Monday, February 15, 2021

6 business concepts IT leaders should master

From IDG Insider Brands

The best articles from all five IDG enterprise publications

IDG's Top Enterprise Stories

February 15, 2021

6 business concepts IT leaders should master

CIOs must master critical business concepts when speaking to their leadership peers. Here are some essential terms. Read more ▶

Sponsored by Intel: Building the Modern Data Center

From cloud solutions to supercomputing to transforming data at the edge, Intel and its partners are at the forefront of advancing data center capabilities to help businesses stay competitive, improve operations, accelerate innovation, and drive growth – now and in the future.

Okta CEO: Here's where cloud identity management is headed

Todd McKinnon, CEO and founder of Okta, talks about the road ahead for his company and the future of identity and access management in the cloud.

Angular, React, Vue: JavaScript frameworks compared

Modern data-binding JavaScript frameworks have revolutionized web interface architecture. This article compares three of the best.

Image: Apple wants Safari in iOS to be your private browser

Apple wants Safari in iOS to be your private browser

Apple continues working on privacy improvements in Safari as it seeks to disrupt the data industrial complex.

How do you research new tech products?

Has how you research tech solutions changed in the face of the pandemic? Share your insight into the information tech decision-makers rely on today, your expectations for an IT vendor, and overall content preferences in IDG's 2021 Customer Engagement research.

AMD builds momentum in server market

Growing market share and customer wins show that AMD Epyc processors are taking hold.

3 must-haves for your multicloud architecture

Your preflight checklist should have centralized account management, resource management, and asset normalization.

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty years, and are only growing more prevalent and stronger.

Facebook Twitter LinkedIn
© 2021 IDG Enterprise
492 Old Connecticut Path
Framingham, MA 01701

No comments:

Post a Comment

Guessing the future for AUKUS and ICE

From the SitRoom to the E-Ring, the inside scoop on defense, national security and foreign policy. ...