At Microsoft Build 2015, the software giant showed it's determined to do for mobile devices what it did for PCs -- only this time it's the services, not the OS, that it hopes will be the cash cow. Also in Searchlight: Salesforce fields takeover offers; Obama's emails hacked.
Finding people with the right experience and skills to build your new business is critical, but it's the personality mix of a startup team that can make or break a small business.
Social, mobile, analytics and cloud computing require a fresh look at issues related to data ownership, according to Harvey Koeppel. His eight-point CIO checklist can help.
Our IT organization needs to secure customer names, but also needs to conduct searches on the entire customer database to match and merge records.
What do virtualization, scalability and automation have to do with a perfect cup of coffee or how many candidates ace the LSATs?
Is it a best practice to automate a critical application's startup process after failover from one node to another?
Vendors claim that their network management systems can do it all, but in a world of virtualization and cloud, is that still true?
The perceived IT shortage of talent may be exaggerated; natural biases and hiring processes seem to be ruling out appropriate candidates.
How much your network needs to adapt to the jump in 802.11ac speed from Wave 1 -- or even from 802.11n -- to the standard's next phase, Wave 2, depends on where you are in the upgrade cycle.
Many security professionals have to operate within a small information security budget. Expert Mike O. Villegas reviews some tips to maximizing the budget and persuading management to increase it.
A Utah-based startup hopes to change the way enterprises buy SSL certificates to a subscription model, and one expert thinks it could work as long as enterprises can trust the security.
News roundup: Many believe the government should help avert cybersecurity woes, yet two House-approved cybersecurity bills are frowned upon. Plus: DDoS increase linked to IoT; Google password alert; 70% put networks at risk with undocumented changes.
Turning data into information depends on the context it's used in. It takes a new type of engineer to discover the right big data analytics use cases to pursue.
Data privacy lawyer Jeff Kosseff discussed the current state of data privacy law as it applies to big data at the Big Data Tech Con in Boston.
When the office culture is resistant to change, how can project managers start things moving in a positive direction?
With flash and virtualization technologies becoming readily available, the time has come for storage to evolve from data dumb to data aware.
Consumer file sync-and-share use can leave corporate data unprotected. Enterprise file sync-and-share products can help guard against data loss.
EMC will roll out products in its Data Domain, XtremIO and ViPR platforms at EMC World 2015, but what about a CEO succession plan?