IT roles News
March 04, 2016
Cloud computing positions increasingly demand AWS expertise. While the particulars may vary, job seekers need to get their hands dirty in the field to land their desired position.
February 29, 2016
A recent diversity report by Intel shows the chip maker is making strides towards a more inclusive workplace, but there's still a lot of work to be done -- and both Intel and the rest of the world ...
January 13, 2016
When reflecting on 2015, IT professionals are bound to have some regrets. In this #CIOChat recap, participants share their biggest 2015 regrets and resolutions for 2016.
December 22, 2015
The effect of activist investors and leveraged buyouts on IT providers is something that can be advantageous in IT buying decisions.
IT roles Get Started
Bring yourself up to speed with our introductory content
Taking on the role of a QA lead for the first time can be daunting. How does it differ from other roles? What does the job entail? Expert Gerie Owen has the answers. Continue Reading
A data center administrator monitors systems, installs equipment and cabling, and participates in change processes and everyday procedures that support information technology. Continue Reading
VMware is a top platform for enterprise virtualization. Potential administrators should have a strong grasp of the technology before an interview for the job. Continue Reading
Evaluate IT roles Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Check out the pro-hardware side of the Open Networking User Group debate at its Fall 2015 conference where hardware squared off against software. Continue Reading
President Obama couldn't have put the current state of cybersecurity better: "Whether it's phishing or botnets, spyware or malware, and now ransomware, these attacks are getting more and more sophisticated every day," he said at a summit at Stanford University earlier this year. And yet, many enterprises remain complacent in the face of these grave threats. In fact, in a study cited by SearchCIO expert Harvey Koeppel, a measly 9% of executives at companies that have experienced a breach run ongoing security tests. "What's the deal here? If this bad stuff has been going on for more than 30 years, why can't we get it under control?" Koeppel asks.
In this SearchCIO handbook, Koeppel attempts to answer that question for CIOs: He provides a checklist for IT leaders on how to manage data security in a landscape riddled with evolving cyberthreats. In our second piece, CTO Niel Nickolaisen offers three security processes that can help mitigate the one constant in the midst of ever-evolving cyber-risks: human error. Lastly, writer Mary K. Pratt talks to top security experts about what companies need to do to make their security systems less "brittle" and more resilient. Continue Reading
There will always be users who need help with a new operating system, but whether everyone in your organization needs Windows 10 training is a tough nut to crack. Continue Reading
Manage IT roles
Learn to apply best practices and optimize your operations.
What does a test manager do? That's not the easiest question to answer, as responsibilities vary. Expert Matt Heusser explains the crux of the role and provides some tips as well. Continue Reading
Image-based VM deployments can dramatically increase consistency when creating new VMs. Use these tips to configure the perfect VM on the first try. Continue Reading
When the product owner role isn’t strongly developed, it can derail the best-run software projects. How do you deliver the right product when the business is less than fully engaged? Continue Reading
Problem Solve IT roles Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this Ask the Expert, analysts James Staten of Forrester Research and Kyle Hilgendorf of Gartner explain why companies need the services of a cloud architect. Continue Reading
As intellectual property becomes the objective of business, IT must focus more on security and flexibility. Continue Reading
A CIO's role and the overall success of an enterprise's security are the two main factors that can make or break an organization. Continue Reading