IT News and Events
May 16th, 2016 — May 22nd, 2016 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 219, Issue 3 << Previous Issue | Next Issue >>
IT - CxO
disable
CIO's guide to marketing automation software
CIO, May 19th, 2016
Enterprises Stumble on Data Management
Datamation, May 18th, 2016
Why CISO is the hardest tech role to fill
CIO, May 20th, 2016
Customers' digital behavior drives CIOs to partner with CDOs, CMOs
CIO, May 20th, 2016
IT - Storage
disable
Flash Reliability in Production
Storage Newsletter, May 18th, 2016
Enterprise Storage Shake-Up Coming via Cloud-Native
Information Management, May 19th, 2016
Backblaze releases billion-hour hard drive reliability report
BackBlaze, May 17th, 2016
IT - Security
disable
Brute force attacks and how to defend against them
InfoWorld, May 19th, 2016
Defend Yourself! Build a Cyber Security Database
InfoWorld, May 17th, 2016
Justice official: Info sharing is the best revenge
FCW, May 18th, 2016
Top 10 ways to retain IT security talent
CSO Online, May 19th, 2016
Detecting low and slow insider threats
CSO Online, May 19th, 2016
As the Phish, We All Need to Recognize the Baited Hook
ComputerWorld, May 18th, 2016
4 Huge Misconceptions About Business IT Security
Business 2 Community, May 20th, 2016
IT Pros Rely on These 5 Data Protection and Privacy Tools (and so should you)
CIO, May 17th, 2016
IT - AI
disable
Machine Learning For Dummies
O'Reilly, May 20th, 2016
Google has a new chip that makes machine learning way faster
ITWorld, May 18th, 2016
12 Ways AI Will Disrupt Your C-Suite (Slideshow)
InformationWeek, May 18th, 2016
Artificial Intelligence is no Longer Science Fiction, It's a Reality
TechZone360, May 18th, 2016
IT - Technology
disable
Researchers Design Six-State Magnetic Memory
Phys.org, May 18th, 2016
A cord-cutter's guide to digital TV antennas
CIO, May 20th, 2016
3 Technology Services for Which You're Definitely Overpaying
Business 2 Community, May 18th, 2016
IT - Bitcoin
disable
The Quick Death Of The Zero-Fee Bitcoin Transaction
CryptoCoinsNews, May 21st, 2016
IT - PM
disable
6 tips to ensure you meet project deliverables dates
CIO, May 18th, 2016
IT - Operations
disable
What's Driving (and Inhibiting) DCIM Software Adoption?
Data Center Knowledge, May 20th, 2016
IT - Linux
disable
Linux 4.6 is a major release: Here's what's new and improved
ZDNet, May 16th, 2016
Linux V.s Unix Hot Patching - Have We Reached The Tipping Point?
Forrester, May 18th, 2016
Choosing a Linux Desktop: 7 Tips
Datamation, May 20th, 2016
How To Prepare Linux System For PCI DSS Compliance
LinuxPitStop, May 19th, 2016
IT - FOSS
disable
The shift in open source: A new kind of platform war
Network World, May 18th, 2016
PeaZip
Linux Journal, May 20th, 2016
IT - DevOps
disable
As DevOps matures, IT ops evolve into an IT service provider
Search ITOperations, May 18th, 2016
Site reliability engineering kicks rote tasks out of IT ops
Search ITOperations, May 20th, 2016
Enterprises offer own twist on DevOps adoption
Search ITOperations, May 18th, 2016
Beyond Jenkins: 7 devops tools
InfoWorld, May 19th, 2016
DevOps Chat: Gene Kim, DevOps Enterprise Summit London 2016
devops.com, May 18th, 2016
DevOps is a Risky Business
devops.com, May 19th, 2016
IT - Cloud
disable
Cloud Vendor Relationship Management for Channel Partners
Search Channel, May 18th, 2016
Is Capacity Planning Dead In the Cloud Era?
NetworkComputing, May 18th, 2016
10 Security Reasons Why the Enterprise Still Fears the Cloud (Slideshow)
eWeek, May 19th, 2016
IT - Networks
disable
Upgrading the Network In Healthcare: Two Approaches
NetworkComputing, May 18th, 2016
GUI vs. CLI in Networking
NetworkComputing, May 18th, 2016
Wave 2 Wi-Fi Delivers Dramatic Performance Boost for Home Networks
Network World, May 16th, 2016
5 Secret Habits of Highly Successful Network Security Programs
Dark Reading, May 16th, 2016
IT - IoT
disable
IoT Growth Will Increase Risk of Distributed Denial-of-Service Attacks
v3 co uk, May 18th, 2016
IoT evolution begs for new thinking, new value systems
Search CIO, May 21st, 2016
Analyzing Data in the Internet of Things
O'Reilly, May 20th, 2016
IoT Security In The Enterprise: 8 Steps
Network Computing, May 19th, 2016
Two key open source IoT frameworks get cozy
HackerBoards.com, May 18th, 2016
New IoT security certification aims to make the world safer
CSO Online, May 20th, 2016
No IoT without IPv6
Network World, May 18th, 2016
IT - Careers
disable
It's Unfair to NOT Fire People
TLNT, May 16th, 2016
7 Deadly Career Mistakes Developers make
InfoWorld, May 16th, 2016
Here's How to Trick Your Brain into Making Smarter Mistakes
Fast Company, May 18th, 2016
10 fastest-growing tech skills (Slideshow)
ComputerWorld, May 21st, 2016
5 Things on You Should NEVER Say or Do on a Resume
Business 2 Community, May 19th, 2016
IT - Virtualization
disable
Ensure virtualization containers' security in an app world
Search ITOperations, May 20th, 2016
The 'New' IT Landscape: The rise of virtualisation
ITProPortal, May 19th, 2016
Worldwide Server Virtualization Market Reaches Its Peak, Gartner Says
Information Management, May 17th, 2016
IT - Email
disable
How Missing Emails Can Cost Companies Millions (Slideshow)
CIO Insight, May 21st, 2016
IT - BYOD
disable
Chromebooks surge past Macs in the U.S. for the first time
PCWorld, May 19th, 2016
The uncertain future of the tablet: a dying breed of device?
Information Age, May 20th, 2016
IT - Big Data
disable
5 Things You Need to Know About Data Exhaust
PC World, May 16th, 2016
How to Turn Big Data into Valuable Business Outcomes
insideBIGDATA, May 20th, 2016
The Difference between Data, Analytics, and Insights
Business 2 Community, May 17th, 2016
IT - Encryption
disable
Let's Encrypt: The Good and the Bad
Datamation, May 16th, 2016
Sections in this issue:
click to jump to section