7 killer open source monitoring tools
7 killer open source monitoring tools Network and system monitoring is a broad category. There are solutions that monitor for the proper operation of servers, network gear, and applications, and there...
View ArticleVisibleThread Clarity Grader: Improving your online content
One of the problems with producing online content is polishing it to meet the expectations and needs of your audience. I’m not talking about the topics you cover but rather issues such as readability...
View ArticleMobile management on the rise, but many companies still at risk
There's a lot of confusion, disruption and even turbulence in the market for enterprise mobility management (EMM) software, which is used to manage smartphones and tablets and the data and apps running...
View ArticleWearables, IoT spark interest in mobility management tools
The hype around BYOD isn’t as loud as it was a few years ago, but that doesn’t mean the problems associated with managing user-owned devices have gone away. And with the growth of wearables and the...
View ArticleHow to evaluate password managers
All password managers have as many as four separate products for storing passwords: a desktop and mobile app, a browser extension, or a pure Web-based service that doesn’t require any other software...
View ArticleThe real cost of unused software will shock you
How much is that software in the window? If it's just sitting there, a lot. According to a new study, U.S. organizations wasted $30 billion — yes, billion — on unused software over the course of a...
View ArticleEnterprise use of hybrid tablets growing fast
Most major hardware manufacturers offer some type of hybrid tablet and even Apple and Samsung jumped into the hybrid game with the iPad Pro and the Tab Pro S, which both do decent impressions of a...
View ArticleWhite House IT overhaul an antique roadshow
The New York Times yesterday had an account of an ongoing effort to modernize the IT infrastructure and end-user equipment relied upon by those whose workplace address is 1600 Pennsylvania Avenue. In...
View ArticleIDG Contributor Network: Using radio frequency noise detection to identify...
One day the inventorying of electronic equipment in the workplace could be accomplished through radio frequency (RF) noise detection rather than labelling and tagging. The concept is based on the fact...
View ArticleHow to implement an effective BYOD policy
Concerns around BYOD once revolved around security with third-party services, but that's getting easier to manage, says Fred Ouawad, founder and CEO of TaskWorld, a company focused on employee...
View ArticleNew accounting standards change the rules of IT leasing
The Financial Accounting Standards Board’s new lease accounting standards announced earlier this year will require public companies to recognize assets and liabilities from operating leases on their...
View Article27% off Seagate Expansion 4TB Desktop External Hard Drive USB 3.0
The Seagate expansion desktop drive provides extra storage for your ever-growing collection of files. Instantly add space for more files, consolidate all of your files to a single location, or free up...
View Article6 Internet of Things companies to watch
Network World increasingly has been writing about companies transforming their businesses via the Internet of Things rather than just tracking the latest IoT vendor announcements. But after taking a...
View ArticleWearables, IoT spark interest in mobility management tools
The hype around BYOD isn’t as loud as it was a few years ago, but that doesn’t mean the problems associated with managing user-owned devices have gone away. And with the growth of wearables and the...
View ArticleHow to evaluate password managers
All password managers have as many as four separate products for storing passwords: a desktop and mobile app, a browser extension, or a pure Web-based service that doesn’t require any other software...
View ArticleThe real cost of unused software will shock you
How much is that software in the window? If it's just sitting there, a lot. According to a new study, U.S. organizations wasted $30 billion — yes, billion — on unused software over the course of a...
View ArticleEnterprise use of hybrid tablets growing fast
Most major hardware manufacturers offer some type of hybrid tablet and even Apple and Samsung jumped into the hybrid game with the iPad Pro and the Tab Pro S, which both do decent impressions of a...
View ArticleWhite House IT overhaul an antique roadshow
The New York Times yesterday had an account of an ongoing effort to modernize the IT infrastructure and end-user equipment relied upon by those whose workplace address is 1600 Pennsylvania Avenue. In...
View ArticleUsing radio frequency noise detection to identify and track electronic equipment
One day the inventorying of electronic equipment in the workplace could be accomplished through radio frequency (RF) noise detection rather than labelling and tagging. The concept is based on the fact...
View ArticleHow to implement an effective BYOD policy
Concerns around BYOD once revolved around security with third-party services, but that's getting easier to manage, says Fred Ouawad, founder and CEO of TaskWorld, a company focused on employee...
View Article
More Pages to Explore .....