All Slideshows | Page 7

    baselinemag.com

    Aligning Agile Practices With Quality Assurance

    While the adoption of agile software development for Web apps is nearly ubiquitous among organizations today, the change isn't leading to much notable advancement in quality assurance and testing, according to a recent su...read more
    baselinemag.com

    2016 Has the Markings of a Perfect Storm for Fraud

    This year, cyber-criminals are expected to continue to outsmart traditional security defenses. They will leverage the latest mobile hacker tools to impersonate legitimate users and take control of consumer accounts en masse, according to a blog ...read more
    baselinemag.com

    Why Good Data Goes Bad

    A minority of top execs express high confidence in their organization's data quality management (DQM), according to a recent survey from Blazent. The resulting report, titled "The State of Enterprise Data Quality: 2016 Perception, Reality and the Future of DQM,...read more
    baselinemag.com

    A Hire Calling: How to Assemble an IT Dream Team

    When interviewing IT job candidates, why simply fill vacancies when you can bring on a dream team of well-rounded players? By assessing candidates for strengths that extend far beyond a simple command of job description-based tech skil...read more
    baselinemag.com

    Six Customer Experience Game-Changers

    Nearly nine out of 10 execs view the customer experience as the primary basis for competition this year, according to Gartner. By 2017, half of consumer product investments will be directed toward customer experience innovations. With this in mind, Tele...read more
    baselinemag.com

    The Five Cloud Concerns Faced by All Industries

    Of all industries, the financial services industry is the most exposed to risk in the cloud, according to a new report. Not surprisingly, security awareness is higher in technology firms, with most saying excessive sharing o...read more
    baselinemag.com

    How Spear Phishing Puts Businesses on the Hook

    These days, cyber-attacks seem to arrive from almost every direction and tap increasingly sophisticated methods. Yet, spear phishing—which serves up realistic-looking e-mails and messages directed to a specific person, usually in an attempt to...read more
    baselinemag.com

    How Real-Time Data Boosts the Bottom Line

    While the majority of CIOs and other IT professionals recognize the importance of analyzing data in real time, tech leaders and developers disagree over how capable their organizations are at doing it, according to a recent survey from Vo...read more
    baselinemag.com

    Which CFO Personality Is Right for IT?

    When it comes to getting approval for IT purchases, the buck often stops with the CFO. And, in many cases, there's a specific CFO personality type that can make such decisions easier (or harder) for CIOs and their teams, according to a recent...read more
    baselinemag.com

    How Digital Dexterity Gives Businesses an Upper Hand

    Are all of your company's core operational processes automated and digitized? Can you access customer data in real-time? Do you and your colleagues base decisions on data and analytics—instead of best guesses" If so, then...read more
    baselinemag.com

    Why Challenging Your Employees Can Be a Challenge

    Employees are making New Year's resolutions for 2016—with many committed to taking charge of their professional lives, according to a recent survey from CareerBuilder. A significant share is determined to reduce work-related st...read more
    baselinemag.com

    Why Top-Performing IT Pros Get Lured Away

    Organizational leaders say they want to significantly boost the size of their IT department this year—but they admit that they face significant challenges in retaining the tech employees they already have, according to a recent survey ...read more
    baselinemag.com

    How Major Tech Incidents Burden IT—and Business

    Most organizations deal with major tech incidents several times a year—if not once a month, according to a recent survey from xMatters. The "Major Incident Management Trends 2016" report indicates that such mishaps directly impact revenues, an...read more
    baselinemag.com

    What Makes (and Breaks) Professional Reputations

    Millennials, Gen Xers and Baby Boomers differ greatly about what helps and hurts one's reputation at work, according to a recent, generational-focused survey from Weber Shandwick and the Institute for Public Relations (IPR). Findings re...read more
    baselinemag.com

    Why Machines Will Emerge as Top Collaborators

    With the current, rapid pace of advancements in artificial intelligence, modern managers are embracing the inevitable: that intelligent systems will step forward in the near future as trusted partners and collaborators in mak...read more
    baselinemag.com

    2016 Security Forecast: Decoding the Adversary

    Cyber-crime continues to impact businesses and has increased 48% since 2013, with businesses contending with 43 million known security incidents, according to a report released by AT&T. The report, "Cyber Security Insights Report," the carrier's ...read more
    baselinemag.com

    Best Practices for Embracing the Hybrid Cloud

    More than 65% of enterprise IT organizations committed to hybrid cloud technologies by the end of 2015, vastly driving the rate and pace of change in IT organizations, according to IDC. The key business drivers for publi...read more
    baselinemag.com

    The Worst Data Breaches of 2015

    Data breaches in 2015 weren’t kind to organizations that found themselves on the wrong end of a breach: 193.4 million personal records were compromised last year, and 5 million of those were compromised by the top seven breaches, according to a new study. Th...read more
    baselinemag.com

    Unstructured Data, Unending Security Concerns

    Eighty percent of respondents to a new survey know of data leakage incidents in their organizations, and while most have implemented technical controls and auditing, only 16% are highly confident in their file security investments. Consequently, there...read more
    baselinemag.com

    Rapid App Development Creates Security Nightmare

    An IT leader at a midsize professional services organization thought someone within the business was leaking sensitive information to unauthorized parties. Eventually it was discovered that a compromised mobile device was enabling high-level...read more
First <23456789101112> Last
(Page 7 of 96)