Producers at MLB.com suffered from email overload and needed to streamline their workflow and increase collaboration. Here's a look at how they greatly reduced email and simplified its publishing processes.
Governance, risk and compliance (GRC) can be a dauntingly complex undertaking. But for Fiserv, the alternative was even more complicated.
How long would you stay at a job, or in a career field, in which --regardless of your passion for the work and your talent, skills and achievements -- you were consistently bombarded with both overt and subliminal messages that you just did not belong?
Louis Sylvester applies the principles he used as a personal trainer to get his clients "fitter, stronger, healthier and generally feel better about themselves" in the enterprise space.
Want to promote harmony between marketing and IT? Try these steps.
Bill Wagner, LogMeIn’s COO talks to us about why the decision to take the free version of the popular remote access product was the right one and how the company’s other products are faring.
Computerworld India took some one-on-one time with Kaseya’s new CEO Yogesh Gupta, to discuss where he wants to take Kaseya in the coming years and how he plans to do it.
Julie Parrish, senior vice president and CMO, NetApp, talks about how marketing has transformed over the years and why the CIO-CMO gap seems to be widening.
Jason Nolet, SVP-Routing, Switching and Analytics Product Group, Brocade, shares why Brocade is the forerunner in the SDN discussion and how the New IP will be built on a strong bulwark of SDN and NFV.
Intel is driving IoT framework or reference architecture from sensors to the back end servers and analysis across the ecosystem of tech vendors, developers, systems integrators and CIOs. It’s not about bits and bytes from a digital perspective but one needs to know temperature, location and other aspects. But it will require interesting new skillsets at the organisation end across the entire spectrum to the likes of information scientists, data partitioners, networking experts to drive the true benefits of IoT, says Narendra Bhandari, Director, Software & Services Group, Intel Asia Pacific.
Virtual private network (VPN) connections designed to keep data safe from snooping eyes may be vulnerable to two forms of network attacks by malicious parties with access to a local network, a research paper (PDF) explained on June 30. The founders of Cloak, a VPN service with native iOS and OS X apps, say that the more severe of the two vulnerabilities also exists in iOS's most deeply integrated VPN protocol, and can't be mitigated without Apple's involvement.
Gartner has said that the worldwide IT spending slump is not symptomatic of a market crash, as Australia's rise bucks the trend.
It's become common practice to use virtual private networks for extra privacy and security in this era of mass surveillance, but a study published this week suggests such networks may not be as safe as they're commonly made out to be.
Former Fortescue Metals CIO, Vito Forte, lists the 5 areas of technology that he believes will soon disappear as corporate IT gets ready for the next wave of disruption.
It’s time enterprises moved past traditional collaboration tools and deployed social technologies.
From conducting video meetings to coordinating to-do lists, these collaboration apps for iOS, Android and more will have your far-flung team working in sync in no time.
Facebook today debuted Facebook Home, a new app launcher for Android phones.
Here is a list of 10 popular movies of 2012 which made heavy use of technology.