Topics
Content Types
About 19 results
-
IT leadership faces new pressure in late 2013
Here are a few ways that the role of the office leader has evolved, and what the transition means for the man or woman running the IT show.
-
Making the case for claims-based identity
An important part of your overall Information Technology security strategy needs to account for how your application will handle user identity. Claims-based identity as a strategy ...
-
Five pitfalls to avoid when implementing BYOD strategy
When it comes to mobile devices, BYOD can be a serious threat to company security. Businesses of any size must be careful and use the proper MDM procedures to neutralize these thre...
-
IT operations is king: How to find the best people
Operation pros are not easy to find. They must possess strong technical skills with a host of communications and collaborations skills to boot. Here's what IT managers should look ...
-
Improve the image of your IT department
Sometimes the stereotypical image of your department keeps you from getting the job done. Learn how to fight this image to benefit your employees and the company as a whole.
-
Enterprises are moving to the "suite" life
There are dozens of vendors selling mobile device management, file sharing, desktop management, remote desktop access, desktop virtualization, and other systems. But more recently,...
-
SaaS: Keep complexity and short timelines from affecting quality
This blog discusses some strategies for building high quality SaaS products.
-
Catch a bug with monitoring
Development of business and functionality monitors should be a part of any project scope.
-
The 12 habits of highly collaborative organizations
Here are twelve collaboration patterns or "principles" that successful organizations follow.
-
Don't let rushing endanger SaaS health
In the early stages of any application, there's a tremendous emphasis on speed and new features. This blog will talk about how to prevent falling into this trap and how to navigate...