Web page News
July 01, 2016
Bill Caraher, CIO and director of operations for a Wisconsin law firm, is one believer in the huge impact blockchain technology -- a peer-to-peer distributed network used to validate transactions and other records -- can have on legal services. Blockchain implementations, he said, could "lead to speedier resolutions, [and] it could lead to better evidence gathering [and to establishing] foundation for a case" and have other "sweeping implications" for this industry. Indeed, the technology's potential use cases are a hot talking point among Caraher and fellow observers of blockchain -- but figuring out which use cases make sense and putting them into action demand a lot of work. The effort involved in implementing blockchain will depend on many factors, including vertical industry, having the right software and hardware, and more.
In this issue of CIO Decisions, Editorial Director Sue Troy lays out the four key stages of blockchain implementations, including identifying use cases, running proofs of concept and launching field trials. Plus, we explore how one healthcare CIO used cloud computing to bridge the disconnect between IT and patient care; get MIT Sloan cybersecurity expert Stuart Madnick's take on how to build a better defense against dark web hackers; and delve into innovative ways to close the tech skills gap.
June 09, 2016
The government has not yet released an official explanation for the crash of the UK voter registration website earlier this week – but Computer Weekly has learned the likely cause. How ironic it ...
June 08, 2016
This is a guest post for the Computer Weekly Developer Network written by Eran Kinsbruner, mobile technical evangelist at Perfecto. The company offers a cloud-based digital quality test lab for ...
May 19, 2016
The ImageTragick bug raises questions over responsible disclosure, as the flaw in the ImageMagick image-processing library exposes millions of websites to remote code execution.
Web page Get Started
Bring yourself up to speed with our introductory content
Learn about how programmers and developers can use TechTarget's new website, SearchITOperations. Continue Reading
Emerging technologies force enterprise IT shops to rethink not just which new products and services to adopt, but even more importantly, the very nature of how they do their jobs. For this reason, ... Continue Reading
Channel partners, who have long bemoaned the challenges of marketing themselves, turn to outside specialists for help optimizing their website design and content. Continue Reading
Evaluate Web page Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft is killing off support for SharePoint public websites, and companies will now have to go to third parties for support. For some shops, that could increase costs. Continue Reading
Workers can use Web Notes in Microsoft's Edge browser to mark up websites, but saving the notes is a little wonky. Continue Reading
A drive-by download attack targets everyone while a drive-by login attack gets personal. Expert Nick Lewis explains the two attacks and what can be done to stop them. Continue Reading
Manage Web page
Learn to apply best practices and optimize your operations.
A new Microsoft roadmap website has revealed what's to come in Dynamics CRM 2016 and future versions. Here we look at three features on the docket. Continue Reading
What can you do to speed bloated, slow-to-load Web pages? Expert Tammy Everts suggests 19 different ways to fix the problem. Continue Reading
Contextually aware content can enrich online experiences by anticipating user needs, but it also demands that users have a firm grasp of the customer journey and information architecture already in place. Continue Reading
Problem Solve Web page Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Organizations are getting better at defending against cyberattacks, says MIT Sloan's Stuart Madnick, but dark Web hackers maintain an edge. He explains why. Continue Reading
Banking malware Vawtrak has the capability to bypass two-factor authentication. Expert Nick Lewis explains how Vawtrak works and how to stop it. Continue Reading
Client-side injection malware, or CSIM, can manipulate how Web advertisements are served on a user's browser. Expert Nick Lewis explains how this happens and how enterprises can stop CSIM. Continue Reading