Editors' Picks
-
CIOs get some love from Cupertino with Apple iOS 7
In this week's Searchlight: For CIOs, Apple iOS 7 was the important news out of Cupertino. Plus Google's new encryption, leadership tips and more.13 Sep 2013
-
Does Content-Agnostic Malware Protection improve Chrome security?
Expert Michael Cobb explains how Content-Agnostic Malware Protection, or CAMP for Chrome, works and whether the feature improves Chrome security.10 Sep 2013
-
Do two-factor authentication vulnerabilities outweigh the benefits?
Two-factor authentication vulnerabilities are a real concern, but should they deter enterprises from deploying 2FA? Expert Michael Cobb discusses.10 Sep 2013
-
Microsoft's Nokia acquisition brings fresh legs to mobile race
In this week's Searchlight: Microsoft gets serious about mobile with Nokia acquisition; Android's tasty new OS; the latest NSA jaw-dropper; and more.06 Sep 2013
-
With social shopping, former mallrats turn to mice
In the Searchlight: What social shopping means to CIOs. Plus: Zuckerberg 'likes' developing nations, a scary series of outages and more.23 Aug 2013
-
CIO's approach to BYOD in education puts focus on productivity
Our IT Leader of the Year, Utah State University CIO Eric Hawley, approaches BYOD in education by making mobility work a productivity tool.21 Aug 2013
-
A midsummer night's bad dream: The CIO position regresses
The seamless integration and provisioning of IT services is a lofty goal for even the most seasoned CIO. We don't have time for that.21 Aug 2013
-
In major technology shift, CIO finds competitive business advantage
Our IT Leader of the Year, Utah State University CIO Eric Hawley, discusses a technology shift in education and tapping it for competitive advantage.21 Aug 2013
-
Better data center planning tactics from the Open Compute Project
The Open Compute Project brings together data center titans to address pressing issues around hardware, interoperability and holistic operations.21 Aug 2013
-
Know your wearable computing devices: Google Glass smartglasses
Wearable computing devices will make a splash in the consumer and enterprise worlds, so make sure you know how devices such as Google Glass work.20 Aug 2013
-
If IT had a hammer: Choosing among IaaS, PaaS and SaaS
Enterprises tend to use the latest technology to solve all of its IT problems. But if your apps are nails, is IaaS, PaaS or SaaS really the hammer?19 Aug 2013
-
Let's be reasonable about our email privacy expectations
In this week's Searchlight: Does it matter what Google really said about email privacy? Plus: NSA antics, predictive analytics for good and more.16 Aug 2013
-
Former VMware CIO talks top data threats
Mark Egan, who once cautioned CIOs on the data threats lingering in cloud services, now says his top threats are abroad and in the endpoint.12 Aug 2013
-
Choosing among IaaS, PaaS and Database as a Service for a cloud database
Regardless of which cloud database you choose, multiple factors must come into play, ranging from costs and availability to feature support.12 Aug 2013
-
Cloud email migration: 10 tips for evaluating service providers
In this tip by Executive Editor Jan Stafford, Mimecast CEO Peter Bauer explains how to evaluate vendors that provide cloud email migration services.09 Aug 2013
-
A midsummer night's bad dream: The CIO position regresses
The seamless integration and provisioning of IT services is a lofty goal for even the most seasoned CIO. We don't have time for that.07 Aug 2013
-
Data scientists and trust: Numbers don't lie -- but might fib a bit
In this week's Searchlight, data scientists might have answers you're looking for, but are they the right ones? Plus, the new cloud fear and more.07 Aug 2013
-
NASA's shadow IT issues with cloud computing all too common
A recent NASA audit report found shadow IT issues plague the agency's cloud computing deployments -- and it's not only NASA's problem.06 Aug 2013
-
Backupify lets enterprises manage their cloud-to-cloud backups
Cloud-to-cloud backup vendor Backupify gives enterprises 'bring your own storage' option for protecting Google Apps.06 Aug 2013
-
Junipers' Mobile Threats Report: Mobile malware attacks grew over 600%
Juniper Networks' third annual Mobile Threats Report reveals mobile malware grew 614% in 2012, most of it aimed at Android users.06 Aug 2013
Security Management Strategies for the CIO