Popular Articles Last 4 Weekly Issues, Grouped into Sections
Julie Cullivan, Wayne Shurts and Carol Zierhoffer share leadership insights from the other side of the table.
CIO, June 23rd, 2022
CIOs face a tough challenge in 2022 as they balance the need for technology investment and growth amid a growing call for fiscal prudence in uncertain economic conditions.
SearchCIO, June 15th, 2022
As inflation rises across the globe, CIOs are strategizing ways to navigate rising prices for IT supplies, services, and talent by rethinking IT portfolios, reprioritizing IT spend, and honing business efficiencies.
CIO, June 6th, 2022
IT governance can be a minefield for the unwary. Don't let these common errors damage your organization - and your career.
CIO, June 21st, 2022
From enabling virtual hiring to improving the customer experience, digital transformation has inexorably changed how companies do business. Here are four examples,,,
The Enterprisers Project, June 22nd, 2022
How have you changed as a leader over the past couple of years? Consider these three key leadership tenets and how you might apply them to become a stronger, more effective leader
The Enterprisers Project, June 23rd, 2022
Discover how a focus on three areas -- cybersecurity, employee experience and proactive management -- can help CIOs plan for and better manage disruptions.
SearchCIO, June 17th, 2022
The role of the CIO in 2022 is being shaped by a constellation of new technologies and the business's burning need to use them for competitive advantage.
SearchCIO, June 21st, 2022
IT leaders this year face hybrid work, inflation and the prospect for sustainability regulations, while they deal with perennial issues such as staff retention and cybersecurity.
SearchCIO, June 7th, 2022
Continuous monitoring is key to keeping up with software-as-a-service changes, but that's not all you'll need to get better visibility into your SaaS security.
DARK Reading, June 24th, 2022
Some of the programming languages on this list have been popular for quite a while; others are just beginning to win the favor of developers.
ITProToday, June 15th, 2022
Cybercriminals continue to launch creative social engineering attacks to trick users. Meanwhile, social engineering misconceptions are exacerbating the risks of falling victim.
CSO Online, June 24th, 2022
Cybersecurity has been changing rapidly over the past couple of years, due in no small part to the COVID-19 pandemic. In response, organizations have digitized at an unprecedented rate and, in the process, created new opportunities for cybersecurity shortfalls
Security Boulevard, June 16th, 2022
Last year, cybercrimes were fueled by the COVID19 pandemic after the sudden shift to work from home and hybrid working culture.
Security Boulevard, June 20th, 2022
By combining and automating all the elements required to handle a breach, it's possible to gain control over potentially devastating events.
eWeek, June 17th, 2022
The importance of wireless network security cannot be understated. With the proliferation of mobile devices and the popularity of public Wi-Fi hotspots, the potential for data breaches and other cybersecurity threats has increased exponentially.
Solutions Review, June 17th, 2022
If you Google 'How often should I do penetration testing?', the first answer that pops up is 'once a year.'
HelpNet Security, June 14th, 2022
A fundamental change of attitude to access credentials is required to give organizations a chance of regaining control over cyber security says Julia O'Toole, Founder and CEO of MyCena Security Solutions.
Continuity Central, June 15th, 2022
We look at global distributed file systems that put enterprise data under a single file access namespace so that enterprises and branch offices can get to data from anywhere
ComputerWeekly, June 23rd, 2022
Data gravity can attract increasing amounts of data, and brings with it onerous management overheads. We look at how to mitigate data gravity in datacentre and cloud
ComputerWeekly, June 17th, 2022
QLC flash memory is best for most read-intensive workloads, while TLC is suited to write-dominant workloads. Discover how QLC vs. TLC NAND are coexisting in the data center.
SearchStorage, June 23rd, 2022
20TB hard disk drives are soon going to be forgotten because 30TB models are on their way
Gestalt IT, June 13th, 2022
Long-term data storage can be done in the cloud, on disk drives, and optical disks, but each has some drawbacks.
Networkworld, June 20th, 2022
SSDs with larger capacities reliably post better performance numbers than smaller capacity drives of the same make and model. If you don't know anything about how SSDs work, this seems like a mystery, but the reason behind the slowdown makes perfect sense.
How-To Geek, June 9th, 2022
The more your business grows, the more complex your business's Data Architecture becomes. Enterprise Data Architecture challenges abound - from the beginning and throughout the journey.
Dataversity, June 21st, 2022
Due to pricing rise, increasing demand, and rush order
StorageNewsletter.com, June 7th, 2022
Just because you may not see errors on the part of artificial intelligence doesn't mean that things are fine. It's up to humans to look for ethical or other issues.
InformationWeek, June 16th, 2022
Academic researchers are developing projects to apply artificial intelligence to detect and stop cyberattacks and keep critical infrastructure secure, thanks to grants from the C3.ai Digital Transformation Institute.
DARKReading, June 15th, 2022
Deep learning software is revolutionizing the technology space by bringing in more accuracy and speed for data processing and making predictions and classifications.
Geekflare, June 15th, 2022
Python has become the most popular data science and machine learning programming language.
IT Business Edge, June 20th, 2022
The term machine learning refers to a computational system that has the ability to ingest data, analyze it and spot patterns and trends.
eWeek, June 16th, 2022
Integrating edge artificial intelligence (AI) is not a simple process. Early forms of artificial intelligence relied on the computer power of data centers to perform their processor-demanding tasks.
Dataversity, June 23rd, 2022
Synthetic data is often treated as a lower-quality substitute and used when real data is inconvenient to get, expensive or constrained by regulation.
Gartner, June 22nd, 2022
Getting AI Right in Finance Isn't Just About Investing the Most Time or Money
Gartner, June 22nd, 2022
In most organizations, artificial intelligence models are 'black boxes,' where only data scientists understand what exactly AI does. That can create significant risk for organizations.
SiliconANGLE , June 8th, 2022
Gartner forecasts that the cloud services industry will grow exponentially through 2022.
CXOtoday.com, June 21st, 2022
Organizations hoping to launch or expand cloud adoption initiatives must prepare for several key challenges beyond the core technology, but there are ways to get the job done right.
InformationWeek, June 6th, 2022
CIOs and ITDMs, ask these questions about how and why your org uses third-party consultants to plan hybrid cloud strategy and roll out change
The Enterprisers Project, June 21st, 2022
Multi-cloud solutions are great opportunities for IT organizations to drive value - but they must be setup and managed closely to deliver speed, flexibility, cost, and operational efficiency.
CIO, June 15th, 2022
In an interaction with CXOToday, Mr. Somenath Nag, VP - Marketing & Corporate Strategy, Calsoft discusses more about the Edge computing
CXOtoday.com, June 24th, 2022
The Cloud SecurityTechnical Reference Architecture offers approaches to cloud migration and data protection.
Virtuwise, June 23rd, 2022
Phishing and malware distribution on the rise, Trend Micro warns
techradar.pro, June 23rd, 2022
Email is the online equivalent of direct mail, with the same potential to grow your business exponentially.
Security Boulevard, June 7th, 2022
With the pandemic forcing professionals to work remotely for nearly two years, the implementation of digital platforms for organisations swiftly increased
TechNative, June 17th, 2022
There's been an astounding 84% increase in business email compromise (BEC) attacks, according to the latest NordLocker Email Threat Report, which compared half-yearly statistics.
Security Boulevard, June 21st, 2022
AT&T says 20Gbps services possible in the future
techradar.pro, June 13th, 2022
Team Blue's new lithography seems to be yielding impressive results
techradar.pro, June 15th, 2022
Star Trek's glowing circuit boards may not be so crazy
The Register, June 18th, 2022
Chip-level design breakthrough provides bandwidth boost for supercomputers and artificial intelligence (AI) applications
Networkworld, June 16th, 2022
CIOs share key best practices for IT leaders looking to level up with a mix of technical and business credentials aimed at growing their CIO role.
CIO, June 17th, 2022
Landing your next role takes more than just experience - skills like empathy and passion matter more than ever these days. Consider this advice for your next interview
The Enterprisers Project, June 10th, 2022
One tried and true way for IT professionals to differentiate themselves from the rest of the pack is to earn certifications in critical infrastructure technologies.
InformationWeek, June 17th, 2022
A shorter workweek is not necessarily the key to reducing team stress. Consider addressing these underlying problems first
The Enterprisers Project, June 17th, 2022
Replacing a legacy app with a SaaS alternative can be tedious. Create a checklist related to reliability, support and uptime to pick the right SaaS app and provider.
SearchCloudComputing, June 16th, 2022
The three core tenets of effective change management for SREs are progressive rollouts, monitoring, and safe and fast rollbacks.
opensource.com, June 22nd, 2022
ELK and Splunk are both well respected vendors in the log management and analysis space. Both offer broad monitoring and data analytics of security incidents, potential threats, and log performance. Buyers looking for a platform to address such needs are likely to find both on their list of strong candidates.
opensource.com, June 20th, 2022
SolarWinds released the findings of its ninth annual IT Trends Report which examines the acceleration of digital transformation efforts and its impact on IT departments.
HelpNet Security, June 16th, 2022
As the amount of data generated globally grows exponentially, data-driven businesses are increasingly turning to more innovative database management systems to store, manage, and process all that data.
Dataversity, June 16th, 2022
Some of the most compelling enhancements unveiled at MongoDB World revolve around new analytics capabilities in the upcoming version 6.0 release of the NoSQL database.
datanami, June 9th, 2022
This week is MongoDB World 2022, and for those of us who were around for MongoDB 2014 (like me), it's fair to say that much has changed over the past eight years for the company and industry.
TechRepublic, June 8th, 2022
Points to consider when selecting an SD-WAN solution include WAN/LAN branch architecture, deployment and service provisioning, and centralized management.
CIO, June 14th, 2022
Number of 5G mobile subscriptions is expected to hit 1 billion worldwide by year-end, with North East Asia and North America clocking 19% and 28% penetration rate, respectively, in 2021.
ZDNet, June 21st, 2022
Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.
SearchNetworking, June 22nd, 2022
You don't hire based on traditional roles. Instead, ask candidates the problem the business wants to solve.
InformationWeek, June 22nd, 2022
Finding and retaining top IT talent is harder than ever these days. Here are three leading obstacles - and how to overcome them
The Enterprisers Project, June 15th, 2022
Human Leadership Improves Talent Outcomes Yet Only 29% of Employees Believe Their Leader Exhibits Human Leadership
Gartner, June 23rd, 2022
Join other educators interested in sparking more innovation, energy and adaptability in their classroom - practical guidance for new methods
L-EAF, June 13th, 2022
These professional development sites for education will help teachers refresh and update their practice
Tech&Learning, June 15th, 2022
With cyberattacks against K-12 school districts growing, IT leaders want to know which better protects their networks - local or cloud storage.
EdTech, June 15th, 2022
While data-driven digital platforms and the recent pandemic have opened new and novel opportunities for businesses to go beyond geographical borders and compete in truly global business environments, an average business faces tremendous pressure to demonstrate the value of their operations.
Dataversity, June 14th, 2022
Big Data analytics requirements have forced a huge shift in data storage paradigms, from traditional block- and file-based storage networks to more scalable models like object storage, scale-out NAS and data lakes
IT Business Edge, June 15th, 2022
'The main purpose of a data model is actually not to design a database-it's to describe a business,' said Christopher Bradley, information strategist at DMA Advisors.
Dataversity, June 22nd, 2022
In this article, we shall a list of useful Linux security features that every system administrator should know. We also share some useful tools to help a system admin ensure security on their Linux servers.
Techmint, June 20th, 2022
Are you a newcomer to Linux? Not sure which Linux distribution to choose to begin your Linux journey? This article is for you!
linuxiac, June 14th, 2022
Forcing Users To Enter Sudo Password For Each Command In Linux
OSTechNix, June 21st, 2022
The tech world is filled with three-letter acronyms that ebb and flow like tides. The buzz phrase 'enterprise resource planning,' (ERP), first appeared on PowerPoint slides in the 1990s.
VentureBeat, June 8th, 2022
The transformative events of the past few years may finally sound the death knell for traditional ERP systems as enterprises seek agility, flexibility, and speed
CIO, June 15th, 2022
Jupiter, Europe's first exascale supercomputer, looks like it could be using NVMe SSDs, disk, IBM's Spectrum Scale parallel file system, TSM backup, and LTO tape for its storage infrastructure.
Blocks & Files, June 21st, 2022
Exascale supercomputing is just as important to Europe as it is to the United States and China, but each of these geopolitical regions on Earth has its own way of developing architectures, funding their development and production, and figuring out where the best HPC centers are to host such machines to maximize their effectiveness.
The Next Platform, June 15th, 2022
We have seen a spate of cloud service provider outages with overly negative economic impact.
Security Boulevard, June 23rd, 2022
Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.
TechTarget, June 10th, 2022
We talk with the Chief Information Officer (CIO) of Oshkosh Corp., Anu Khare, about their innovation and digital transformation investment strategy.
CXOTalk, June 13th, 2022
Zero trust security has become a topic at the forefront of IT and security-related conversations. Zero trust puts an end to compromised identities.
CXOTalk, June 21st, 2022
Modern enterprises are becoming increasingly aware of the need for customer-centric products and marketing to influence positive customer outcomes.
AiTHORITY, June 18th, 2022
Survey Finds 72% of B2B Buyers Have Completed a Significant Transaction Through Digital Commerce
Gartner, June 21st, 2022
We're going to need a corkboard, push pins, red yarn and emails dating back to 2003
The Register, June 17th, 2022
Business analytics has become invaluable for CIOs of companies that want to bolster their competitiveness in the new economy
SmartDataCollective, June 15th, 2022
Members of the Opensource.com community recommend this mix of books covering everything from a fun cozy mystery to non-fiction works that explore thought-provoking topics.
opensource.com, June 21st, 2022
The IoT Landscape and Threats
Security Boulevard, June 23rd, 2022
Public key infrastructure helps authenticate senders via cryptography and digital certificates. Learn about three types of PKI certificates and their use cases.
SearchSecurity, June 10th, 2022
SAP and Salesforce are two of the top customer relationship management (CRM) solutions on the market today.
CIOinsight, June 11th, 2022
IT disaster recovery, cloud computing and information security news
Continuity Central, June 16th, 2022
As part of Solutions Review's Premium Content Series-a collection of contributed columns written by industry experts in maturing software categories-Jay McGrath, the Chief Revenue Officer at Tonkean, shares insights on the value sales automation software provides Revenue Operations (RevOps) teams.
Solutions Review, June 24th, 2022
Regardless of whether the overall economy is experiencing a correction or is on the cusp of a recession, organizations are going to prioritize some projects over others as resources become more constrained.
DevOps.com, June 21st, 2022
For would-be quantum programmers scratching their heads over how to jump into the game as quantum computers proliferate and become publicly accessible, a new beginner's guide provides a thorough introduction to quantum algorithms and their implementation on existing hardware
HPCWire, June 14th, 2022