How To Retain Top IT Talent
If your organization can't move beyond traditional work hours, it may have trouble keeping valuable tech employees happy. Here's what IT leaders need to know.
6 Reasons Hackathons Are Good For IT
Inviting developers to solve technical challenges can open organizations up to new ways of doing things. Here are 6 IT benefits of hosting a hackathon.
Dropbox Urges Users To Change Old Passwords
Data from a 2012 breach has resurfaced, leading to fears that the information could be used to compromise accounts. IT managers using a new Dropbox feature don't need to worry, but they still have to guard against employees' bad password hygiene.
Managing Gen Z: A Primer For IT Managers
Having grown up amid crises and technologically accelerated change, the second-wave of Millennials -- or Gen Z -- that's entering the workforce has different expectations and needs than people who came before them. Here are some tips on how IT managers can support and direct this new generation of workers.
How Intelligent Data Analysis Can Transform IT Security: Podcast
Welcome to the first episode of InformationWeek's Expert Voice, a new podcast series featuring interviews with top IT executives, managers, and technology experts. In this episode, we speak with Stuart Clarke, chief technical officer for cybersecurity at Nuix, about the impact intelligent data analysis can have on data security.
9 Enterprise Mobility Management Tools For IT Pros
Choosing the right EMM suite requires IT organizations to understand their needs and the capabilities of the various options. These nine options were featured in Gartner's 2016 Magic Quadrant for Enterprise Mobility Management Suites. They serve as a starting point to help you find the right tools for your IT needs.
10 IoT Security Best Practices For IT Pros
IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications. Any flaw can bring unwelcome attention, for those making affected products and those using them. Any flaw may prove useful to compromise other systems on the network. When everything is connected, security is only as strong as the weakest node on the network.
Google's Cloud Lets You Bring Your Own Encryption Keys
By supplying their own encryption keys, organizations can reduce the chance that an outside party will be able to gain access to their data, at least while it's at rest. Now Google's cloud platform offers the option.
Uber Drivers Under Algorithmic Management: Study
A study of Uber drivers finds that the company's algorithms amount to managerial control. However, it's not clear whether Uber's arrangement with its drivers can be applied to other organizations, including IT-oriented industries.
Blogs
How To Retain Top IT Talent
If your organization can't move beyond traditional work hours, it may have trouble keeping valuable tech employees happy. Here's what IT leaders need to know.
6 Reasons Hackathons Are Good For IT
Inviting developers to solve technical challenges can open organizations up to new ways of doing things. Here are 6 IT benefits of hosting a hackathon.
Dropbox Urges Users To Change Old Passwords
Data from a 2012 breach has resurfaced, leading to fears that the information could be used to compromise accounts. IT managers using a new Dropbox feature don't need to worry, but they still have to guard against employees' bad password hygiene.
Managing Gen Z: A Primer For IT Managers
Having grown up amid crises and technologically accelerated change, the second-wave of Millennials -- or Gen Z -- that's entering the workforce has different expectations and needs than people who came before them. Here are some tips on how IT managers can support and direct this new generation of workers.
How Intelligent Data Analysis Can Transform IT Security: Podcast
Welcome to the first episode of InformationWeek's Expert Voice, a new podcast series featuring interviews with top IT executives, managers, and technology experts. In this episode, we speak with Stuart Clarke, chief technical officer for cybersecurity at Nuix, about the impact intelligent data analysis can have on data security.
9 Enterprise Mobility Management Tools For IT Pros
Choosing the right EMM suite requires IT organizations to understand their needs and the capabilities of the various options. These nine options were featured in Gartner's 2016 Magic Quadrant for Enterprise Mobility Management Suites. They serve as a starting point to help you find the right tools for your IT needs.
10 IoT Security Best Practices For IT Pros
IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications. Any flaw can bring unwelcome attention, for those making affected products and those using them. Any flaw may prove useful to compromise other systems on the network. When everything is connected, security is only as strong as the weakest node on the network.
Google's Cloud Lets You Bring Your Own Encryption Keys
By supplying their own encryption keys, organizations can reduce the chance that an outside party will be able to gain access to their data, at least while it's at rest. Now Google's cloud platform offers the option.
Uber Drivers Under Algorithmic Management: Study
A study of Uber drivers finds that the company's algorithms amount to managerial control. However, it's not clear whether Uber's arrangement with its drivers can be applied to other organizations, including IT-oriented industries.
|