April 07, 2017
The tempo of partnering activity in the IT security space has intensified recently, with a spate of new or expanded channel programs; more news from the week.
March 31, 2017
The O'Reilly Software Architecture Conference kicks off in New York City on Sunday, and organizers are looking to help both career architects and 'accidental' architects.
March 30, 2017
As all tech experts know, it is only a matter of time before artificial intelligence (AI) takes over the world, eliminates all our jobs, creates Skynet and the terminator, and enslaves us all in ...
March 06, 2017
Deloitte Consulting surveyed more than 10,400 business and HR leaders and found that learning, recruiting, talent analytics and performance management are undergoing big changes.
Training Get Started
Bring yourself up to speed with our introductory content
Buying into hyper-converged technology? Storage expert Ed Tittel delves into the important questions to consider so you can make the best selection for your environment. Continue Reading
Looking to hire software developers? Find out the latest hiring trends, employment needs, software development training opportunities and skill levels in this guide. Continue Reading
Internal testing, employee education and training are three of the most important actions providers should take ahead of the ICD-10 deadline. Continue Reading
Evaluate Training Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Could blockchain -- with its ability to validate facts and transactions -- promote efficiencies in recruitment and other areas of concern for HR leaders? We take a look. Continue Reading
Office 365 offers many benefits, but there are plenty of cons to consider before leaping to this cloud-based productivity suite that includes Exchange Online. Continue Reading
CIOs are working to overcome the 'IKEA effect' and ownership bias as they endeavor to create more open, flexible approaches for delivering information technology resources. Continue Reading
Learn to apply best practices and optimize your operations.
Here's advice on how to track not just the amount of use of the analytics team's data and insights, but the value of the analytics they bring to the entire organization. Continue Reading
Enterprises are constantly bombarded by mobile security threats, and it's up to IT pros to thwart them. There are six key items that belong on IT's mobile security checklist. Continue Reading
At many hospitals and physician practices, endpoint devices -- such as desktop computers, laptops and smartphones -- can become areas for cybercriminals to exploit. However, a combination of high-tech defense and old-fashioned common sense offer potent protection against endpoint breaches.
This handbook starts off with an article that looks at the security aspects of patient data on mobile devices and how those devices can work with storage technology. It may be best, when possible, to steer clear of storing personal health information on smartphones and tablets. Instead, look to back-end storage options.
Next, readers can learn about HIPAA breaches and endpoint security in a Q&A with a hospital interim CIO. He recommends using multifactor authentication -- in other words, the practices of using at least two different credentials to verify a user's identity -- as a prime way to protect patient data from breaches that could violate HIPAA requirements.
The final article pinpoints the security advantages offered by a virtual desktop infrastructure (VDI), which can help medical facilities sidestep data breaches while physicians use mobile devices.
These high-tech efforts, combined with improved end-user education, can help clinicians and others in hospitals and physician practices avoid lurking digital dangers that threaten endpoints.Continue Reading
Problem Solve Training Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Attracting Millennials to the manufacturing industry is critical if the sector is to solve its impending skills gap crisis. To that end, here are some basic efforts needed to make manufacturing systems Millennial-friendly. Continue Reading
In this podcast, Eric Kimberling of Panorama Consulting discusses the 'canaries in the coal mines' of ERP projects that may indicate an ERP project is failing. Continue Reading
Some contact center agent training systems miss the mark. When choosing technology, managers must be in tune with the frontline's needs. Continue Reading