Is your company getting the most out of BYOD? Find out now by answering a few simple questions.
Does your organization know what to look for in order to hire the right information technology talent? Discuss the IT skills gap in our SearchCIO tweet chat Wednesday, Aug. 27, at 3 p.m. EDT.
Heartbleed resurfaces in a Tennessee health system's breach, and UPS customers' data is in danger. Is assuming the worst enough? Also in Searchlight: Steve Ballmer signs off from Microsoft's board; Twitter, Facebook tinker with more experiments.
Who is the chief data officer, really? Four CDOs describe their first 90 days, their primary objectives and their biggest mistakes at a recent symposium.
Data center equipment refreshes are expensive and time-consuming, but there are ways to ease the most arduous steps of the IT lifecycle -- and possibly even make a little money.
Remote KVMs represent both convenience and potential for disaster. A few simple security steps can prevent downed servers, whether from an intentional attack or a simple miscommunicated update.
Make sure you know what is significant about the mainframe. Take this quiz to find out what you should brush up on.
SN blogs: This week, analysts say that application ease of use is the most important; FIDO is working on new authentication standards.
WAN aggregation allows continuous, high-performance networking, and software-defined networking delivers greater security, visibility and control. In this tip, expert John Burke evaluates both technologies to help you better optimize your network.
The Georgia World Congress Center has upgraded to 802.11ac Meru wireless technology to support thousands of attendees, exhibitors and mobile devices.
The difficulty of detecting Heartbleed exploits means that the Community Health breach is unlikely to be the last incident linked to the OpenSSL flaw.
News roundup: Heartbleed vulnerabilities, point-of-sale malware and phishing scams are nothing new, yet numerous companies continue to fall victim to them. Shouldn't the lesson be learned by now? Plus: HTTP Shaming, Dropbox improvements and more.
A vendor report found that while mobile malware may receive more attention, unrestrained mobile app data collection actually poses a greater risk to consumers and data security.
Is there a place for a centralized test team in enterprise software testing at a company that has adopted Agile methodologies? Read Agile expert Matt Heusser's answer.
Negative, anonymous feedback puts both testers and project managers in a difficult situation. It's hard for testers to act on vague complaints and awkward for managers to provide the necessary clarification. This expert advice may offer a way out.
It turns out working with legacy code might not require days of pouring over cryptic comments. For finding and fixing bugs, developers can use simple testing tools to peel and slice their way down to the problem.
The vendor comes out of stealth with Discovery hybrid storage arrays that offer real-time data governance and data protection capabilities.
Boston Celtics VP and CTO Jay Wessland says the team is considering a shift from scale-up storage to address the explosion of digital video.
Incoming Michigan State CIO discusses the data storage challenges universities have to deal with and how to address them with cloud storage.