Most Popular     |      Most Recent

11 Tips on How to Move Beyond Networking to True Collaboration

11 Mar, 2015

Psychologist Nancy O'Reilly explains her theory on connecting with others by creating new opportunities for collaboration and innovation. More >

A Glimpse into the Operations of an Israeli Software Engineering Team

13 Mar, 2015

Nubo Software's CEO explains his philosophy on flat organizational structures and motivating development teams with fascinating work. More >

A Positive Spin on Security as Business Enabler

10 Mar, 2015

A message on the full range of benefits of security tools and approaches can help bring executives and the board closer together on strategic planning. More >

All Blogs
Carl Weinschenk

Ethernet Wins

Data and Telecom   |  Carl Weinschenk   |  31 Mar, 2015

Carrier Ethernet is the up-and-coming star of the Ethernet stable. Lots of good news coming out this week.... More >

0 Comment

Loraine Lawson

The Pros and Cons of Combining Master Data Management with Big Data

Integration   |  Loraine Lawson   |  31 Mar, 2015

When it comes to master data management and Big Data, you may be better off leaving each to its own.... More >

0 Comment

Arthur Cole

Turning ‘The’ Cloud into ‘Your’ Cloud

Infrastructure   |  Arthur Cole   |  31 Mar, 2015

How do you determine which cloud is the right cloud?... More >

0 Comment

Rob Enderle

Surface 3: The Ideal Blend of Work/Portability Emerges

Unfiltered Opinion   |  Rob Enderle   |  31 Mar, 2015

Surface 3 may be the closest thing to a perfect storm product when Windows 10 releases because it will combine the massive advancements of both Microsoft and Intel into a single platform.... More >

0 Comment

Mike Vizard

ASG Launches Application for Managing Reference Data

IT Unmasked   |  Mike Vizard   |  31 Mar, 2015

In theory, standardizing terms should be relatively simple. In practice, different business units often begin to describe the same process differently.... More >

0 Comment

Sue Marquette Poremba

Hotel Wi-Fi Vulnerability a Reminder About Security Risks on the Road

Data Security   |  Sue Marquette Poremba   |  30 Mar, 2015

No one should assume that the Wi-Fi they are using is secure, including (perhaps especially) in hotels.... More >

0 Comment

Kachina Shaw

IT Career News: Odd Questions, CIO vs. CTO, Money Talks

Charting Your IT Career   |  Kachina Shaw   |  27 Mar, 2015

News this week included weird interview questions, the demise of the CIO or CTO, data ethics, legacies, and putting its money where its mouth is in Indiana.... More >

0 Comment

Kim Mays

What to Consider Before Taking Your SMB Global

SMB Tech   |  Kim Mays   |  27 Mar, 2015

Though it may seem easy to break into the global market, doing your homework upfront will help eliminate potential headaches.... More >

0 Comment

Don Tennant

CIO or CTO: Which One Will Survive the Cloud and Keep a Seat at the Table?

From Under the Rug   |  Don Tennant   |  27 Mar, 2015

One tech CTO provides an intriguingly candid assessment of the current and future roles of the CIO and the CTO as they change in the face of the cloud.... More >

0 Comment

Kachina Shaw

Why the Data Security and Breach Notification Act Is Drawing Ire

Governance and Risk   |  Kachina Shaw   |  24 Mar, 2015

We may never see a completed national data protection and breach notification law, if questions about language, coverage and interference with state protections aren't adequately answered.... More >

0 Comment

Kim Mays

Hiring a Web Development Engineer vs. a Web Developer

New Tools for IT   |  Kim Mays   |  23 Mar, 2015

The Web Development Engineer job description includes a company description and a description of the actual position with bullets explaining responsibilities.... More >

2 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Thanks for your registration, follow us on our social networks to keep up-to-date