News

News

  • February 26, 2016 26 Feb'16

    Use cases will dictate 3D printing strategy

    Should businesses invest in 3D printing technology? Only the use cases can answer that question, according to experts.

  • February 23, 2016 23 Feb'16

    Do the feds need Apple to bypass smartphone encryption?

    The FBI wants Apple to help it disable the smartphone encryption on a device connected to a terrorism case. Here's what to know about a government DIY job.

  • February 23, 2016 23 Feb'16

    U.S. lacks law to make Apple help bypass encryption

    The government is using a 1789 law to get Apple to help the FBI bypass encryption on an iPhone used by a suspect in the San Bernardino killing spree.

  • February 23, 2016 23 Feb'16

    Life under a new encryption law

    There's no law requiring Apple to decrypt information on a phone connected to December's terrorist attack in San Bernardino, Calif. But what if a new encryption law were passed?

  • February 19, 2016 19 Feb'16

    VR might be headed to the enterprise; Apple-FBI's 'backdoor' battle

    Think augmented and virtual reality technologies are just for gamers and those looking to impress their dinner guests? Think again. In this week's Data Mill column, experts at Deloitte discuss how ...

  • Sponsored News

    • Want Engaged and Inspired Employees? Give Them the Digital Workspace of Their Dreams

      In the past couple of months, there has been a lot of discussion about improving the employee experience, with the recognition that employee engagement is a necessary precursor to an improved customer experience. Sir Richard Branson stated the need to do this quite clearly: “It sort of should go without saying—and it's surprising that it still doesn't go without saying at some companies—if the person who works at your company is 100% proud of the job they're doing, if you give them the tools to do a good job, they're proud of the brand, if they were looked after, if they're treated well, then they're going to be smiling, they're going to be happy, and therefore the customer will have a nice experience.” See More

    • Three Tenets of Security Protection for State and Local Government and Education (SLED)

      Security is the utmost priority for IT decision-makers in state and local government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data that is extremely valuable on the Dark Web, such as Social Security numbers. See More

    • Deploying a Digital Workspace? Three Critical Capabilities to Look For

      Adoption of digital workspace technology is growing at a rapid pace. Digital workspace deployment growth is well over 20% per year, according to a report by MarketsandMarkets. As organizations evaluate and choose the platform that will provide critical support to employees and users, making the right decision is imperative. See More

    • Exploring AI Use Cases Across Education and Government

      Artificial intelligence has the potential to transform how public sector and educational institutions operate, innovate and serve the needs of their constituents. When used strategically, AI can enable greater efficiencies, eliminate silos, strengthen cybersecurity and help organizations unlock the value of their data. See More

    View All Sponsored News
  • February 19, 2016 19 Feb'16

    Apple fight gives glimpse of a 'backdoor' world

    A federal court orders Apple to help feds unlock a phone in its San Bernardino case; CEO Cook opposes. Also in Searchlight: AT&T reveals 5G plans; IBM's blockchain gambit.

  • February 15, 2016 15 Feb'16

    Augmented and virtual reality make a play for the enterprise

    Augmented and virtual reality are breaking out of the consumer space and into the enterprise. Deloitte explains why it's a good time for CIOs to get ready: The Data Mill reports.

  • February 12, 2016 12 Feb'16

    Obama's cybersecurity plan draws muted praise; CIOs step up in mobile app delivery

    The federal government is stepping in to take on cyberthreats. In President Obama's new $19 billion national cybersecurity proposal, he aims to significantly beef up cybersecurity, but will it be ...

  • February 12, 2016 12 Feb'16

    Obama's $19B cybersecurity plan takes aim at cybercrime, underscores skills gap

    President Obama's new national cybersecurity plan will beef up cyberdefense, but does it do enough to close the cyber-skills gap? Also in Searchlight: The Obama family's Wi-Fi is patchy; Twitter posts lackluster earnings.

  • February 11, 2016 11 Feb'16

    Two CEO-CIO partnerships on display at CIO conference

    Does it make a difference if the CIO reports to the CEO? These two CEO-CIO partnerships make the case for a reporting line to the top.

  • February 09, 2016 09 Feb'16

    The CEO-CIO business partnership in action

    Two dynamic CEO-CIO relationships were on display at the SIM Boston Technology Leadership Summit, proving that reporting lines count for CIOs bent on shaping business goals.

  • February 05, 2016 05 Feb'16

    Intel diversity report shows progress; how to bolster security in the cloud age

    Intel's annual diversity report was released this week, shows that it's made some headway into increasing its workforce diversity: 43.1% of new hires last year were women or minorities, and there ...

  • February 05, 2016 05 Feb'16

    Intel report puts spotlight on diversity at work

    A new report from Intel on its efforts to increase diversity at work is noteworthy for its transparency. Will it spark industry change? Also: Yahoo struggling to keep employees; wearables' upward trend.

  • February 01, 2016 01 Feb'16

    Want to go the private cloud computing route? It's no breeze

    Private cloud computing comes with many benefits, but building and managing it is no simple feat. Does your company have what it takes?

  • February 01, 2016 01 Feb'16

    The private versus public cloud dilemma: Start with cost

    Building a private cloud offers a host of appealing benefits, including a scalable computing base and speed as a result of standardization. It's a cloud implementation that has worked wonderfully for some organizations, including financial services ...

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close