Insider

Get exclusive access to premium articles, product guides, reviews, how-tos, and more from CIO, CSO, Computerworld, InfoWorld, ITworld, and Network World - the best enterprise tech publications in the business. Register now!

james mobley
storage container

Read this! (And learn how to deliver ultimatums better.)

On most projects, it’s we in IT who have to tell our partners when they need to do something. What we don’t realize is that they hear a silent “or else” at the end of what we think of as statements of fact.

shoppingcartincloud ts

How cloud infrastructure helped Instacart focus on business growth

The lead engineer of Instacart Nick Elser discusses how leveraging the cloud has been a powerful and successful experience for the one-hour grocery delivery service.

A woman use a gun to threaten a birthday cake with many candles.

Older IT pros pushed aside by younger H-1B workers

H-1B visas go primarily to people who are under 35, suggesting that the threat of age discrimination may be central to much of the hostility surrounding the controversial program.

virtual apps vm control photo touch finger screens windows

Tanium review: Endpoint security at the speed of now

Tanium Endpoint Platform draws on fast peer-to-peer communications to answer queries of managed clients within seconds.

Katrina’s surge resulted in 53 levee breaches

6 disaster recovery do's and don'ts from Hurricane Katrina survivors

Ten years after Hurricane Katrina devastated the Gulf Coast, take the advice of these Louisiana IT leaders, who learned lessons the hard way about safeguarding infrastructure and equipment.

An interview lifesaver

5 tough IT interview tactics and how to handle them

Take-home tests, whiteboard exercises and group interviews are becoming more common as organizations try to improve their new hire success rates. Don’t be caught off guard.

research projects

4 research projects that could double wireless bandwidth

As compression and other existing bandwidth enhancement techniques reach their limits, academic researchers worldwide are investigating a variety of technologies and methods that promise to bring wireless broadband up to speed—and...

pat gelsinger

VMware CEO hits on network virtualization reality, feuding with Cisco & the EMC Federation's future

Heading into VMworld 2015, VMware CEO Pat Gelsinger discusses unified hybrid cloud networking, network virtualization, the company's feud with Cisco and the future of the EMC Federation.

top secret data protection security briefcase caution police tape

Review: How to protect top-secret data

In our tests, IQProtector’s file encryption tool successfully secured corporate documents from prying eyes.

making the case security

Law firm makes a case for security certification

A big law firm handling sensitive documents uses its ISO security certification as a competitive differentiator
.

measure piece photo

4 security metrics that matter

Today, management demands metrics to get a clearer view of security. Here are four metrics that deliver actionable insight -- and a few others with less value.

law technology court robot

Technology, the law and you: Open-source software

With one real exception, organizations shouldn’t have any legal issues to worry about when opting for open-source.

success it ts

How Georgia successfully overhauled IT

COO of Georgia Technology Authority discusses the sweeping enterprise-driven privatization push that's improved security, cut costs and upended the state's IT culture.

fight battle boxing

Review: VirtualBox 5.0 vs. VMware Workstation 11

VirtualBox 5.0's new features add ease and flexibility, but VMware Workstation 11 leads in performance and convenience.

picking a successor

CIO succession planning critical as IT drives business growth

CIOs say proper succession planning is a crucial part of their responsibilities. But it's not an easy job at a time when talented IT staff can rake in big salaries working on innovative projects, without putting themselves under the...

A team of people building a human tower

9 things you need to know to run a successful software development team

Experienced software engineering leaders share what it takes to get the most out of your team.

many tunnels

Send attackers on a wild goose chase with deception technologies

Deception is an information security approach for identifying and changing attacker behavior, tying up his time, and sending him packing.

A close-up of a colorful sticky notes on a Scrum board

Comparing scaling agile frameworks

As larger organizations scramble to apply agile software development methodologies to the challenges inherent in an enterprise-level company, it’s important to understand the pros and cons of the different approaches.

Load More