• February 26, 2016 26 Feb'16

    UN CITO dreams of foiling dark web with 'Digital Blue Helmets'

    UN CITO Atefeh Riazi is taking steps to make the United Nations' IT group more agile and more able to focus on innovation. She also has a plan for taking on the dark web.

  • February 26, 2016 26 Feb'16

    Use cases will dictate 3D printing strategy

    Should businesses invest in 3D printing technology? Only the use cases can answer that question, according to experts.

  • February 23, 2016 23 Feb'16

    Do the feds need Apple to bypass smartphone encryption?

    The FBI wants Apple to help it disable the smartphone encryption on a device connected to a terrorism case. Here's what to know about a government DIY job.

  • February 23, 2016 23 Feb'16

    U.S. lacks law to make Apple help bypass encryption

    The government is using a 1789 law to get Apple to help the FBI bypass encryption on an iPhone used by a suspect in the San Bernardino killing spree.

  • February 23, 2016 23 Feb'16

    Life under a new encryption law

    There's no law requiring Apple to decrypt information on a phone connected to December's terrorist attack in San Bernardino, Calif. But what if a new encryption law were passed?

  • Sponsored News

    • Eliminating the App Learning Curve for Users Speeds Up Digital Transformation

      Digital transformation changes how business processes are completed, with new apps and services being essential elements in the entire process. Understandably, the focus of many businesses has been on the design, creation, and deployment of these apps. But they are beginning to realize that they cannot afford to ignore perhaps the most important aspect of launching new software: user adoption. Put simply, if workers don’t use the new apps and digital services, nothing has transformed. Costly digital transformations can come to naught. This is not an edge case that most organizations don’t have to worry about. According to a McKinsey study, 70% of digital transformation initiatives fail, with much of the problem resulting from a lack of adoption. See More

    • Three Tenets of Security Protection for State and Local Government and Education (SLED)

      Security is the utmost priority for IT decision-makers in state and local government and education. Government agencies, schools and citizens are frequent, highly visible targets for cybercriminals, and their systems contain personal data that is extremely valuable on the Dark Web, such as Social Security numbers. See More

    • Microapps Empower the Modern Workforce

      Digital transformation has rewritten the processes and activities that support the modern organization. Many of these changes have improved the employee experience, but perhaps none so much as the move from monolithic applications to microapps. See More

    • Exploring AI Use Cases Across Education and Government

      Artificial intelligence has the potential to transform how public sector and educational institutions operate, innovate and serve the needs of their constituents. When used strategically, AI can enable greater efficiencies, eliminate silos, strengthen cybersecurity and help organizations unlock the value of their data. See More

    View All Sponsored News
  • February 19, 2016 19 Feb'16

    VR might be headed to the enterprise; Apple-FBI's 'backdoor' battle

    Think augmented and virtual reality technologies are just for gamers and those looking to impress their dinner guests? Think again. In this week's Data Mill column, experts at Deloitte discuss how ...

  • February 19, 2016 19 Feb'16

    Apple fight gives glimpse of a 'backdoor' world

    A federal court orders Apple to help feds unlock a phone in its San Bernardino case; CEO Cook opposes. Also in Searchlight: AT&T reveals 5G plans; IBM's blockchain gambit.

  • February 15, 2016 15 Feb'16

    Augmented and virtual reality make a play for the enterprise

    Augmented and virtual reality are breaking out of the consumer space and into the enterprise. Deloitte explains why it's a good time for CIOs to get ready: The Data Mill reports.

  • February 12, 2016 12 Feb'16

    Obama's cybersecurity plan draws muted praise; CIOs step up in mobile app delivery

    The federal government is stepping in to take on cyberthreats. In President Obama's new $19 billion national cybersecurity proposal, he aims to significantly beef up cybersecurity, but will it be ...

  • February 12, 2016 12 Feb'16

    Obama's $19B cybersecurity plan takes aim at cybercrime, underscores skills gap

    President Obama's new national cybersecurity plan will beef up cyberdefense, but does it do enough to close the cyber-skills gap? Also in Searchlight: The Obama family's Wi-Fi is patchy; Twitter posts lackluster earnings.

  • February 11, 2016 11 Feb'16

    Two CEO-CIO partnerships on display at CIO conference

    Does it make a difference if the CIO reports to the CEO? These two CEO-CIO partnerships make the case for a reporting line to the top.

  • February 09, 2016 09 Feb'16

    The CEO-CIO business partnership in action

    Two dynamic CEO-CIO relationships were on display at the SIM Boston Technology Leadership Summit, proving that reporting lines count for CIOs bent on shaping business goals.

  • February 05, 2016 05 Feb'16

    Intel diversity report shows progress; how to bolster security in the cloud age

    Intel's annual diversity report was released this week, shows that it's made some headway into increasing its workforce diversity: 43.1% of new hires last year were women or minorities, and there ...

  • February 05, 2016 05 Feb'16

    Intel report puts spotlight on diversity at work

    A new report from Intel on its efforts to increase diversity at work is noteworthy for its transparency. Will it spark industry change? Also: Yahoo struggling to keep employees; wearables' upward trend.

  • February 01, 2016 01 Feb'16

    Want to go the private cloud computing route? It's no breeze

    Private cloud computing comes with many benefits, but building and managing it is no simple feat. Does your company have what it takes?