Risk Management

Risk Management | News, how-tos, features, reviews, and videos

29 tips for succeeding as an independent developer

Find out how to cut corporate ties and transform your coding chops into a thriving business that can go the distance

Liquid computing: The next wave of the mobile experience

The traditional enterprise workflow is ripe for huge change as the focus moves away from working in a single context on a single device to the workflow being portable and contextual

The care and feeding of a rockstar developer

Whether you're a hiring company, an educator, or a developer, find out what you're up against in the war for programming talent

The beginner's guide to Docker

Dig into Docker, the red-hot open source framework, from getting started to services you can use right now to the company's direction, in this downloadable PDF

Digital Spotlight: Cloud Security

The scalability of cloud computing depends on sharing resources that were never shared before, creating a new set of risks and demanding a new set of security best practices

Special report: The triumph of JavaScript

JavaScript is the reigning programming language across platforms and devices. Harness that power with the right frameworks and tools

Download the Hadoop Deep Dive

Businesses are using Hadoop across low-cost hardware clusters to find meaningful patterns in unstructured data. In this in-depth PDF, InfoWorld explains how Hadoop works and how you can reap its benefits

Download the HTML5 Strategy Deep Dive

Preparing your website and Web apps for HTML5? Here's what you need to know

Download the Cloud Security Deep Dive

The scalability of cloud computing depends on sharing resources that were never shared before, creating a new set of risks -- and demanding a new set of security best practices

The 50 shades of the enterprise tech gray market

You can save a bundle of money buying redundant or noncritical gear from the gray market, but a lot of risk is involved

After Hurricane Sandy: Lessons for the data center

You never want to say 'I told you so,' but now is a good time to bring up the need for better monitoring, backup power, and other improvements

Risk, and why IT has such a hard time getting BI right

IT has always feared risk and uncertainty. But to get BI right, it is going to have to embrace them

Ex-hacker spills secrets of fighting social engineering

Targeting your users for phishing attacks is a great way to ensure social engineering training sticks

Corporate cloud showdown: IT vs. Legal

Inside the enterprise, the biggest obstacle to cloud computing is often the company's own corporate counsel

Why the GPL licensing cops are the good guys

GPL enforcement by Software Freedom Conservancy puts electronics makers on notice, leaves business users untouched

The two sides of an IT admin: Dr. Jekyll and Mr. Hyde

Few professions have the propensity to go from normal to obscene as rapidly and thoroughly as IT does

2 more cloud myths busted: Lock-in and locked up

When it comes to technology dependency and risk of legal compliance, the cloud is just like everything else

BYOD and the hidden risk of IT security

When employees use personal devices for business purposes, too much security can create more risk than it prevents

VisiCalc's Dan Bricklin weighs in on the tablet revolution

Co-creator of the original PC killer app sees ample opportunity for innovators on tablets

Learning from the cloud's failings

Last week's Windows Azure Compute outage underlines customers' blind faith in infallible cloud solutions

Load More
You Might Also Like