Topics
- All
- Windows (323)
- Web Development (292)
- Software (278)
- Security (235)
- Leadership (171)
- It Employment (159)
- Networking (147)
- Software Development (124)
- Linux (122)
- Hardware (103)
- Enterprise Software (98)
- Banking (92)
- Browser (92)
- After Hours (82)
- Data Management (81)
- Project Management (75)
- Disaster Recovery (74)
- Malware (68)
- Open Source (64)
- Collaboration (62)
- Processors (61)
- Education (58)
- Pcs (56)
- Servers (52)
- Outsourcing (42)
- Storage (40)
- Operating Systems (38)
- Legal (31)
- Cisco (30)
- Government (27)
- Apps (26)
- Cloud (24)
- Printers (24)
- Broadband (22)
- Social Enterprise (21)
- Cxo (19)
- Laptops (16)
- Start-Ups (16)
- Wi-Fi (16)
- It Policies (15)
- Mobility (15)
- Windows Server (15)
- Telcos (14)
- Patents (13)
- Data Centers (11)
- Business Intelligence (10)
- Google Apps (10)
- Emerging Tech (9)
- Microsoft (8)
- Outage (8)
- Eu (7)
- Health (7)
- Virtualization (7)
- E-Commerce (6)
- Piracy (6)
- Privacy (6)
- Big Data (5)
- Google (5)
- Tablets (5)
- Bring Your Own Device (4)
- Ios (4)
- Mobile Os (4)
- Smartphones (4)
- Smbs (4)
- Ibm (2)
- Tech Industry (2)
- Travel Tech (2)
- Android (1)
- Byod And The Consumerization Of It (1)
- Censorship (1)
- Fiber (1)
- Nasa / Space (1)
- Oracle (1)
- Unified Comms (1)
Content Types
About 3576 results
-
Private vs. public cloud: Why the supposed debate is really no debate at all
Hybrid cloud solutions are popular for organizations who want cloud benefits but want to retain some control. Here's one perspective that argues that the public cloud is the way to...
-
Five tips for saving on software costs while enhancing value
There is pressure on IT departments to reduce spending, increase efficiency and enhance value. Along with the breakneck speed of tech changes, this can prove challenging. But all o...
-
The dark side of BYOD
Exploring new mobile and cloud platforms without a governance strategy can have consequences.
-
Infographic: Debunking myths about remote access technology
This infographic addresses some of the negative assumptions about remote access and its effect on the network.
-
5 ways cloud accounting increases financial efficiency and accuracy for the enterprise
Cloud-hosted SaaS solutions open the doors to sophisticated tools that many, if not most, businesses could not have accessed in the past.
-
SharePoint 2013 adds better in-memory analytics
Microsoft's business intelligence tools have arrived squarely on the doorstep of serious big data analytics.
-
Apple vs. Android: What does India think?
In this guest post, Dr. Manroop Takhar believes that Android currently has the edge over Apple in India. Do you agree?
-
Oracle’s licensing rules: Five common pitfalls to watch out for
IT managers: Don't let your hard work be overshadowed by being caught out by Oracle's overly complex licensing rules.
-
Buffering SSL encryption to combat today's emerging threats
Next-generation firewalls should include intrusion prevention (IPS), the ability to decrypt and inspect SSL sessions in real time, and the ability to visualize and control applicat...
-
Infographic: Cloud apps and knowledge workers
This infographic breaks down a recent survey of workers, executives, and IT about the adequacy of their tools for remote access and the role of cloud apps.
-
IT leadership faces new pressure in late 2013
Here are a few ways that the role of the office leader has evolved, and what the transition means for the man or woman running the IT show.
-
The cloud: Mitigating risks as you relinquish control
The lack of management oversight and basic controls over cloud-based collaboration enables and emboldens rogue IT practices. Here are some ways to mitigate risks.
-
Look before you leap: Evaluating cloud migrations in high-performance LAN environments
Seth Miller demonstrates why its crucial to gather all the relevant data about how your systems are used before moving anything to the cloud.
-
10 tips for getting your employees on board with social
Heidi Ambler, director of IBM Social Business, offers these tips to help your organization devise a successful social media strategy.
-
Use big data to fight cybercrime
While organizations don't always need to understand how an attack works from an in-depth technical perspective, they do need to understand how the attacks get past their defenses. ...
-
How to supercharge team productivity
Introducing or restoring productivity starts with providing the right tools, empowering employees to take control of their workload, a shift in corporate culture, and best practice...
-
Infographic: The outrageous costs of data center downtime
Did you know that squirrels account for 17% of all Level 3 Communications cable damage? Get more fun facts about data center downtime with this infographic.
-
Five mobile site performance challenges (and how to fix them)
Discover common performance issues that slow down mobile sites, and then learn best practices for mobile optimization.
-
Stop obsessing about applications, think about events
Focusing on event management, rather than applications, is a more effective strategy as data centers become a complex mix of physical and virtual machines and multiple hosting prov...
-
How to trust your insiders
Edward Snowden's act--an insider using elevated privileges to access, copy and remove sensitive data--demonstrates just how catastrophic a few keystrokes and clicks can be.
-
How Yammer is killing enterprise social networking
By looking at the reasons behind enterprise social networking adoption in large corporations we can begin to understand why social business tools are not living up to their hype or...
-
Four simple ways to make your tablet run smoothly
Here are four simple fixes that will get your tablet up and running at optimum speed again in no time.
-
Infographic: Responsive design
This infographic illustrates the elements of responsive design.
-
Six SharePoint experts divulge the secrets of enterprise social success
Find out what social champions, business intelligence, choreography, and more has to do with creating an effective social media implementation.
-
The cost of doing nothing: Why haven’t you made the switch to cloud accounting?
Most finance executives instinctively know that a strong accounting system is critical for keeping the business running smoothly. Then why is it that we still see a lack of urgency...
-
The future of SharePoint, Yammer, and mobile in the social enterprise
Seven SharePoint influencers and the CEO of harmon.ie weigh in on Microsoft's vision for the future of social, Microsoft's acquisition of Yammer, and more.
-
How to battle Cloud fear, uncertainty and doubt
Time is the enemy of any decision maker that doesn't want to become irrelevant. Don't let your fear and uncertainty about the cloud keep you from taking action now.
-
Running Windows XP means you are non-compliant and open to liability
On April 8, 2014, Microsoft will not release any security patches for Windows XP, which will effectively make it non-compliant with HIPAA / HITECH.
-
Three ways to optimize your Android tablet for work productivity
Take a look at three ways that you can turn your tablet into an optimized productivity-boosting tool.
-
Infographic: Is Hong Kong the new tech hub of China?
Hong Kong has all the hallmarks of being on the brink of a high tech boom. This infographic shines a light on what the island's future might hold.