IT Management News & Reviews - Page 10
More IT Management News
Wayne Rash | Updated
UPDATE: With the publication this week of Facebook co-founder Chris Hughes' New York Times article on this topic, eWEEK is re-publishing this Feb. 1 column by longtime Contributing Editor Wayne Rash, which predated Hughes' article by more than two months.
How does an enterprise select a managed services provider to handle important integrations of business apps and services to the cloud? Decision-makers can start by reading a side-by-side account of the market leaders in this eWEEK Top Companies article.
COMPANY ANALYSIS: At Dell Technologies World, Dell shows it’s a much different company than it was just a few years ago.
eWEEK IT SCIENCE: Thanks to Idaptive's one-click solution, Rémy Cointreau can now onboard new employees or revoke access to former employees. This makes hiring, role transitions and departures easier for both HR and IT.
PRODUCT ANALYSIS: Pica8 leads the charge to bring network automation and provisioning to branch offices using white box switches.
Project management software has the capacity to help plan, organize and manage resource tools and develop resource estimates. Depending on the sophistication of the software, it can manage many tasks, such as estimation and planning, scheduling, cost control and budget management, resource...
eWEEK DATA POINTS: BYOD brings inherent issues to a company: a marked lack of visibility into how employees are using their devices when compared to traditional computing, resulting in significantly increased exposure to legal liability, cybersecurity risks and mounting operational costs. How...
eWEEK DATA POINTS: The average time to close a mortgage is three weeks or more. New AI-based technology can get that close time down to one to two days. This article explains how AI is changing the mortgage industry for the better--and how this could happen in the next 12 months.
SECURITY ANALYSIS: Command-and-control servers execute commands that could range from stealing personal information to ransomware attacks to pulling email (and getting insider information) to emptying accounts. This is a growing threat, and here's what some companies are doing about it.