Searched for: "project management rules of engagement"
- Cxo (23)
- Project Management (8)
- Enterprise Software (7)
- Banking (5)
- Innovation (5)
- Tech & Work (5)
- Developer (4)
- Security (4)
- Big Data (3)
- E-Commerce (3)
- Cloud (2)
- Hardware (2)
- Microsoft (2)
- Networking (2)
- Software (2)
- Collaboration (1)
- Data Centers (1)
- Data Management (1)
- Open Source (1)
About 81 results for "project management rules of engagement"
The U.S. government is ramping up its digital defenses by recruiting new military coders and examining how best to handle the proliferation of digital weapons.
For startups shopping for VC money, targeting an acquisition is one of the primary options for an exit. To help pick your targets, TechRepublic has broken down how the top 10 tech ...
Some of America's largest technology firms are among those criticised for not doing enough to comply with a US law aimed at cutting funding for wars that have killed millions in Af...
Developers are the future, so why do we force them to use programming languages of the past? Matt Asay takes a closer look at this problem.
Ian J. Kalin, the first chief data officer (CDO) at the Commerce Department, is figuring out how to tie data products and science to a core mission of his agency: enhancing busines...
FCC CIO David Bray talks about the challenges of updating the agency's IT infrastructure, which has been challenged to ingest more than three million comments about net neutrality.
A new proposal from the FCC would allocate billions of E-Rate dollars to install Wi-Fi networks in every school and library in the US.
As nations spend billions of dollars stockpiling digital weapons and tension grows between them, the risk of world cyber warfare has suddenly turned offensive.
How conflict minerals funded a war that killed millions, and why tech giants are finally cleaning up their act
The rich mineral mines of the Democratic Republic of Congo supply valuable minerals to the tech industry, but they come at a deadly cost that is finally being faced.
The next-generation firewall is poised to take over the mantle of protection from the last generation of security appliances and firewalls.