• 12 ways to disaster-proof your critical business data

    Posted March 5, 2014 - 3:13 pm

    How can you keep critical data safe when disaster strikes? There is no one magic answer, but there are steps your business can and should take to protect important files and applications in the event of a disaster.
  • Are you too old to land a new IT job?

    Posted March 3, 2014 - 3:54 pm

    Age is just a number. "Most IT firms want to know one of two things: Can you make them money or can you save them money," says career search expert Rick Gillis.
  • Intel vs. ARM: Two titans' tangled fate

    Posted March 3, 2014 - 3:25 pm

    Intel has barely made a dent in the mobile market, while ARM has been wildly successful. Does that spell doom for Intel -- or is ARM's triumph overblown?
  • The paranoid's survival guide, part 1: How to protect your personal data

    Posted March 3, 2014 - 12:12 pm

    Who says privacy is dead? While it's true that marketers, the government, data aggregators and others are gathering and analyzing more data than ever about every individual, you can still exert some control over what's out there, who's tracking you and what they do with that information.
  • Sisters bet robotics in schools will plant seeds for STEM careers

    Posted February 26, 2014 - 5:34 pm

    Can robots steer students towards careers in science and technology? Melissa Jawaharlal thinks so and she's built a robotics kit to prove it.
  • Stealthy attacks multiply and victims turn to spooks-as-a-service

    Posted February 26, 2014 - 5:17 pm

    As the list of victims of sophisticated cyber attacks expands, so does the need for high-priced talent to help investigate and recover from those attacks. The latest solution: hosted services offering access to cyber intelligence and incident response to customers who lack it.
  • What CIOs need to know before relying on startups

    Posted February 26, 2014 - 3:58 pm

    There are both risks and rewards when it comes to working with small, flexible and disruptive companies. Here are five points to consider before your business turns to a startup.
  • 7 ways to create a successful integrated marketing campaign

    Posted February 26, 2014 - 3:49 pm

    Marketing experts share their strategies for developing a successful marketing campaign in today's multichannel, mobile, social-media-driven world.
  • Windows 8: Learn to love it

    Posted February 26, 2014 - 12:39 pm

    If you're having a rough time with your Windows 8 computer, several options are available to smooth out the bumps.
  • 5 data center gaffes in popular Hollywood movies

    Posted February 25, 2014 - 5:34 pm

    Hollywood isn't afraid to bend the truth to tell a tale. The data centers depicted in five popular movies prove this point -- as do the ways characters get into them and steal data from them.
  • IT Resume Makeover: How to write to your audience

    Posted February 24, 2014 - 4:55 pm

    Even professional writers can have problems with their resume. In this month's Resume Makeover, we help a senior technical writer hone his message and appeal to the right audience.
  • How IT can establish better cloud control

    Posted February 24, 2014 - 3:40 pm

    There's no getting around it: Employees who use SaaS applications are more irresponsible about password security, file transfer and IT compliance. But IT's failure to communicate about risky behavior and provide tools to help employees do their work is part of the problem. Here are steps you can take to bring SaaS back under control.
  • Free tools for Windows Server admins

    Posted February 24, 2014 - 2:14 pm

    There are endless software tools and utilities out there to help you in managing your network. Here are some of the best free ones. They can help you with deploying, maintaining, troubleshooting, and upgrading Window Servers, your domain, and aid with other miscellaneous network tasks.
  • Facebook open sources Thrift protocol ... again

    Posted February 20, 2014 - 11:53 am

    After more than six years of internal development of its branch of the cross-language framework that powers its internal services, Facebook has released that branch to open source and hopes to work with the Apache Thrift community to incorporate the work.
  • Personal websites give job seekers greater control

    Posted February 19, 2014 - 1:41 pm

    If you are looking to land your next tech job, creating and promoting a personal website can help you control Google search results, better highlight relevant skills and provide an edge in a competitive job market.
  • How to rethink security for the new world of IT

    Posted February 19, 2014 - 12:36 pm

    Not all the proven practices of the past work in today's interconnected, heterogeneous world. Here's what you need to do differently.
  • 11 project management tips for setting and managing expectations

    Posted February 17, 2014 - 10:02 pm

    Project management experts discuss the best ways to set, manage and adjust expectations to ensure that projects don't veer off course -- and they suggest what steps project managers should take if they do.
  • So long IT specialist, hello full-stack engineer

    Posted February 14, 2014 - 11:54 am

    GE Capital is rethinking the way it does IT and looking to well-rounded technology professionals to keep pace in a fast-changing business environment.
  • How to beat applicant tracking systems

    Posted February 14, 2014 - 11:37 am

    All's fair in love, war and job hunting. Learn how to use 'guerilla' job search tactics to use applicant tracking system technology to your advantage.
  • How to get a job in energy IT

    Posted February 13, 2014 - 11:32 am

    The energy industry is complex and growing, but also needs to be more modern and efficient. From analytics to networking to mobility, the IT opportunities abound.
  • Which freaking database should I use?

    Posted February 13, 2014 - 11:12 am

    The big data era calls for NoSQL databases. Explore the new alternatives to old RDBMS and find out which one is best for you.
  • Big moves in store for big data [SPECIAL REPORT]

    Posted February 12, 2014 - 4:34 pm

    Business leaders and decision-makers set the scene for big data's next stage, including its impact on storage, security, and IT jobs.
  • Survey: Big Data, 2014

    Posted February 12, 2014 - 4:29 pm

    Cross-functional partnerships and high-impact targets are keys to success.
  • The processes and tools behind a true APT campaign: Weaponization and delivery

    Posted February 12, 2014 - 4:04 pm

    In this stage of the APT campaign, attackers design a malicious payload and choose the most effective method for delivering it to its intended target.
  • The processes and tools behind a true APT campaign: Command & Control

    Posted February 12, 2014 - 4:01 pm

    In this stage of the APT campaign, attackers have infiltrated the network and are beginning to work toward their endgame.
Ask a Question