to better identify threats and share alerts.More >
Until recently, much of the industry has been focused on applying principles used to manage physical records but they are now realizing that records management is no longer a sufficient solution.More >
While many enterprises are clearly realizing promised benefits from public clouds, there are still challenges and a consistent set of.... More >
The code review, or in developer parlance, the pull request, is the number one way to set the tone, rhythm and bar needed to build a high-performing.... More >
The Linux Foundation's Let’s Encrypt project will reduce the effort it takes to encrypt data in an application down to two simple.... More >
The excerpt from chapter 5 focuses on the ins and outs of preparing for and running a risk management planning meeting, including necessary resources and expected outcomes.
This document analyzes approaches to identity management for public safety networks in an effort to assist individuals developing technical and policy requirements for public safety use.
This Microsoft Access 2013 Cheat Sheet from CustomGuide covers the basics of working with databases and objects, keystroke shortcuts, and building tables and queries.
The Web Development Engineer will be responsible for driving the development efforts of the core UI tools for the new company website redesign.
The chapter excerpt focuses on how effective data architecture must lay out the life cycle of data, from definition to capture, storage, management, integration, distribution, and analysis.