Web page News
September 26, 2016
The upcoming Windows Defender Application Guard feature in Microsoft's Windows 10 Edge browser will help IT departments protect against malware from compromised websites.
September 06, 2016
Form.io, SearchSOA's Editors' Choice for Innovation, simplifies the creation of front-end business process forms by integrating back-end API data management.
July 01, 2016
Bill Caraher, CIO and director of operations for a Wisconsin law firm, is one believer in the huge impact blockchain technology -- a peer-to-peer distributed network used to validate transactions and other records -- can have on legal services. Blockchain implementations, he said, could "lead to speedier resolutions, [and] it could lead to better evidence gathering [and to establishing] foundation for a case" and have other "sweeping implications" for this industry. Indeed, the technology's potential use cases are a hot talking point among Caraher and fellow observers of blockchain -- but figuring out which use cases make sense and putting them into action demand a lot of work. The effort involved in implementing blockchain will depend on many factors, including vertical industry, having the right software and hardware, and more.
In this issue of CIO Decisions, Editorial Director Sue Troy lays out the four key stages of blockchain implementations, including identifying use cases, running proofs of concept and launching field trials. Plus, we explore how one healthcare CIO used cloud computing to bridge the disconnect between IT and patient care; get MIT Sloan cybersecurity expert Stuart Madnick's take on how to build a better defense against dark web hackers; and delve into innovative ways to close the tech skills gap.
June 09, 2016
The government has not yet released an official explanation for the crash of the UK voter registration website earlier this week – but Computer Weekly has learned the likely cause. How ironic it ...
Web page Get Started
Bring yourself up to speed with our introductory content
There are paths you can take if your organization does not allow for DR plan spending. Check out templates, websites and a concise demonstration of how to do it. Continue Reading
Many businesses lack a clear A/B testing strategy when implementing changes to their websites, which means they often miss out on potential opportunities to drive improvements in site performance. Continue Reading
Learn about how programmers and developers can use TechTarget's new website, SearchITOperations. Continue Reading
Evaluate Web page Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Enterprises should broaden their threat monitoring to include dark web sites. Expert Matt Pascucci explains why it's important, and what enterprises can learn from the dark web. Continue Reading
Unified communications is seeing a trend toward contextual communication. Expert Tsahi Levent-Levi explains the influence of WebRTC, APIs and analytics on this latest movement. Continue Reading
Microsoft is killing off support for SharePoint public websites, and companies will now have to go to third parties for support. For some shops, that could increase costs. Continue Reading
Manage Web page
Learn to apply best practices and optimize your operations.
Admins can use the OpenStack Horizon dashboard to deploy and manage cloud services. But what are some options for customizing the dashboard's view? Continue Reading
IT often runs into problems with legacy apps not functioning well on new browser versions. There are a few ways to combat Windows 10 browser compatibility issues in Internet Explorer 11. Continue Reading
A new Microsoft roadmap website has revealed what's to come in Dynamics CRM 2016 and future versions. Here we look at three features on the docket. Continue Reading
Problem Solve Web page Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Organizations are getting better at defending against cyberattacks, says MIT Sloan's Stuart Madnick, but dark Web hackers maintain an edge. He explains why. Continue Reading
A drive-by download attack targets everyone while a drive-by login attack gets personal. Expert Nick Lewis explains the two attacks and what can be done to stop them. Continue Reading
Banking malware Vawtrak has the capability to bypass two-factor authentication. Expert Nick Lewis explains how Vawtrak works and how to stop it. Continue Reading