Insider

Available exclusively to registered Insiders, articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, CITEworld, InfoWorld, ITworld, and Network World. Learn more.

healthcare
software releases

password hell

5 ways to escape password hell

Password management software, smartphone apps and long passphrases can help ease the pain.

seamless security

How to create seamless mobile security for employees

Frustrated employees will figure out how to get around disruptive and clunky security procedures. Here’s how three organizations created a secure and seamless mobile experience for end users.

nc fujitsu

IT modernization project makes the grade at North Carolina colleges

Fourteen community colleges (and counting) have replaced slow, aged infrastructure with power- and space-saving alternatives.

sales opporunties

Analytics app uncovers untapped sales opportunities

Wolters Kluwer Corporate Legal Services deployed a mobile sales analytics application to identify new sources of revenue.


pwrlivenetwork

Getting started with power-line networking

Power-line networking makes use of your electrical lines to give you a de facto wired network. It gives you the range of a wired network without any of the mess or the need to run cable behind the walls.

Apple Pay’s security pros and cons

Taking credit card numbers out of transactions is a helpful step that could alleviate the risk of giant data breaches, but that doesn’t mean the bad guys are going to give up and become accountants.

emv chip and pin

12 security problems that EMV and tokenization won't solve

On November 1 of next year, merchants that aren't ready to accept chip-based cards instead of the current magnetic-stripe cards will become liable for fraudulent transactions that today are covered by the credit card companies.

Microsoft cloud

Review: Microsoft's hybrid cloud storage -- overpriced, underwhelming

Microsoft's Azure StorSimple backup and DR solution offers compelling Azure integrations, but the high price and absence of local management hold it back.

mobile security

5 steps to more mobile-security-savvy employees

It takes more than policies and penalties to make your workers smart about mobile security. Here’s how to identify and correct problem behaviors in your organization that can leave your corporate data vulnerable.

windows wifi

How to set up 802.1X client settings in Windows

802.1X provides security for wired and Wi-Fi networks.

buzzword

8 tech buzzwords that you need to know

Impress your friends at this year’s holiday gatherings by dropping a few of these terms.

amsterdam hackathon 2013 large

7 tips for landing a job at a coding competition

You don’t have to win the top prize to take away something arguably more valuable.

process improvement thinkstock

How to build a better IT outsourcing benchmarking process

As customers look to take advantage of a competitive IT outsourcing market, benchmarking is more important than ever. Service providers and customers are exploring ways to build a better benchmarking process that will benefit all...

hybrid cloud

Nasuni raises the bar for hybrid cloud storage

Subscription-based service offers scalable storage for enterprises.

Focusing on cloud computing's important role.

Cloud computing claims a pivotal role in 2015

Not yet dominating enterprise IT, but progressing at a steady rate, cloud continues its ascent in 2015.

Cloud computing: Optimizing application performance

IT pros share insights on their cloud deployments, and how to create a great user experience

IT Resume Makeover Series

IT Resume Makeover: Position your accomplishments for maximum impact

This IT and operations executive had a detailed and well-organized resume, but his job search was stalling. However, with the help of our resume expert, he learned how to better position himself for the job he desires.

Load More