eweek.com

Ten Cool Companies That Are Monetizing IoT and How You Can Too!

With growth in the Internet of Things (IoT) projected to be 26 billion units installed by 2020, the potential for revenue is there for those who develop successful IoT strategies.

More >
eweek.com

Zettaset Simplifies Big Data Encryption Management

Zettaset is making its encryption software available independently from the Orchestrator platform it created to manage Big Data security.

More >
eweek.com

Eight Signs Your Team Is in Trouble

Eight common behaviors that team leaders should look for and address before they escalate into big organizational failures - lost contracts, missed deadlines, budget overruns, and the loss of key team members.

More >
eweek.com

How to Tackle Communication Problems in a Multigenerational Workplace

In workplaces with as many as four generations struggling to communicate with each other, even simple exchanges can result in misunderstandings that can create serious problems.

More >
eweek.com

It’s On: The IoT Standards Games

Standards are emerging for IoT, but it seems like the approaches are so different at this point, it’s hard to even say they're competing.

More >
eweek.com

The Telcos’ Upstream Advantage

Telcos are cooking up technologies that meet and exceed the 1 Gbps level.

More >

IT Downloads

IT_Man21 Trust and Betrayal in the Workplace: Building Effective Relationships in Your Organization

The excerpt from chapter 8 focuses on how to rebuild trust with the seven steps for healing, which are intended to serve as a framework to help readers work through the painful feelings of betrayal toward renewal.

Learn more >

DataM14 Large Scale and Big Data: Processing and Management

In this excerpt from chapter 9, readers are provided on overview of the NoSQL world, exploring the recent advancements and the new approaches of Web-scale data management.

Learn more >

Approximate Matching: Definition and Terminology

Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics.

Learn more >

Job Description: Senior Software Engineer/Big Data

The ideal candidate will have previous Big Data experience using Hadoop/Storm and machine learning to solve large-scale problems. .

Learn more >

cloud20 Protection Options for Virtualized Infrastructures in IaaS Cloud

The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the architecture that governs their deployment.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.