eweek.com

Trends in Cyber Crime: A Look at the First Half of 2014

A new report aggregates and standardizes cyber crime data from the first six months of the year into cyber BI that provides some interesting insights.

More >
eweek.com

Huddle Turns Collaboration Service into a Publishing Platform

The latest version of the Huddle platform essentially leverages the company’s cloud collaboration service to create a secure publishing platform.

More >
eweek.com

Twenty-Five Back-to-School Gadgets You May Just Want for Yourself

While it may seem the kids are loading up on the cool toys, never fear. Many of these gadgets and gizmos are equally fun and intriguing for the adults.

More >
eweek.com

VMware: First Among Equals in the Cloud?

VMware is the top dog when it comes to data center virtualization, but the company still has to walk a fine line between market dominance and tyranny.

More >
eweek.com

Ten Vulnerabilities that Impact Enterprise Cloud Apps

With increased popularity comes more attention from malicious hackers trying to access PII and other sensitive data. It's more critical than ever before to understand how -- and where -- you're storing your data, and the variety of vulnerabilities that can exist in the apps in your network.

More >
eweek.com

Inspur Moves to Power Opening Up x86/Power Server Battleground

The server market is breaking out and now a pitched battle between IBM and Intel could mean the end of SPARC and Itanium.

More >

IT Downloads

Analytics08 Job Description: Data Scientist

The data scientist drives initiatives to improve website monetization and user experience, while delivering analytics to better understand user engagement.

Learn more >

Money3 PCI Compliance: The Definitive Guide

In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise.

Learn more >

IT_Man20 Agile Strategy Management: Techniques for Continuous Alignment and Improvement

The excerpt from chapter 2 focuses on building the best possible team to perform the strategic initiative the organization has identified as a worthy opportunity.

Learn more >

Mobile7 Job Description: Director, Corporate Information Technology (IT)

The Director of Corporate IT is expected to establish and maintain company-wide security and compliance policies, and set the vision and strategy for enabling a highly efficient workforce.

Learn more >

IT_Man21 Trust and Betrayal in the Workplace: Building Effective Relationships in Your Organization

The excerpt from chapter 8 focuses on how to rebuild trust with the seven steps for healing, which are intended to serve as a framework to help readers work through the painful feelings of betrayal toward renewal.

Learn more >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.