Search CIO
Login Register
Explore the Network
  • TechTarget Network
  • Cloud Computing
  • Mobile Computing
  • Data Center
  • Sustainability and ESG
  • Search CIO
    • Apps, Infrastructure and Operations
    • CIO Strategy
    • Digital Transformation
    • Risk Management & Governance
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

Conference Notebook

IT Vendor Selection and Management

  • Cybersecurity and physical security: Key for 'smart' venues

    With sustainability being a huge driver of modern business development, protecting consumers' cyber- and physical security is an essential element when designing smart cities and venues.  Continue Reading

    Ben Cole
    By
    • Ben Cole, Executive Editor
Latest TechTarget resources
  • Cloud Computing
  • Mobile Computing
  • Data Center
  • Sustainability and ESG
Search Cloud Computing
  • A month-by-month roadmap for the three phases of FinOps

    How do you go about establishing a measurable and achievable plan to bring FinOps into your organization? Use this sample roadmap...

  • Nutanix sovereign cloud hits Broadcom with multi-cloud hook

    Nutanix expands its differentiation from Broadcom with a distributed sovereign cloud approach that supports both self-managed and...

  • Plan for repatriation on day one with a hybrid cloud strategy

    In the next 2 years, 87% of orgs plan to repatriate workloads off public cloud. Discover how an exit strategy, paired with hybrid...

Search Mobile Computing
  • Understanding QR code security issues for enterprise devices

    QR codes have many uses for organizations and their employees, but cybercriminals can take advantage of them, too. IT should keep...

  • Preventing attacks on mobile applications in the enterprise

    As mobile devices gain popularity as enterprise devices, mobile apps become a greater target for hackers. Understand the risks ...

  • Android vs. iPhone: Which one is more secure?

    Apple has built a reputation for strong device security, but reputation alone can't protect corporate data. While iOS and Android...

Search Data Center
  • Data center safety checklist: 10 best practices to follow

    Data center facilities pose various risks to those who operate them. Here are 10 best practices to follow when implementing data ...

  • Space-based data centers: Edge computing in space

    Space-based data centers, which enable edge computing in space, have the potential to revolutionize data management by reducing ...

  • Enhance operations with decentralized data centers

    Decentralized data centers enhance scalability, reduce latency and improve data compliance, offering a strategic shift for ...

Sustainability
and ESG
  • How ethical sourcing can improve supply chains

    Ethical sourcing can benefit supply chains, as it ensures suppliers' accountability and transparency, aligns with ESG goals, ...

  • 7 supply chain traceability challenges

    Supply chain traceability faces challenges, like data fragmentation and poor visibility, that complicate compliance with ...

  • How to launch a corporate recycling initiative

    Corporate recycling initiatives have gone beyond basics, and IT leaders play a crucial role in that. From physical to digital ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close