IT Salary Outlook 2017: Starting Pay On The Rise
Starting salaries for IT professionals are expected to rise an average of 3.8% in 2017 compared with 2016. Find out which IT jobs are projected to see the greatest salary increases next year.
Dropbox Urges Users To Change Old Passwords
Data from a 2012 breach has resurfaced, leading to fears that the information could be used to compromise accounts. IT managers using a new Dropbox feature don't need to worry, but they still have to guard against employees' bad password hygiene.
11 Ways IT Professionals Can Make Sense of IoT Data
IoT devices are entering the workplace in all shapes and sizes, from workers wearing smartwatches to industrial sensors such as soil monitors. The data pouring in may be so overwhelming it's unclear what should be done with it, why, and what the risks might be. Here are a few ways to navigate the maze.
IT Investment Uptick Triggered By Productivity Goals
A recent Deloitte survey indicates businesses are investing more in IT platforms and services that can drive productivity. Specifically, these firms are using IT to increase productivity while they focus on technologies such as cloud and analytics.
IoT, Big Data Analytics Driving M&A Market
An Ernst and Young report indicates it's full steam ahead in the mergers & acquisitions space in 2016 as companies look to leverage tech to speed their digital transformation. The main drivers behind this trend include big data analytics and IoT, both of which IT professionals should keep an eye on.
Cisco Cuts 5,500 Workers, Shifts Focus To Software, Services
Networking giant Cisco confirmed during its latest quarterly report that the company will cut approximately 7% of its worldwide workforce in a restructuring move designed to accelerate its transition to a software and subscription business.
Google Hangouts Looks To Gain Enterprise Focus
Google's Allo and Duo apps are meant for mobile texting and video chatting, but Hangouts will refocus on enterprise communications and compete with similar offerings from Skype, Slack, and Yammer.
SaaS Security: Gartner's 5 Tips For IT Pros
Cloud services present a major challenge to IT professionals charged with safeguarding their organizations. These 5 steps can help managers bridge the gaps in SaaS security.
10 Cool Machine Learning Startups To Watch
Machine learning is technology that trains software so developers don't have to code it by hand. The number of new companies in the category has grown exponentially over the past few years. Here are 10 machine learning startups worth a closer look.
9 Enterprise Mobility Management Tools For IT Pros
Choosing the right EMM suite requires IT organizations to understand their needs and the capabilities of the various options. These nine options were featured in Gartner's 2016 Magic Quadrant for Enterprise Mobility Management Suites. They serve as a starting point to help you find the right tools for your IT needs.
Duke IT Manager Talks Legacy Tech, Security, Career
Sasha Calden faces unique security challenges as the IT Manager in one of Duke University's largest academic departments. Here she discusses data management, career development, and the challenge of securing legacy devices.
10 Ways Bots Can Improve Your Business Processes
Businesses use bots to engage with customers, online and via social media, because they're a cost-effective way to respond instantly to simple queries. As the technology improves, bots are finding their way into more use-cases where human judgment and effort were traditionally required. Are bots right for your business? Here are 10 examples to help you decide.
Federal Source Code Policy Requires Agencies To Share Code
The objective behind the White House's Federal Source Code policy is to ensure all agencies make custom-developed source code available for re-use across government. The aim is to make the government work more like developers in the private sector and to encourage sharing and collaboration.
10 IoT Security Best Practices For IT Pros
IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications. Any flaw can bring unwelcome attention, for those making affected products and those using them. Any flaw may prove useful to compromise other systems on the network. When everything is connected, security is only as strong as the weakest node on the network.
Google's Cloud Lets You Bring Your Own Encryption Keys
By supplying their own encryption keys, organizations can reduce the chance that an outside party will be able to gain access to their data, at least while it's at rest. Now Google's cloud platform offers the option.
Salesforce Buying Productivity Startup Quip
Salesforce plans to buy Quip, a startup focused on mobile document management. The deal puts Salesforce in a position to better compete with productivity platforms Google Drive and Microsoft Office 365.
Zoho CRM Upgrade Targets Salesforce
Zoho is increasing the functions available in its CRM suite in an effort to be the all-in-one "operating system for business" that pulls together social media, user feedback, support ticket tracking, and other customer-based actions.
Rio Olympics Will Test Atos's IT Systems, Cloud Infrastructure
Atos, the supplier of IT systems to the 2016 Summer Olympics, has been testing its technology for 200,000 hours before the games begin this week. Like many other businesses, Atros and the Olympics are relying on cloud services to insure information delivery.
Windows 10 Provides Little Incentive For IT To Upgrade
An Adaptiva survey finds businesses of all sizes are slowly migrating to Windows 10, but the update isn't adding any particular degree of urgency. The survey also found that while many IT professionals like some of the features, moving to the OS isn't a priority.
3 Tips For Playing Nice With Your CMO
In his role as EVP and Chief Marketing Officer at HCL Technologies, Matt Preschern knew he needed to collaborate with his CIO in order to move forward a big customer engagement project. Here, he shares how they did it, and provides three steps any IT leader can use to form a productive bond with his or her company's CIO.
|