Thirty most popular articles of current edition:
  1. Top 9 Questions CIOs Should Be Prepared To Answer About Cybersecurity Readiness
  2. 10 Mistakes Rookie CIOs Make - And How To Avoid Them
  3. Facing Pressure, CIOs Tap Managed Service Providers To Deliver Efficiency
  4. What Is The Role Of The Data Manager?
  5. How You Can Manage And Eliminate Technical Debt
  6. 6 Tactics To Boost Creativity On Your IT Team
  7. The CIO's Shortcut To Leading In The New Era Of Work
  8. Cyber Security: The Message That Never Makes It Up To The Board
  9. 5 Pillars Of Modern Digital Transformation
  10. How To Do Email Blast Right? [+5 Tools]
  11. Should You Bother With An Email Signature?
  12. Data Center Outages Are Now Less Disruptive - But Are Costing More
  13. Best GDPR Compliance Software For CTOs
  14. 4 Major Telecom Carriers Pilot Holographic Phone Calls
  15. The 'Hopper' GPU Compute Ramp Finally Starts
  16. The Cost Of Single Sign-On (SSO) And Password Management
  17. Security Buzzwords To Avoid And What To Say Instead
  18. NAS vs. Cloud Storage: Which Is Better For Your Business?
  19. Poor Identity Management Amplifies Ransomware
  20. The Top 6 Identity And Access Management Trends From The Gartner IAM Summit
  21. 5 Ways Data Storage IT Pros Enable Business User Self-Service
  22. Top 5 Attack Surface Challenges Related To Security Operations
  23. CIO Balancing Act: Managing Cyber Risk Amidst Talent, Regulatory And Attack Surface Challenges
  24. An Introduction Guide To MapReduce In Big Data
  25. Consider The Advantages And Disadvantages Of NAS
  26. Digital Transformation: 6 Tips To Stay On Track
  27. The Advantages Of Using A Cloud-Based DCIM Software
  28. ARM Is The New RISC/Unix, RISC-V Is The New ARM
  29. Business Transformation Advice, with EY Vice Chair of Consulting - CXOTalk #762
  30. OpenAI Open-Sources Whisper, A Multilingual Speech Recognition System

Most Popular Articles in Vol 294 Issue 3, Grouped into Sections


CxO


Top 9 Questions CIOs Should Be Prepared To Answer About Cybersecurity Readiness #1

In today's increasingly sophisticated threat landscape, an organization's cybersecurity readiness is key in keeping its business safe. Here's how CIOs assure board members that they have been making the right investments in cybersecurity.

10 Mistakes Rookie CIOs Make - And How To Avoid Them #2

From trying to change too much to underestimating the political nature of the role, IT leaders and advisors lend insights on what most often trips up first-time CIOs.

Facing Pressure, CIOs Tap Managed Service Providers To Deliver Efficiency #3

From automating processes to consolidating vendors, companies are calling on MSPs to help streamline technology investments.

What Is The Role Of The Data Manager? #4

What is the role of a data manager today, what skills does the job require and what challenges do data managers face?

How You Can Manage And Eliminate Technical Debt #5

What do out-of-date third party components, a product backlog, and a rushed software launch all have in common?

6 Tactics To Boost Creativity On Your IT Team #6

Creativity powers innovation, and innovation wins market share. Consider this expert advice to build a work environment that values creative thinking

The CIO's Shortcut To Leading In The New Era Of Work #7

Register now for CIO's Future of Work North America Summit to hear from technology leaders from Aflac, Principal Financial Group, Ceridian, and others.

Cyber Security: The Message That Never Makes It Up To The Board #8

Cyber security was never a purely technical problem; it is now a leadership imperative in many firms

5 Pillars Of Modern Digital Transformation #9

Preparing for your next digital transformation initiative? Let these five fundamental pillars support your strategy

CIO Balancing Act: Managing Cyber Risk Amidst Talent, Regulatory And Attack Surface Challenges #23

Managing cyber risk is already a big undertaking and today's talent shortages, evolving regulatory landscape, and an expanding threat surface are further adding to this complexity. How do CIOs balance cyber risks with market uncertainties?

Digital Transformation: 6 Tips To Stay On Track #26

Is your digital transformation initiative lagging? Consider these expert tips to restore momentum

How The CIO Can Become The CMO's Best Ally In The Use Of Data

The role of the CMO is more invested in technology than ever, and CMOs have no choice but to engage with the CIO and align business and tech objectives. Key to the success between CMO and CIO is how both roles can collaborate around data.

How CIOs Can Prevent Themselves From Burning Out

Chief information officers have dealt with staff burnout issues for years -- but what about their own?

Spelling Out The Need For CFOs And CIOs To Speak The Same Language

Deloitte's Lou DiLorenzo and Steve Gallucci detail why refining a shared vocabulary between the CFO and CIO regarding technology and oversight practices can serve as a fortified lever for growth and promote better digital transformation.

Security


The Cost Of Single Sign-On (SSO) And Password Management #16

By 2030, the SaaS estate will look different. KPMG expects shadow SaaS (also known as business-led SaaS) to be more than 80 percent of the overall SaaS service layer in just 8 years.

Security Buzzwords To Avoid And What To Say Instead #17

Consider these thoughtful approaches to define what security really means in your open source project.

Poor Identity Management Amplifies Ransomware #19

While ransomware is malware, security leaders must go beyond legacy anti-malware approaches to mitigate risk.

The Top 6 Identity And Access Management Trends From The Gartner IAM Summit #20

The time to plan for the next generation of identity and access management (IAM) strategies is now.

Top 5 Attack Surface Challenges Related To Security Operations #22

The growing attack surface is extending the security/software developer gap, increasing vulnerabilities, and slowing security investigations.

The Distinctions Between Data Privacy And Data Security

Enterprises should separate data security and privacy by taking steps toward creating a comprehensive data protection framework.

4 Lessons Learned From The Latest Uber Breach

Yet another security breach headline might seem like business is usual, but Uber's latest cybersecurity incident is a call for IT leaders to consider their own organizations' vulnerabilities.

Storage


NAS vs. Cloud Storage: Which Is Better For Your Business? #18

On-site NAS and cloud-based NAS are the two main file storage options. Organizations need to weigh the benefits and drawbacks of each to make the best choice.

5 Ways Data Storage IT Pros Enable Business User Self-Service #21

Enterprise data storage professionals are increasingly finding themselves at the center of business discussions: finding important files, showing departmental usage, recalling files from archives for an audit or new research, moving distinct data sets into the cloud to import into a new analytics environment, and deleting data to satisfy regulations

Consider The Advantages And Disadvantages Of NAS #25

NAS devices provide file sharing that is easy to manage but may be harder to scale than other storage types. Get to know the advantages and disadvantages of NAS.

Proper Storage Performance Testing: A Tutorial

This step-by-step guide details how to prepare for and perform storage performance tests. Explore methods for choosing the right tool for your testing.

PCIe 5.0 Arriving and to Invade SSDs

Electrical bus PCI Express (or PCIe), which stands for Peripheral Component Interconnect Express, is a standard developed by PCI-SIG for connecting peripheral devices to a motherboard including graphics cards, sound cards, video capture cards, network/WiFi cards, and storage devices.

Operations


Data Center Outages Are Now Less Disruptive - But Are Costing More #12

Factors like inflation are pushing outage costs up

Best GDPR Compliance Software For CTOs #13

Not being compliant when it comes to data protection could cost your business millions. But using software to automate GDPR compliance can save you time and money. Information Age runs through the best packages out there

The Advantages Of Using A Cloud-Based DCIM Software #27

There are many advantages to using a cloud-based DCIM software solution for your data center infrastructure management needs. Let's walk through a few.

5 Tips to Stay Ahead of OpenSSL Vulnerabilities

Newer OpenSSL vulnerabilities are identified regularly by genuine security researchers or come to light as zero-day vulnerabilities when exploited by threat actors.

5 Ways To Improve IT Help Desk Accessibility And Inclusivity

Streamlining help desk processes may seem like the most efficient way to go, but not if you have users with different accessibility needs. Here are tips on creating an inclusive IT help desk.

Technology


4 Major Telecom Carriers Pilot Holographic Phone Calls #14

Person receiving call seems to be in the same room as caller

The 'Hopper' GPU Compute Ramp Finally Starts #15

You can't be certain about a lot of things in the world these days, but one thing you can count on is the voracious appetite for parallel compute, high bandwidth memory, and high bandwidth networking for AI training workloads.

ARM Is The New RISC/Unix, RISC-V Is The New ARM #28

When computer architectures change in the datacenter, the attack always comes from the bottom.

Cloud


3 Wins And 3 Losses For Cloud Computing

The good, the bad, and the ugly of a decade of cloud computing: Security and agility are definite wins, but cost and complexity are serious drawbacks.

7 Common Uses Of Cloud Computing

Cloud computing has been credited with increasing competitiveness through cost savings, greater flexibility, elasticity and optimal resource utilization.

5 Steps To Effective Cloud Operations

Organizations migrating to the cloud should keep in mind these five key pillars for cloud operational success.

Organizations Lack Visibility Into Cloud Access

Do you know who is accessing your data in the cloud?

Most Critical Security Gaps In The Public Cloud

Orca Security released the 2022 State of the Public Cloud Security Report, which provides important insights into the current state of public cloud security and where the most critical security gaps are found.

Email


How To Do Email Blast Right? [+5 Tools] #10

If you want to reach a large audience to inform them about a product launch or exclusive offers, the email blast (eBlast) is the method that can be of great help.

Should You Bother With An Email Signature? #11

Email signatures ostensibly make your communiques look like they're wearing a nice suit, but really, it's just an extra part of the email that we can't help but read. No one likes to read more emails than they have to.

AI


OpenAI Open-Sources Whisper, A Multilingual Speech Recognition System #30

Speech recognition remains a challenging problem in AI and machine learning. In a step toward solving it, OpenAI today open-sourced Whisper, an automatic speech recognition system that the company claims enables 'robust' transcription in multiple languages as well as translation from those languages into English.

I Used OpenAI's New Tech To Transcribe Audio Right On My Laptop

The company behind DALL-E and GPT has made its automatic speech recognition system, called Whisper, and is letting developers and researchers use it.

What is AI hardware? How GPUs and TPUs give artificial intelligence algorithms a boost

Most computers and algorithms - including, at this point, many artificial intelligence (AI) applications - run on general-purpose circuits called central processing units or CPUs.

CIOs Say Data Management Is Critical For Successful AI Adoption In New Global Research Report

A new survey report by MIT Technology Review Insights highlights AI and data management as essential pillars to enterprise success, but found that the majority of survey respondents cited data mismanagement as a critical factor that could jeopardize their company's future AI success.

IDC: Where Enterprises Are Investing In AI

Within AI applications, CRM and ERM had the highest spending

ESG


Why You Should Add Location To Your Data Strategy

The benefits of including location and geospatial attributes to your enterprise application and analyses add up

Top 5 Benefits Of Applying ESG Standards To Your Business

Environmental, social and corporate governance strategies are growing in importance for clients and investors. Learn the business benefits of ESG here.

Servicenow Announces New Platform With ESG Emphasis

ServiceNow has released the latest Now Platform: Now Platform Tokyo. Learn what the platform offers in ESG features now.

Big Data


An Introduction Guide To MapReduce In Big Data #24

MapReduce offers an effective, faster, and cost-effective way of creating applications.

Forget Digital Transformation: Data Transformation Is What You Need

Stefano Maifreni, founder of Eggcelerate, discusses why organisations must focus on data transformation to maximise long-term value

CxO Podcasts


Business Transformation Advice, with EY Vice Chair of Consulting - CXOTalk #762 #29

Errol joins CXOTalk to share his insights about the current state of business and leadership and offer practical advice on leading transformation initiatives at large organizations.

The Great Resignation Creates Great Vulnerabilities - Techstrong TV

Ben Smith, Field CTO at NetWitness, and Charlene discuss how the Great Resignation creates 'The Great Vulnerability' in organizations. The video is below followed by a transcript of the conversation.

HR


Attracting Talent Now Requires A Work From Anywhere Program

Global mobility programs have become necessary to attract and retain top tech talent. What lessons have early adopters of 'work from anywhere' programs learned?

What's Trending For HR Leaders? Hiring Slowdowns, Flexible Work, Gartner Says

A growing number of organizations are responding to economic volatility by slowing or outright freezing hiring, according to the results of an Aug. 31 Gartner webinar poll of more than 330 HR leaders. More than one-third, 37%, said their organizations had slowed hiring, compared to 32% in Gartner's July polling and 27% in its June polling.

Linux


3 Free Linux Security Training Courses You Can Take Right Now

This course dives into how Linux works from an enterprise perspective:

Database


PostgreSQL vs. MySQL: Four Key Reasons to Choose the Former

This is part of Solutions Review's Premium Content Series, a collection of contributed columns written by industry experts in maturing software categories. In this submission, Instaclustr's VP & Global Head of Data Solutions Anil Inamdar offers a comparison between PostgreSQL vs. MySQL and reveals his evaluation criteria.

Developer


The Right System Architecture Will Reduce Software Failures

Companies can minimize software program failures by following these best practices.

IoT


IoT Technology Is Hitting An Inflection Point For Businesses

New data from Omdia shows that IoT deployments are on the rise, with a strong majority of companies already in the process of deploying IoT technology to enhance their operations

Java


Java 19 Brings New Patterns To Open Source Programming Language

Java continues to move forward with features that improve performance and extend the capabilities of the open source programming language project led by Oracle.
``