Careers

Articles

Cloud Adoption a ‘Runaway Train’ That’s Putting Jobs at Risk, CEO Says

Dave Link, founder and CEO of ScienceLogic, says IT professionals' jobs are at risk and they need to take action. More >

Seven Tips for Staying Employable in the ‘Smart Machine Age’

Ed Hess and Katherine Ludwig argue that adapting and staying employable in what they call the “Smart Machine Age” requires a willingness to learn new skills and to embrace certain behaviors. More >

Decisions, Decisions: IT in a Changing Digital Environment

The speed of emerging data operations will dictate that changes will be fast and furious going forward, so IT infrastructure must be flexible above all, and that includes the people who oversee it. More >

The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. More >

The Deep Learning HR Service That Could Have Made Carly Fiorina President

Analyst Rob Enderle looks at the problem that Fiorina needed to solve, the tool he recently ran into that could have solved it, and the future of deep learning in HR. More >

ServiceNow Aims to Apply Machine Learning Algorithms to Workflow

While there’s a lot of interest in machine learning algorithms, very little of that research is being applied to improving the way people work. More >

More Articles >

Interviews

Cloud Adoption a ‘Runaway Train’ That’s Putting Jobs at Risk, CEO Says

Dave Link, founder and CEO of ScienceLogic, says IT professionals' jobs are at risk and they need to take action.

More >

CIOs Need to Provide a Single Platform, Not an Edict, to Eradicate Shadow IT

CIOs, to deal with shadow IT, have to provide business units with the means to do what they need to do without having to resort to sourcing technology on their own.

More >

How Citrix’s First CSO Addressed Internal IT Security Issues

Stan Black, Citrix's first CSO, says he implemented a more consistent and uniform approach to how every function at Citrix consistently protects the business.

More >

More Interviews >

Most Popular Features

Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.

Intel Stakes IoT Claim

The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.

2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.

Editor's Choice

Making Shadow IT Work for the Enterprise

Shadow IT can only remain in the shadows if IT allows it. Providing greater autonomy to users, developers, business units and tech admins will produce a more dynamic, flexible approach to workflow management.

 More >

Intel Outlines Ambitions for Transforming Retail

9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

IT Leaders Need to Be Business Leaders First, CIO Says

IoT’s Growing Pains Put Devices at Risk for Ransomware

 

Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs...

Job Description: Technology Project Manager

Whether you're looking to hire one or looking for a position yourself, use this detailed job description to find out what ...

Strategy2.jpg Case Studies in Strategic Planning

Chapter 1 delves into the first four stages of systematic strategic planning, including clarifying current conditions, ide...

Infra81.jpg Software Quality Assurance: Integrating Testing, Security, and Audit

This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.