Latest


Simply Secure: Changing Password Requirements Easier on Users


The latest changes in NIST password requirements are welcome changes for both users and administrators: no more special characters, and no more periodic password resets!...

Beat Injuries With These 4 Computer Ergonomics Tips


If you've got aching wrists, stiff shoulders or are developing a hunchback, it's time to set up an ergonomic workstation. Here are some tips on how to get it right.

The Control Panel: Why the Best Vendor Cybersecurity Dashboards are Complex


Cybersecurity consists on an intricate web of technologies, all working side by side to protect your digital assets. Here we take a look at these technologies, and why...

5 Issues That the Mobile Device Industry Needs to Solve, Pronto


The latest in mobile development has brought several smartphone industry life cycle issues to the fore. Here are a few things that the industry needs to solve in a hurry...

Stopping Social Engineering: Who's Looking Over Your Shoulder?


Social engineering might be low tech, but it works. That means that protecting against it isn't so much about technology as it is about teaching staff how to stay safe.

Serverless Computing: Which Service Is Right for You?


In the world of serverless computing, three providers stand out. Here we compare their features and pricing, to help you decide which is right for you.

6 Big Advances You Can Attribute to Artificial Neural Networks


Artificial neural networks are paving the way for scientific, social and economic breakthroughs. Here's a closer look at some of the advances we can thank ANNs for.

PHP 101


This scripting language is simple, inexpensive and highly effective, which explains why it's so popular. Find out more about it here.

Why Quantum Computing May Be the Next Turn on the Big Data Highway


If we are going to be able to make sense out of all the data that we are accumulating, we'll need a faster way to process it. Quantum computing provides a possible...

4 Reasons Why BYOD Is No Longer An Optional Strategy


Not long ago, bring your own device (BYOD) was a hot new trend, but now it's simply a reality of modern business. Find out why BYOD has become more than just a passing...

Making Networks More Secure in the Age of Cybersecurity


Threats are constantly evolving, and so must your security. Here we take a look at some of the most important aspects of modern cybersecurity.

Project Management, Cloud Computing Style


Cloud project management software enables collaboration and reduces costs, but it isn't without a few pitfalls.

Can Creativity Be Implemented in AI?


Artificial intelligence is constantly pushing the boundaries of what it's capable of, but can it be creative? Some argue that it can only output variations of the data...

Open Source: Is It Too Good to Be True?


This software Shangri La is still thriving, thanks in large part to the internet and the culture of sharing that the web has always helped espouse. But is a world of...

Slow Dancing With Technology: Debugging, the Programmer and the Machine


Thoughtful leaders have dreamed up a more fluid software release structure to bridge the development and production environments, but computer programming still has an...

Experts


What is the difference between scale-out versus scale-up (architecture, applications, etc.)?


The terms "scale up" and "scale out" are commonly used in discussing different strategies for adding functionality to hardware systems. They are fundamentally different...

How can neural networks affect market segmentation?


New artificial neural networks are useful in a broad spectrum of ways, but one of the most popular applications is to the marketing world. Neural networks can...

How can businesses innovate in managing data center bandwidth?


More sophisticated methods of managing data center bandwidth allow for more consistent performance, and allow administrators to avoid various pitfalls of out-of-control...

What are some important aspects of file integrity monitoring?


With file integrity monitoring, IT professionals compare different versions of files against a baseline using tools like a "checksum" or hash "image" of a file, to spot...

Why are some companies contemplating adding "human feedback controls" to modern AI systems?


Some companies working with cutting-edge AI technology are working to institute human controls for these systems, giving machine learning and deep learning tools some...