IT News and Events
Aug 8th, 2016 — Aug 14th, 2016 Generate the Custom HTML Email for this Issue
IT News and Events IT News and Events
Volume 222, Issue 2 << Previous Issue | Next Issue >>
IT - CxO
disable
The Rise Of The Creative CIO (Slideshow)
CIO Insight, August 11th, 2016
4 Traits Of Top Leaders In Tech
CIO, August 11th, 2016
Is Your It Team Reactive Or Strategic? (Slideshow)
CIO Insight, August 12th, 2016
Global IT Security Spending Will Top $81 Billion In 2016
InformationWeek, August 9th, 2016
Anatomy Of A Service Outage: How Did We Get Here?
NetworkWorld, August 11th, 2016
Why Measuring It Productivity Is So Challenging
The Enterprisers Project, August 8th, 2016
Four IT Trends CIOs Need to Know About
HelpNet Security, August 8th, 2016
The 7 Deadly Sins Of Bad Managers
TLNT, August 10th, 2016
IT - Storage
disable
32TB SAS SSD by Samsung, Record Capacity in 2.5-Inch Form Factor
StorageNewsletter.com, August 11th, 2016
Choosing An All-flash Array
NetworkComputing, August 9th, 2016
DCIG 2016-17 Midmarket Enterprise Storage Array Buyer's Guide
StorageNewsletter.com, August 12th, 2016
'World's largest' SSD Revealed as Seagate Unveils 60TB monster
ZDNet, August 10th, 2016
Nine Reasons Object-level Storage Adoption Has Increased
SearchStorage, August 12th, 2016
Liqid and Kingston Claim Fastest 2.5-Inch SSD
StorageNewsletter.com, August 12th, 2016
IT - Security
disable
Disable WPSD Now Or Have Your Accounts And Private Data Compromised
ComputerWorld, August 10th, 2016
6 Shocking Gaps In Your Data Security Strategy (Slideshow)
CSO Online, August 11th, 2016
Sounds From Your Hard Disk Drive Can Be Used To Steal A PC's Data
ComputerWorld, August 12th, 2016
Why Software-defined Security Can Strengthen Branch Office Weak Links (Slideshow)
eWeek, August 12th, 2016
Worldwide Information Security Spending Expected To Top $80 Billion In 2016
ITProPortal, August 12th, 2016
The Advanced Security Techniques Of Criminal Hackers
JavaWorld, August 5th, 2016
How Well Does Social Engineering Work? One Test Returned 150%
Network World, August 11th, 2016
Top 10 Websites To Refresh Your Hacking Skills
TechWorm, August 13th, 2016
Complexity Is The Enemy Of Security
ComputerWorld, August 8th, 2016
How Can You Detect A Fake Ransom Letter? (Slideshow)
CSO Online, August 8th, 2016
Periodic Password Changes -- Good Or Bad?
ComputerWorld, August 8th, 2016
Security Still The Biggest Challenge In Cloud Management
HelpNet Security, August 9th, 2016
Spearphishing: It's Curiosity That Makes Them Click
Dark Reading, August 9th, 2016
With Prevention Efforts Failing, It Security Focus Turns To Reaction
Information Management, August 10th, 2016
Information Security Ignorance Is Not A Defense
ComputerWorld, August 11th, 2016
IT - AI
disable
Is Artificial Intelligence The Next Frontier For Identity Management?
Business 2 Community, August 12th, 2016
Apache Mahout - People Familiar With R Will Have A Leg Up
jaxenter, August 11th, 2016
IT - Technology
disable
Drop The Jackhammer And Fix Your Bridge With This Giant Waterpik
Wired, August 10th, 2016
Understanding The Differences Between Virtual Reality, Augmented Reality And Mixed Reality
Network World, August 10th, 2016
IT - Bitcoin
disable
IRS At A Standstill with Bitcoin; Users and Tax Professionals Remain in the Dark
CryptoCoinsNews, August 10th, 2016
Bitcoin Volume In Venezuela Surging Amid Hyperinflation
NEWSBTC, August 8th, 2016
A $99 Trezor Could Have Prevented The $70m Bitfinex Theft
bitcoin.com, August 10th, 2016
Russia Reverses Plan To Penalize Bitcoin Use
CryptoCoinsNews, August 13th, 2016
IT - PM
disable
7 Traits Of An Exceptional Software Project Manager
Business 2 Community, August 12th, 2016
9 Things Great Project Leaders Do Every Day (Slideshow)
CIO, August 11th, 2016
5 Styles Of Project Collaboration And When To Use Them
TechRepublic, August 9th, 2016
IT - Operations
disable
Delta Outage Raises Backup Data Center, Power Questions
SearchDataCenter, August 12th, 2016
IT - Server
disable
New Open Standard Seeks Home In The Enterprise Data Center Rack
SearchDataCenter, August 10th, 2016
IT - Linux
disable
A Brief Introduction To Linux Containers And Image Signing
opensouce.com, August 11th, 2016
IT - FOSS
disable
4 Alternatives To Ghost For Disk Cloning
opensouce.com, August 12th, 2016
IT - HPC
disable
HPC Short Courses Consortium Announces Autumn Academy for HPC
HPCWire, August 12th, 2016
IT - DevOps
disable
Why Your Organization Needs DevOps
devops.com, August 11th, 2016
Are You Getting The Full Benefit Of DevOps?
CIO, August 11th, 2016
Automotive Industry Is Driving Innovation With DevOps
ITProPortal, August 10th, 2016
IT - Cloud
disable
Public Vs. Private Vs. Hybrid Cloud - Exploring The Use Cases
Business 2 Community, August 12th, 2016
Why Cloud Migration Is Still A Work In Progress (Slideshow)
CIO Insight, August 10th, 2016
IDC: Global Public Cloud Services Will Reach $195 Billion By 2020
InformationWeek, August 12th, 2016
Microsoft To Drop Azure Remoteapp In Favor Of Citrix Virtualization Technologies
ZDNet, August 12th, 2016
How Does Compliance Differ In The Cloud Versus On-premise?
Business 2 Community, August 9th, 2016
The Cloud Computing Effect: Better Security For All
InfoWorld, August 9th, 2016
IT - DR
disable
Delta Outage Is A Wake-up Call For IT Execs, CEOs
Search CIO, August 12th, 2016
Disaster Recovery More Important To IT Than It Is To Business Execs
eWeek, August 10th, 2016
IT - Networks
disable
Managing Network Sprawl
Network Computing, August 10th, 2016
Putting IPv6 Vulnerabilities Under The Microscope
SearchSecurity, August 11th, 2016
Uncovering Network Performance Killers
Network Computing, August 11th, 2016
Four Things To Consider Before Upgrading Your Data Center Net To 25G
Network World, August 10th, 2016
Managing The IPv6 Transition In The Enterprise
Network Computing, August 12th, 2016
IT - IoT
disable
Time To Monetize The IoT
ComputerWorld, August 12th, 2016
The Rise Of Business-driven IoT
Data Center Knowledge, August 11th, 2016
IoT Market Could Top $3 Trillion By 2025, Report Finds
InformationWorld, August 10th, 2016
What CISOs Need To Know About Securing The Internet Of Things
ITProPortal, August 12th, 2016
AWS IoT Button: Introduction
SmartDataCollective, August 13th, 2016
Beyond The M2M Narrative: The Internet Of Things Grows Bigger
jaxenter, August 11th, 2016
10 IoT Security Best Practices for IT Pros (Slideshow)
InformationWeek, August 9th, 2016
IT - Careers
disable
Six Habits Of Champions
Fast Company, August 9th, 2016
7 Cyber-Security Skills In High Demand
InformationWeek, August 8th, 2016
Rethinking HR Practices To Attract And Retain IT Talent
ITProPortal, August 13th, 2016
10 Tips To Master The Art Of The Career Humblebrag
CIO, August 9th, 2016
Solving Useful Problems: Innovation At Work
Business 2 Community, August 10th, 2016
These 4 Hobbies Can Actually Improve Job Performance
Fast Company, August 9th, 2016
IT - Big Data
disable
Build A Strong Work Culture With Big Data
insideBIGDATA, August 13th, 2016
Getting Serious About Big Data Security
SmartDataCollective, August 10th, 2016
Can Big Data Really Help You Understand Buying Intent?
Business 2 Community, August 11th, 2016
Caution: Predictive Analytics May Miss One Important Thing
Business 2 Community, August 9th, 2016
Data Protection From The Inside Out
Dark Reading, August 8th, 2016
Do You Know Big Data?
CloudTweaks, August 9th, 2016
IT - Encryption
disable
Does Encrypting Data Make Access Harder For Regulators?
SearchSecurity , August 10th, 2016
Encryption Basics: How It Works & Why You Need It
SearchSecurity, August 11th, 2016
'Golden Keys' That Unlock Windows' Secure Boot Protection Discovered
PC World, August 11th, 2016
IT - Java
disable
Microservices, Java-on-Java Top Oracle's JVM Design Goals
ITWorld, August 10th, 2016
IT - Developer
disable
Want Secure Code? Give Devs The Right Tools
JavaWorld, August 11th, 2016
Sections in this issue:
click to jump to section