• How to use social media to improve your IT recruiting strategy

    Posted March 17, 2014 - 3:17 pm

    Your next star employee is out there sharing, liking and tweeting. Here's how to leverage social networking technology to effectively target and recruit IT candidates.
  • 4 lessons from the Target breach

    Posted March 17, 2014 - 2:51 pm

    Retail giant Target made headlines after announcing that 110 million Americans were affected by a massive data breach at its stores. If you want to avoid the same fate, pay attention to these four lessons learned in the wake of the Target breach.
  • 12 tips for creating a mobile-friendly website

    Posted March 17, 2014 - 12:36 pm

    Just because your website can be viewed on a mobile device doesn't make it mobile-friendly. To find out how to ensure your mobile customers have a positive experience, follow these suggestions from mobile experts and Web design and development pros.
  • 8 ways big data and analytics will change sports

    Posted March 14, 2014 - 12:03 pm

    The leading minds in sports convened in Boston last week at the annual MIT Sloan Sports Analytics Conference to share ideas about how big data will be a game-changer for fans, players, coaches, officials and front-office personnel.
  • 5 ways CIOs can rationalize application portfolios

    Posted March 14, 2014 - 11:54 am

    The pressure is mounting for CIOs and other IT leaders to help the business enable new disruptive technologies like mobile, social, cloud and big data, but many CIOs are struggling to do so because maintaining and supporting legacy applications consumes the lion's share of the budget. Here are five recommendations for rationalizing your application portfolio.
  • Social media getting more spontaneous and less personal

    Posted March 13, 2014 - 1:38 pm

    Deliberate status updates are losing luster as quick, impromptu, short-lived activity on social media gathers momentum. If the first phase of social media was a massive effort to share our online identities, this current wave is all about fleeting encounters.
  • IT raises an eyebrow as pundits push 'digital transformation'

    Posted March 12, 2014 - 3:00 pm

    Big Thinkers are urging IT to lead a charge to digitally remake every aspect of their businesses. CIOs aren't so sure...
  • Cloud wars heating up in 2014

    Posted March 12, 2014 - 2:58 pm

    Google, Amazon and Microsoft have all made strategic moves to gain cloud market share -- and the 'cloud wars' are only getting started.
  • Think deleted text messages are gone forever? Think again

    Posted March 12, 2014 - 2:49 pm

    A former federal prosecutor and cybercrime expert tells CIO.com how IT departments can retrieve text messages that the user thought were deleted months or even years ago. As more litigation and investigations turn on the content of texts, every CIO needs to know how to find the smoking gun.
  • A clear-eyed guide to Mac OS X's actual security risks

    Posted March 10, 2014 - 11:48 am

    Apple has improved its security in recent years, but is it enough?
  • How to add new job skills without going back to school

    Posted March 10, 2014 - 11:32 am

    E-learning is a cost-effective, accessible way to boost your job skills without the hassles of 'traditional' degree programs.
  • 12 ways to disaster-proof your critical business data

    Posted March 5, 2014 - 3:13 pm

    How can you keep critical data safe when disaster strikes? There is no one magic answer, but there are steps your business can and should take to protect important files and applications in the event of a disaster.
  • Are you too old to land a new IT job?

    Posted March 3, 2014 - 3:54 pm

    Age is just a number. "Most IT firms want to know one of two things: Can you make them money or can you save them money," says career search expert Rick Gillis.
  • Intel vs. ARM: Two titans' tangled fate

    Posted March 3, 2014 - 3:25 pm

    Intel has barely made a dent in the mobile market, while ARM has been wildly successful. Does that spell doom for Intel -- or is ARM's triumph overblown?
  • The paranoid's survival guide, part 1: How to protect your personal data

    Posted March 3, 2014 - 12:12 pm

    Who says privacy is dead? While it's true that marketers, the government, data aggregators and others are gathering and analyzing more data than ever about every individual, you can still exert some control over what's out there, who's tracking you and what they do with that information.
  • Sisters bet robotics in schools will plant seeds for STEM careers

    Posted February 26, 2014 - 5:34 pm

    Can robots steer students towards careers in science and technology? Melissa Jawaharlal thinks so and she's built a robotics kit to prove it.
  • Stealthy attacks multiply and victims turn to spooks-as-a-service

    Posted February 26, 2014 - 5:17 pm

    As the list of victims of sophisticated cyber attacks expands, so does the need for high-priced talent to help investigate and recover from those attacks. The latest solution: hosted services offering access to cyber intelligence and incident response to customers who lack it.
  • What CIOs need to know before relying on startups

    Posted February 26, 2014 - 3:58 pm

    There are both risks and rewards when it comes to working with small, flexible and disruptive companies. Here are five points to consider before your business turns to a startup.
  • 7 ways to create a successful integrated marketing campaign

    Posted February 26, 2014 - 3:49 pm

    Marketing experts share their strategies for developing a successful marketing campaign in today's multichannel, mobile, social-media-driven world.
  • Windows 8: Learn to love it

    Posted February 26, 2014 - 12:39 pm

    If you're having a rough time with your Windows 8 computer, several options are available to smooth out the bumps.
  • 5 data center gaffes in popular Hollywood movies

    Posted February 25, 2014 - 5:34 pm

    Hollywood isn't afraid to bend the truth to tell a tale. The data centers depicted in five popular movies prove this point -- as do the ways characters get into them and steal data from them.
  • IT Resume Makeover: How to write to your audience

    Posted February 24, 2014 - 4:55 pm

    Even professional writers can have problems with their resume. In this month's Resume Makeover, we help a senior technical writer hone his message and appeal to the right audience.
  • How IT can establish better cloud control

    Posted February 24, 2014 - 3:40 pm

    There's no getting around it: Employees who use SaaS applications are more irresponsible about password security, file transfer and IT compliance. But IT's failure to communicate about risky behavior and provide tools to help employees do their work is part of the problem. Here are steps you can take to bring SaaS back under control.
  • Free tools for Windows Server admins

    Posted February 24, 2014 - 2:14 pm

    There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones. They can help you with deploying, maintaining, troubleshooting, and upgrading Window Servers, your domain, and aid with other miscellaneous network tasks.
  • Facebook open sources Thrift protocol ... again

    Posted February 20, 2014 - 11:53 am

    After more than six years of internal development of its branch of the cross-language framework that powers its internal services, Facebook has released that branch to open source and hopes to work with the Apache Thrift community to incorporate the work.
Join us:






Ask a Question