IT NEWS & TRENDS

Subscribe
 

Nine Advantages of Open Source Software

Even though some IT leaders shy away from open-source technology, its origins are rooted in traditional IT processes. Open-source software has come a long way over the years, and the always-active open-source communities are one of the primary reasons for the tech’s success. As a result, more than half of the software acquired over the next several years will be open source, according... Read More »

Eight Interesting Facts About Java

Java, the long-lasting programming language, remains immensely popular—and for many good reasons. Java is the go-to language for millions of software developers. Java emerged as a tech juggernaut because of its unique portability and its capability of operating similarly on any hardware or operating system. It’s secure, simple and robust, so with these attractive qualities in... Read More »

11 Best Practices for Business Intelligence

Interest in business intelligence (BI) is surging, as big data is expected to explode into a $50 billion market in 2015—nearly doubling its current size. Why not, when BI supports so many business-critical functions, such as analytics, business performance management, text mining and predictive analytics. And while BI presents virtually limitless potential with regard to transforming... Read More »

Tech’s Indelible Impact on Society

A significant share of Americans feel that digital companies are gaining so much power that they'll eventually get regulated just as utilities are today, according to a recent survey... Read More »

Want to Engage Employees? Feed 'Em!

In prior features, we've written about how CIOs and other IT leaders struggle to hire qualified tech employees for vacant, mission-critical positions. And, once those staffers are in place, it's difficult to keep them engaged so they remain with the IT department year-after-year. Given these challenges, you always want to... Read More »

The Return of the Malicious Attachment

Malicious attacks have shifted from URL-based campaigns, which dominated last year, to campaigns that rely on attachments to deliver malware payloads, according to a new study. The study also found that phishing increasingly targets business users, and that social... Read More »

Your Organization Is Infected–Now What?

Protecting your network from ransomware is an integral part of any network security framework for both individuals and companies. It's also important to have a plan of action once you know you've been stricken. Stu Sjouwerman, founder and CEO of KnowBe4, realized that the human element of security was being seriously neglected, so he teamed up with Kevin Mitnick, a computer security... Read More »

Onsite Visit Is a Key Step to Outsourcing Services

CIOs often find little value in their due diligence visits because they typically perform due diligence after they have already selected a supplier.

Read More »

Read More From Our IT News & Trends Archive »