How CIOs Attract and Retain Talent
Every time we ask IT executives about recruiting and retainingIT talent, they tell us it’s becoming more difficultand moreconfusing. Despite outsourcing, are companies still committedto
Every time we ask IT executives about recruiting and retainingIT talent, they tell us it’s becoming more difficultand moreconfusing. Despite outsourcing, are companies still committedto
The market for portal, business process and middleware applications rose 16 percent in 2006, according to a new report from Gartner. According to the report,
Who will find the first major security flaw in Windows Vista? Will it be released as zero-day? Is there an end in sight to the
It happens all too often: one of the 480 attorneys at the Los Angeles-based law firm Sheppard, Mullin, Richter & Hampton LLP pulls aside CIO
Recently adopted technologies have been a success. Once-emerging technologies that have since been widely adopted almost always provide the business value their users hoped for.
A “highly critical” flaw in RealVNC’s virtual network computing software could allow malicious hackers to access a remote system without a password, according to a
A year ago at JavaOne, Fortify Software Founder and Chief Scientist Brian Chess gave a presentation titled “12 Java Technology Security Traps and How to
Nokia on May 10 announced new phones designed to help users save energy by notifying them when their phone has been charged. The phones feature
Microsoft on Dec. 5 warned that an unpatched vulnerability in its Word software program is being used in targeted, zero-day attacks. A security advisory from