Microsoft Kill Shots: How IBM/Linux Deals the Latest Blow to Redmond Empire

Not long ago, Microsoft ruled the computing empire with near-monopolies in PC operating systems, web browsers and productivity applications. The company’s reign, however, was dominated by discord. Competitors complained about Microsoft’s predatory business practices. Users bemoaned the company’s software as …

General 3 min read

Top Tips for IT Job Seekers, APM Business Benefits, and More

Five top tips for job-seeking IT graduates” presents the job skills Raj Sabhlok, president of ManageEngine, believes will get you employed. Australia’s Technology Spectator apparently agrees because the magazine covered Raj’s article.

Want to cut your inbound help …

General 1 min read

Moto X Hits AT&T Stores – Deals iPhone Another Knockout

The highly anticipated Moto X arrived in AT&T stores a few weeks ago. And with the introduction of the latest phone from Google-owned Motorola, Apple’s iPhone may have dropped to the third best smartphone on the market. That’s hard …

General 3 min read

This Week’s Five: CIOs Making News!


This Week’s Five is a weekly column of five interesting reads from all over the web.

This week we bring you news about CIOs: what they do, how they do it, and the difference they make!

A company’s first-ever

General 2 min read

This Week’s Five: Secure Your IT, Save Your Business.

This Week’s Five is a weekly column of five interesting reads from all over the web.

This week we bring you a view of all that has created a strong buzz in the IT Security world! Read on to learn …

General 2 min read

Back to School: The ABCs of IT Management

It wasn’t that long ago when parents were picking up their children on the last day of school to start the summer. Now these same parents are only weeks away from dropping their children off again to begin a new …

General 2 min read

Is NFC adding up to security concerns of a CIO?

(Originally published in Information Week, an article by Shailesh Kumar Davey)

The convenience of an NFC enabled phone comes with some security risks as criminals are likely to abuse the tap-and-pay NFC technology used in mobile payment programs. 

General 3 min read

Why Can’t Someone Hyperloop IT?

Elon Musk’s Hyperloop sketches look like something out of the future, not the present.

Nerds everywhere (myself included) can finally rejoice. Our fearless leader Elon Musk — whose “Nerd Hall of Fame” resume includes founding PayPal, SpaceX, and my personal …

General 2 min read

5 Top Targets for Today’s Hackers

Black Hat USA bills itself as “the show that sets the benchmark for all other security conferences.” While most conferences tend to over-promote themselves, given the activity at this year’s show, that actually might be something of an understatement.

From …

ADAudit Plus , ADManager , EventLogAnalyzer , General , IT Security , ManageEngine , Password Manager Pro 3 min read

Spate of shocking cyber attacks on universities jolt academia

It is hauntingly clear – cyber criminals have set their eyes firmly on universities, research institutions, and centers of higher learning in the United States and other parts of the world. If the cyber attacks of the past few weeks …

DeviceExpert , EventLogAnalyzer , Firewall Analyzer , General , IT Security , ManageEngine , Password Manager Pro 2 min read