All Slideshows | Page 16

    baselinemag.com

    10 Ways Mobile Devices Have Changed Education

    Computers have been used in schools and colleges for decades, with most connected to the Internet, yet they’ve fallen short in making a profound impact on education and learning pedagogies, according to Krish Kupathil, CEO of...read more
    baselinemag.com

    All In: Betting Big on Big Data

    Big data analytics has emerged as a top five topic of interest within many organizations, according to a recent survey from Teradata. In fact, a notable share believes that the effective pursuit of data and analytics is the single most essential factor ...read more
    baselinemag.com

    How IT Spent Its Summer

    So how was your summer? Hopefully better than the one that some of your IT employees endured, as they were constantly getting stressed out by a deluge of remote users who seemingly always had computer or network issues that needed attention, according to a ...read more
    baselinemag.com

    The Last of the Millennials

    Given the lingering IT skills shortage, CIOs must focus on the next generation of employees to develop promising recruitment pools for future positions. In this case, we're referring to high school seniors—who are considered among the last of the Mi...read more
    baselinemag.com

    The Dangers of Running an OS Beyond End of Life

    Microsoft recently cut ties with Windows Server 2003, ending security and compliance updates for the widely used enterprise operating system. Despite the risks, 61 percent of businesses continue to use Server 2003 according to a recent SpiceWorks r...read more
    baselinemag.com

    How the ‘Toyota Way’ Can Drive a Balanced IT Department

    Since he passed away in 1990, Taiichi Ohno's impact within the global business community has remained firm—for good reason: He is universally recognized as the father of the Toyota Production System (TPS), better known in the U.S....read more
    baselinemag.com

    The 1% Who Put the Entire Organization at Risk

    Cyber-security risk is highly concentrated in the cloud, according to a new study, with 1% of users responsible for 75% of the risk. Furthermore, cyber-criminals continue to focus on what is widely considered the weakest link in the security chain: t...read more
    baselinemag.com

    Reducing the Time an Intruder Spends in the Network

    A majority of IT security executives are only somewhat confident in their enterprise's security, according to a new survey. One-third of respondents are confident in their security posture and one-quarter said they communicate effectively about...read more
    baselinemag.com

    The Worst Jaw-Dropping Resume Blunders

    Like many hiring managers, CIOs are pressed for time when reviewing job applications. Most employers, in fact, spend less than five minutes reviewing a single resume, according to a recent survey from CareerBuilder. Knowing that they have a lim...read more
    baselinemag.com

    Why Customer Service Has Social Problems

    When it comes to pursuing customer service inquiries and complaints, users are taking an out-with-the-old-in-with-the-new approach, according to a recent survey from Desk.com. In this case, "old" refers not only to phone calls, ...read more
    baselinemag.com

    The Return of the Malicious Attachment

    Malicious attacks have shifted from URL-based campaigns, which dominated last year, to campaigns that rely on attachments to deliver malware payloads, according to a new study. The study also found that phishing increasingly targets business users, and that...read more
    baselinemag.com

    Not Dialed In: The Top Conference Call Offenders

    They serve a useful purpose but—let's face it—conference calls can often seem like an experience to endure rather than an opportunity for collaborative excellence. As a CIO, you are inevitably asked to participate in these ...read more
    baselinemag.com

    Ten Fastest-Growing States for Tech Jobs

    If you're a CIO in the No. 1 state for tech-employment growth, you're not working anywhere near California, New York, Massachusetts, Texas or any of the other usual suspect states that show up on this type of list. Instead, "Go Midwest, young...read more
    baselinemag.com

    Why Insider Threats Are Inevitable

    The majority of surveyed security professionals, 62 percent, said insider threats have grown during the last year, according to a new report. A combination of factors are at play: 53 percent attribute the rise to insufficient data protection strategies and solu...read more
    baselinemag.com

    The Key to Battling Cyber-Crime Begins With Users

    A day doesn't pass without news of a breach or security lapse somewhere in government or business. As a result, Americans are increasingly concerned about the risks posed by digital systems. Yet many do not follow basic security practices that re...read more
    baselinemag.com

    The Best Way to Use Data to Cut Costs? Delete It

    A recent mindset challenges the assumption that data storage costs will continue to decline and argues that collecting and indiscriminately storing data can be detrimental to business. The solution: deleting some data. In his thought pi...read more
    baselinemag.com

    How Gamification Tech Encourages Productivity

    A majority of organizations are taking advantage of gamification tech to enhance employee engagement, according to a recent survey from Badgeville. For the purposes of the research, gamification systems are defined as those that combi...read more
    baselinemag.com

    Why CIOs Must Spearhead the Digital Charge

    As the head of IT, a CIO must renovate the IT core to foster digital innovation, according to a new Gartner study. The study also concluded that as a business leader, a CIO must develop a strategic vision of how digital technology will t...read more
    baselinemag.com

    Your Organization Is Infected–Now What?

    Protecting your network from ransomware is an integral part of any network security framework for both individuals and companies. It's also important to have a plan of action once you know you've been stricken. Stu Sjouwerman, founder and CEO of KnowBe4, rea...read more
    baselinemag.com

    Why CIOs Need a Chief Data Officer

    The volume of data that CIOs and their teams oversee is growing immensely–increasing the need to hire a Chief Data Officer (CDO) if they don't already have one on board, according to a recent survey from Experian Data Quality. The report, titl...read more
First <1112131415161718192021> Last
(Page 16 of 101)