CEOs want several things from today’s transformational CIOs, including superior communication, collaboration and risk mitigation skills, say executive recruiters. But a longer-term question looms: What becomes of the CIO? Read More ▶ |
|
| White Paper: NetApp Read this IDG Research survey to learn about the growing corporate embrace of all-flash arrays and the core benefits these new systems can deliver and the concerns that must be addressed to achieve even wider adoption. Read More ▶ | Top targets, domains and webmail services used by attackers, and a changing business model. Read More ▶ |
| Going digital for digital's sake doesn't always deliver the kinds of benefits enterprises need. First, define the business problem, then tell me how technology can solve it. Read More ▶ |
| CIOs who aren't learning what their customers want risk losing focus as they augment their business with digital capabilities. Read More ▶ |
| | Configure these 10 group policy settings carefully, and enjoy better Windows security across the office Read More ▶ |
| The H1-B visa issue found its way back into the public discourse. And, as usual, the press is not good for companies that use it. Here's what your firm can do. Read More ▶ |
| Bill Gates, Mark Zuckerberg, Edward Snowden, Donald Trump, others weigh in. Read More ▶ |
| It's going to be an exciting election season. We've nominated nine Android and iOS apps that can help you follow the races. Read More ▶ |
| When connected to a VPN service, the websites you access think you’re at the location where the VPN server is located. This can help anonymize your Internet traffic so it’s much harder for websites to track your personal browsing history. We evaluated seven services. Read More ▶ |
| Video/Webcast: Check Point Software Technologies Ltd. Join us live April 5th @11:00 AM EDT for this webcast to understand the trends that are disrupting the way security is managed today. Read More ▶ | Here’s how IT leaders from Procter & Gamble, Biogen and Google Ventures secured their seats. Learn more ▶ | These are the top security threats organizations face when using cloud services. Meet the 'Treacherous 12 ▶ |
|
|
|