Features

google photos drive

beach tide summer sand

Passwords: A long goodbye

There is no debate about the reality that passwords are a “fundamentally broken” method of authentication. But it is still expected to take time – likely years – for the replacement model to become mainstream.

CES

6 startups from CES to watch in 2017 (with video)

The Eureka Park area at the CES trade show offered startups a chance to show what they can do. We interview six hopeful entrepreneurs about their products.

01 holes

Tips on where to start in managing risk

What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...

abstract of two women closeup

5 ways to recruit more women in 2017

Recruiting and retaining women in your organization starts with asking what's really important to them and then following through to make sure they get it.

cans of CV resumes as metaphor for brand

How to overcome 5 common resume mistakes

Avoid the five resume writing mistakes most commonly seen in the IT Resume Makeover series.

digital tightrope

CIOs walking digital tightrope between opportunity and risk

These are scary, exciting times for CIOs who must tackle digital transformations.

01 evernote productivity tips slide4

10 Evernote tips to organize your info in 2017

Whether you're an Evernote newbie or a proud power user, these 10 tips can elevate your digital note-taking to a new level of productivity.

google assistant pixel phone

Five Google Assistant integrations we want to see

Google's eager aide offers some useful tools, but in order to overtake Alexa it needs to talk to more apps and services.

How to avoid becoming a dead-end developer

Stop now: Don't become a dead-end developer

Sensing a possible stall in your coding career? Here’s how to break free and tap your true potential

clouds money dollar signs public domain

6 tips for negotiating your next raise

If one of your New Year's resolutions to negotiate a raise, here are some tips from industry professionals to help you get your fair share.

best home security cameras

Best home security camera: Our favorite tools for keeping an eye on the home front

A boom in wireless security cameras is inspiring a movement in DIY home surveillance. Follow our buying guide and read our reviews to find the best option for you.

01 detection

When real-time threat detection is essential

There are times when an organization will be especially vulnerable if they don’t have real-time detection capabilities, and in preparation for these events it’s a good idea to reevaluate tools and strategies. Mike Paquette, director...

controlling privacy

Reality check: How Windows 10's new privacy controls stack up

A hands-on look at whether Microsoft’s Win10 Creators Update will win back your trust

diamond light source synchrotron main chamber

OSGi at the UK's biggest science lab

Developers at Diamond Light Source set out to migrate a mission-critical, Java-based acquisition system to dynamic class loading. Here’s what they learned.

Virtual assistant voice apps

Why Amazon is the current king of the virtual assistants

Amazon surprised many analysts and competitors with its Alexa cloud-based voice assistant, and the company seems determined to help partners pack the tech into every product imaginable. Alexa has a clear lead in the smart home, but...

agile devops

Agile project management: A beginner's guide

If you're new to project management or just want to know about agile methodology, the answers to these 10 frequently asked questions will cover the basics you need to know.

android privacy

How to set up your Android phone for ultimate privacy

Here's how to replace all of those data-hungry apps and services with ones that don't need to know so much about you.

00 titel cost

How much is a data breach going to cost you?

A recent IBM study found that the average cost of a data breach has hit $4 million—up from $3.8 million in 2015. There are countless factors that could affect the cost of a data breach in your organization, and it’s virtually...

Load More