Physical Security: A New IT Challenge
By Ned Miller When you think of IT threat management, you typically think of the terms phishing, spoofing, viruses, port scanners, worms and Trojan horses.
By Ned Miller When you think of IT threat management, you typically think of the terms phishing, spoofing, viruses, port scanners, worms and Trojan horses.
By James Mercer When I talk to other IT directors about my decision to embrace cloud storage as part of Flexi-Van’s data storage strategy, I
By Richard Chew There may be disputes as to when the term “big data” was first used: Some date it back to 2000, while others
By Steve Culp In the world of risk management, the continuing increase in volatility, uncertainty, complexity and ambiguity has given rise to a new acronym—VUCA—and
By Christian Crank Let’s be honest and admit that we’re obsessed with our mobile devices: Our smartphones, tablets and laptops are with us at all
By Edward Jones Windows 8 is one of the more controversial operating systems in Microsoft’s recent history. In this brief guide, we identify how to
By Shravan Goli Twenty years ago, I graduated from the University of Maryland with my Master’s degree in computer science. From my first days as
By John Goodman Customer experience is a top priority for 86 percent of executives, according to Gartner’s “Amplifying the Enterprise: The CIO Agenda” report. Technology
All companies want to hire top talent. The catch: Many don’t know how. The competition to find and hire the right candidate—along with the increased