Menu

internet - News, Features, and Slideshows

internet in pictures

News about internet
Tutorials about internet
  • 3 reasons why healthcare CIOs love wearables

    Healthcare CIOs have been given a great gift for their efforts to deal with the transformation from pay-for-service to pay-for-value -- wearable devices. Strategically minded CIOs will aggressively take action to help their organization leverage this technology for big data analytics and population health management.

    Written by Scott Nelson28 Jan. 16 22:35
  • 4 ways Twitter plans to keep you safe and secure

    Twitter recently unveiled its latest effort aimed at improving your safety and security: a new Safety Center hub, which aims to cut down on abusive behavior and arm you with information about its tools and policies.

    Written by Kristin Burnham10 Aug. 15 23:51
  • 4 simple LinkedIn tips to polish your profile

    Last month, during an editorial offsite on the Atlantic shores of Cape Cod, the CIO team shared some tips and advice with each other on how to be more productive and improve our online personas. At CIO, we know the knowledge and insights we gain from our peers can be invaluable, and that's one reason we're all active LinkedIn users.

    Written by Matt Kapko09 June 15 04:38
  • Three reasons to be wary of the Internet of Things

    According to a 2014 HP report, titled Internet of Things Research Study, 70 per cent of the most commonly used Internet of Things (IoT) devices contain vulnerabilities involving password security, permissions and encryption.

    Written by Jennifer Lonoff Schiff12 March 15 04:15
  • 5 Tips for Transforming Enterprise IT Towers Into Cloud Services

    As companies adopt more cloud IT services and work with an increasing number of service providers, the tried-and-true IT towers of the past no longer serve their needs. "The old model lacks the clarity of ownership required to drive decisions on as-a-service offerings that span the traditional tower structure," says Steve Keegan, principal with outsourcing consultancy Pace Harmon. "Determining who makes the call isn't straightforward -- the server team, the app team or the database team?"

    Written by Stephanie Overby25 Oct. 14 01:09
Features about internet
  • Why Instagram started banning hashtags (and why it's a bad idea)

    Policing social media sites is no easy task, because users can post almost anything they want, often without consequence. Other users can report inappropriate content, but it's not possible for social networks to remove every post that violates their guidelines.

    Written by Lauren Brousell12 Aug. 15 23:55
  • Why you shouldn't accept every LinkedIn connection invite

    Next time you receive an invitation to connect on LinkedIn from someone unfamiliar, think twice before you accept. This is not only sound advice, it's part of LinkedIn's official rules. Section 8.2 of the site's user agreement specifies that members agree not to "invite people you do not know to join your network." While Facebook and Twitter are great for broadcasting random thoughts and bragging about your private life to complete strangers, LinkedIn is designed to be personal and relevant to your professional life.

    Written by Matt Kapko10 Aug. 15 23:42
  • Government CIOs fret over apps reliability in the cloud

    Government CIOs in states and local districts increasingly are looking to push applications to the cloud, but security and a reliable user experience remain principal challenges, a new survey reports

    Written by Kenneth Corbin03 Aug. 15 23:27
  • Predicting winners and losers in the EMV rollout

    We're just a couple months shy of the big EMV liability shift. That's when companies that don't accept chip-enabled debit and credit cards take on financial responsibility for hacks and fraud.

    Written by Jen A. Miller27 July 15 23:34
  • 7 social media mistakes job seekers must avoid

    Social media can be a fun part of your day. You get to interact with friends, family and strangers -- and maybe if you're lucky, get a retweet from your favorite celebrity. But as much as you may like to put yourself out there, it can be easy to forget that your public social media accounts are just that: public.

    Written by Sarah K. White24 July 15 00:15

Whitepapers about internet

  • Internet Security Threat Report

    Symantec has established one of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network, which is made up of more than 63.8 million attack sensors and records thousands of events per second. This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services, such as Symantec DeepSight™ Intelligence, Symantec™ Managed Security Services, Norton™ consumer products, and other third-party data sources.

  • Australia's Internet Security Threat Profile

  • Security in a Faster Forward World