Stories by Stacy Collett

IT Salary Survey 2014: Who's hot, who's not

Salaries continue their modest rise, while demand for workers with key tech skills coupled with business acumen keeps employers scrambling to find and keep talent.

Big data storage doesn't have to break the bank

Big data is nothing new to Quicken Loans. The nation's largest online retail mortgage lender is accustomed to storing and analyzing data from more than 1.5 million clients and home loans valued at $70 billion in 2012.

Data+ Awards: Express Scripts helps drive down the cost of prescriptions

Patients with complex health conditions such as cancer or multiple sclerosis can spend $6,000 to $100,000 per year on "specialty" prescriptions, which aren't covered by traditional prescription drug plans but by more complex and unmanaged medical insurance plans.

The No. 1 place to work in IT: Quicken Loans

IT employees enjoy the company's relaxed atmosphere and culture of innovation, but they're equally thrilled to be part of the revitalization of downtown Detroit.

Best Places spotlight: MetroStar Systems stresses career development, training

IT workers get plenty of support for achieving their career goals at the No. 48-ranked organization on our 2013 Best Places to Work in IT list.

Best Places spotlight: Heartland Payment Systems grows autonomous, collaborative teams

IT staffers take ownership and set the technical direction for projects at the No. 84-ranked company on our 2013 Best Places to Work in IT list.

Sizing up open source: Not so simple

Choosing open-source software is more complicated than picking traditional software. Is your IT department prepared to contribute code fixes to the community?

Straight talk on security gets employees to listen -- and comply

Sure, you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes.

Ready, set, compete: The benefits of IT innovation

Welcome to 2013. As IT budgets loosen up and new projects get queued up, IT is learning to quickly tap into creative ideas for competitive advantage in a cutthroat marketplace.

How to talk security so people will listen (and comply!)

Sure you want users to comply with security edicts, but would you phish your own employees or share your company's hack history? At least some CIOs say yes. Insider (registration required)

Storage systems get supersized

Old storage architectures with general-purpose controllers that service all the new functions along with the normal I/O workload won't be able to scale. Here's why storage systems will need to become full-scale storage computers. Insider (registration required)

Best Places spotlight: Boeing staffers explore multiple IT roles

IT staffers rotate through various tech specialties and team up with business partners at the No. 84-ranked organization on our 2012 Best Places to Work in IT list.

Wide-Open Search

Twitter, Facebook, the Library of Congress -- all of these institutions have mind-numbing amounts of structured and unstructured data that must be indexed and searched quickly. In Twitter's case, that's about 300 million new pieces of information to index every day.

Techies work harder as benefits go bust

"Richard," a 40-year-old IT architect, felt like his career path had reached its end at the financial services company where he'd worked for seven years. In a shaky economy, he was grateful to have a job at all, but when his employer eliminated matching funds in his 401(k) plan, as well as its profit-sharing program -- which usually put an extra $1,000 in his pocket each year -- he knew he had to go.

Who Holds the Keys?

Encryption can make up for a litany of security snafus -- from a bad firewall to an unrelenting hacker to a lost laptop. Once data is encrypted, criminals can't use or sell it. Plus, if encrypted data goes missing, companies are protected from disclosure requirements in most states. No wonder 38% of companies surveyed by Forrester Research have already adopted full-disk encryption technology. But data protection doesn't stop there. Encryption keys and digital rights also must be well orchestrated and secured, or else encryption protection goes out the window.

Sign up now to get free exclusive access to reports, research and invitation only events.

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia