Blogs

 

15 Time-Management Tips for Stressed-Out IT Pros

28 Jul, 2016

Jackie Gaines, an executive coach, time management consultant and author, has come up with a list of 15 time-management tips that are worth considering. More >

4 Tips to Help Protect Proprietary Information When Employees Leave

02 Aug, 2016

The ease with which confidential information can be shared outside the company is a perennial headache for those charged with managing security. More >

9 Tips for Managing Political Tensions in the Workplace

10 Aug, 2016

Here are nine tips for helping organizations avoid the political landmines that can so easily damage productivity and camaraderie in the workplace. More >

All Blogs
Arthur Cole

Is the Data Lake the Right Tool for Analytics?

Infrastructure   |  Arthur Cole   |  26 Aug, 2016

The most disturbing aspect in the development of a Big Data analytics engine is not the actual infrastructure or architecture to be deployed, but the urgency with which it needs to be done.... More >

0 Comment

Rob Enderle

Why It Is Well Past Time to Take the Hack Harassment Pledge

Unfiltered Opinion   |  Rob Enderle   |  26 Aug, 2016

Tech should be full of joy, excitement, and discovery and shouldn’t be a tool used to take the sparkle out of anyone’s eyes. ... More >

0 Comment

Mike Vizard

HP Embeds Privacy Screen in Laptops

IT Unmasked   |  Mike Vizard   |  26 Aug, 2016

HP Sure View's privacy mode blocks all the light from the screen from being seen by anyone other than the primary user of the device.... More >

0 Comment

Carl Weinschenk

Lots of Traffic on Comcast’s OpenStack Platform

Data and Telecom   |  Carl Weinschenk   |  26 Aug, 2016

Traffic stats for Comcast and some lawsuits in the telco industry are in the news this week.... More >

0 Comment

Sue Marquette Poremba

The Increase and Impact of Cybercrime’s Costs

Data Security   |  Sue Marquette Poremba   |  25 Aug, 2016

As long as we want the opportunities and the conveniences the internet has to offer, we’re going to have to anticipate the costs of cybercrime in the value of doing business.... More >

0 Comment

Don Tennant

Startup Develops Wearable Aimed at Preventing Assaults on Women

From Under the Rug   |  Don Tennant   |  23 Aug, 2016

The wearable device can be activated to sound an alarm and send out a location-based text alert in the event of an attempted assault.... More >

0 Comment

Kachina Shaw

Video Roundtable: Smart Tech and Security High Priorities for Execs

Governance and Risk   |  Kachina Shaw   |  24 Sep, 2015

A panel of tech journalists will discuss "smart" technologies and security among other topics during a video roundtable focusing on new QuinStreet Enterprise research.... More >

0 Comment

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.