News

News

  • August 29, 2014 29 Aug'14

    What do the new Samsung, Ralph Lauren wearables augur for CIOs?

    When Samsung, Apple and Ralph Lauren jump on the wearables trend, can enterprise employees be far behind? Also in Searchlight: Dropbox toughs it out as Google, Amazon offer cloud on the cheap; Uber tricks Lyft and other rivals.

  • August 22, 2014 22 Aug'14

    Health system's Heartbleed hack of patient data underscores need for speed

    Heartbleed resurfaces in a Tennessee health system's breach, and UPS customers' data is in danger. Is assuming the worst enough? Also in Searchlight: Steve Ballmer signs off from Microsoft's board; Twitter, Facebook tinker with more experiments.

  • August 15, 2014 15 Aug'14

    How to develop a clear cloud contract with your provider

    Crafting a specific, clearly defined cloud contract with your provider is crucial to staving off security problems and SLA breaches. In this tweet jam recap, participants shared tips on how to best communicate needs to cloud providers.

  • August 15, 2014 15 Aug'14

    While SpiderOak canary defies NSA, CIOs ponder their privacy bind

    CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.

  • August 13, 2014 13 Aug'14

    Two-speed IT marries agile and waterfall development approaches

    At John Deere, two-speed IT enables agile and waterfall development approaches to live side by side.

  • Sponsored News

    • September 02, 2014 02 Sep'14

      The Perfect Storm in Cybersecurity: A 3-Step Plan to Maximize Protection

      The cyberthreat landscape is becoming more sophisticated and coordinated. According to the Symantec 2014 Internet Security Threat Report, 2013 was “The Year of the Mega Data Breach.”

    • August 29, 2014 29 Aug'14

      Frequently Asked Questions: Why You Need Multi-Layer Protection

      Viruses have given way to targeted attacks designed to exploit any and all vulnerabilities within an enterprise. Attacks can come from anywhere at any time, directed at your weakest points, including email accounts, commonly used websites, social media and mobile devices, among others.

    • August 28, 2014 28 Aug'14

      How to enable employee productivity with apps

      One of the key byproducts of IT consumerization and the bring-your-own-device trend is the increasing incidence and diversity of work applications for mobile devices. From document readers/editors to collaboration and communication apps, mobile users now have a wealth of software literally at their fingertips.

    • August 28, 2014 28 Aug'14

      5 Must-Haves for an Enterprise Mobility Management Solution

      Mobility has become an increasingly important part of how organizations not only deploy technology, but also do business. Trends such as bring your own device (BYOD), telecommuting, mobile application development and anywhere/anytime connectivity have redefined IT architectures and reshaped infrastructure decisions from the data center to the network’s edge. IT consumerization has altered the boundaries between work and personal use: Research indicates that 88% of people use smartphones for work while they are on personal time.

    View All Sponsored News
  • August 11, 2014 11 Aug'14

    Chief digital officer vs. chief data officer: Who will win the day?

    Will the chief digital officer outlive the chief data officer? Where should data experts draw the line in the sand on data quality? The Data Mill reports.

  • August 08, 2014 08 Aug'14

    Use Russian hackers to demand better security

    The hijack of 1.2 billion passwords got the world's attention this week. CIOs struggling to enforce security should take advantage of it, says one expert. Also in Searchlight: Walgreens CFO is replaced and its CIO takes on two IT shops.

  • August 07, 2014 07 Aug'14

    How to manage traditional IT vs. cloud services providers

    As organizations change the way they consume technology resources, cloud services providers emerge as worthy challengers to traditional vendors. As such, they require a deft IT management touch, our tweet jammers say.

  • August 05, 2014 05 Aug'14

    AT&T CIO says customer relations will be 80% digital by 2020

    Thaddeus Arroyo, AT&T CIO and winner of the 2014 MIT Sloan CIO Leadership Award, outlines a 'bold' digital-first strategy for internal employees and the company's external customers.

  • August 04, 2014 04 Aug'14

    Dig into cloud provider management for competitive gain

    As the cloud evolves, so do cloud providers' ability to meet enterprise IT demands. In this tweet jam recap, find out how you can turn your provider management strategy into a competitive advantage.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close