Searched for: "the forgotten strategy"
- Cxo (13)
- Security (5)
- Cloud (4)
- Microsoft (4)
- Data Centers (3)
- Collaboration (2)
- Data Management (2)
- Enterprise Software (2)
- Hardware (2)
- Networking (2)
- Social Enterprise (2)
- Software (2)
- After Hours (1)
- Developer (1)
- Innovation (1)
- Mobility (1)
- Project Management (1)
- Storage (1)
- Tech & Work (1)
About 50 results for "the forgotten strategy"
So far, majority of applications and websites mainly use traditional login method based on username and password. These identity authentication systems acquire two steps that users...
Ian J. Kalin, the first chief data officer (CDO) at the Commerce Department, is figuring out how to tie data products and science to a core mission of his agency: enhancing busines...
Ford has used technology to recreate itself as a 21st century car company. Now it wants to build new experiences and innovate like a software maker.
Surface Pro 3 is a step in the right direction say tech chiefs, but more work is still needed says TechRepublic's CIO Jury.
Memes pwn the web: What Lolcatz, Tron Guy, and Doge tell us about ourselves and the future of humanity
If you want to know how memes came to dominate the web, how they may evolve into "temes," and why they may hold the secret to the future of life on earth, then you better read this...
Here's an article that makes the process of securing a software development job (which for us usually lands on the .NET/C# side of things) more fun by treating it like the "cheat c...
What should you ask a potential cloud provider to decide if they are right for your organization? Thoran Rodrigues has some tips to get you started.
Ian Hardenburgh sums up his research on the Google Apps and Office 365 suites. He has a preference, but it still comes down to individual needs and your number of users.
Thoran Rodrigues compares the major players and some of the newcomers in the increasingly competitive IaaS space, examining both their service offerings and how well they meet user...
Erik Eckel describes the specific ways in which image-based backups are critical safeguards for IT consulting work.