All Slideshows | Page 5

    baselinemag.com

    Why IT Is Increasing Spending for Data Warehouses

    The vast majority of organizations are increasing their investment in data warehouses, according to a recent survey from Snowflake Computing. In many cases, they're motivated to do so after struggling with challenges related to their ...read more
    baselinemag.com

    10 Ways to Take Control of SaaS Apps and Shadow IT

    The use of SaaS applications is growing globally, as SaaS increases business agility. Cloud-based services are booming in the enterprise and they can be spun up on the fly by an employee with a credit card without involvement from IT or the corp...read more
    baselinemag.com

    10 Tips to Transform Your IT Department

    Cloud computing and data analytics are two of the fastest-growing areas of IT today. They are expected to grow by 26 percent annually over the next five years, according to a new report, "Global Cloud Analytics Market 2015-2019," by Research an...read more
    baselinemag.com

    When DDoS Attacks Threaten Business Opportunities

    Businesses that are targeted in DDoS attacks also lose business opportunities and endure damage to their reputations, according to a new survey. Among the most common cyber-weapons, DDoS attacks cause loss of contracts and operations that generat...read more
    baselinemag.com

    How Mobile Messaging Drives Enterprise Strategies

    CIOs and other IT decision-makers are aggressively pursuing mobile messaging initiatives-and many of them are overseeing at least several such projects at once, according to a recent survey from OpenMarket. Through such efforts...read more
    baselinemag.com

    Why IT Must Respond More Rapidly to Tech Issues

    The vast majority of tech professionals revealed they've been told that IT responds too slowly to solve key issues, according to a recent survey from xMatters. The report, titled "Business Impact of IT Incident Communications," i...read more
    baselinemag.com

    CIOs Are Concerned Over Employees’ Cloud Misuse

    The dominant cloud security concerns for IT leaders are misuse of employee credentials and improper access to control, not malware and hacking, according to a new report. The first two are at the top list for IT executives an...read more
    baselinemag.com

    How to Conduct an Effective ‘Stay’ Interview

    Voluntary turnover among employees is now averaging more than 10 percent a year, and the cost of replacing a professional these days amounts to between six and nine months' worth of his or her salary, according to industry research. In othe...read more
    baselinemag.com

    Patent Filings Reveal a Growing Interest in IoT

    A new study on intellectual property related to the Internet of things (IoT) finds that a majority of patenting activity occurred in areas related to resource management in a wireless network. But patent distribution in this doma...read more
    baselinemag.com

    Why Organizations Struggle With Data Quality

    A significant amount of data within organizations is inaccurate, and many executives admit that they frequently can't fix data quality issues before they negatively impact business, according to a recent survey from Experian Data Quality. ...read more
    baselinemag.com

    Top Challenges of an IT and Marketing Collaboration

    CIOs and IT teams are working more closely than ever with their companies' advertising and marketing executives, but they face significant challenges to ensure these collaborations produce meaningful results, according t...read more
    baselinemag.com

    Getting Everyone on Board to Battle Security Risks

    Although internal auditors admit that much work remains to meet cyber-security and data privacy standards, results are significantly better for organizations whose boards of directors are highly engaged with security risks. So says a new report ...read more
    baselinemag.com

    Challenges Abound in Unlocking Data’s Potential

    It's no secret that data increasingly defines the enterprise. In fact, a growing number of observers believe that it will emerge as a genuine currency in the years ahead. But putting it to maximum use and achieving optimal results remain...read more
    baselinemag.com

    How Generations Approach the Workplace Differently

    There's a general consensus that Millennials approach technology and work in a significantly different way than Gen X and Baby Boomers. They have grown up with technology, they are comfortable with it and they have been shaped by ve...read more
    baselinemag.com

    12 Things Enterprises Don’t Know They Can Automate

    Today, IT departments operate in increasingly complex environments with an array of heterogeneous technologies. Traditional batch processing and job-scheduling solutions only allow for the execution of one or more jobs on a sing...read more
    baselinemag.com

    How Mishandled IT Incidents Spiral Out of Control

    Organizations deal with literally hundreds of IT incidents every year, with each one consuming a considerable share of the tech department's time, according to a survey from Everbridge. The report, titled "Current Trends and Con...read more
    baselinemag.com

    IT Pros Dominate March Madness

    When it comes to participating in office pools for the NCAA Men's Division I Basketball Tournament–otherwise known as March Madness–IT workers dominate, according to a recent survey from CareerBuilder. Typically, employees fill out bracket ...read more
    baselinemag.com

    Why CIOs Are Adopting Virtual Desktops

    CIOs and other executives are increasingly turning to virtual desktop deployment primarily to enhance mobility initiatives, according to a recent survey from Evolve IP. The "2015 Evolve IP State of the Desktop" report reveals that te...read more
    baselinemag.com

    How to Overcome Big Data Barriers

    A clear majority of senior leaders feel that big data capabilities will determine whether their organizations remain relevant and competitive. But most say IT development processes are creating barriers with respect to arriving at crucial insights wh...read more
    baselinemag.com

    Workers Routinely Dodge Security Policies

    A new study finds significant security risk occurring in the enterprise, with one-fifth of employees violating their company's compliance and security policies simply to get their jobs done. According to DataMotion's third annual survey on corporate emai...read more
<12345678910> Last
(Page 5 of 85)
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date