A data warehouse and BI software make this police department, a 2016 Data+ Editors' Choice Awards honoree, more efficient.
Stories by Bob Violino
To deliver on the promise of devops, heed these hard-earned lessons of devops gone wrong
Independence has its upsides and downsides. IT pros lend firsthand advice on the challenges of going solo
With programmers and developers in such high demand these days, it may be tempting to think that a decision as stodgy as pursuing a certification is a waste of time. After all, doesn't it all come down to the art of your code?
A quiet revolution with a potential impact on the IT workforce reminiscent of outsourcing may be under way in the form of robotic process automation.
Poor teamwork, little experimentation, no clear career path -- your employer may be sending unmistakable signals of career stagnation. Don't miss them
A year ago, people were mostly talking about the potential of the Internet of Things (IoT) -- what companies and government entities might do in the future to take advantage of this widespread network of connected objects.
Apple has improved its security in recent years, but is it enough?
The major technology shifts under way -- the move to cloud-based services and reduced importance of the data center, the growth of mobile devices and apps and related decline in use of traditional PCs, and the greater emphasis on big data/analytics rather than traditional analytics -- are having a huge impact on corporate IT.
There's a trend underway in the information security field to shift from a prevention mentality--in which organizations try to make the perimeter impenetrable and avoid breaches--to a focus on rapid detection, where they can quickly identify and mitigate threats.
If you're an Android user -- or want to be -- you've likely heard about all the security risks of Google's mobile operating system. But how real are these threats, and how much damage can they do? Despite the fears, are Android devices actually a safe bet for an enterprise mobility strategy?
Bland by name and superficially viewed as gee-whiz technology never to be realized, the Internet of things (IoT) has significant potential to transform business. Early forays into Net-enabling physical objects are already pointing the way.
The rapid growth of mobile devices that can access corporate networks and data, the expanding use of cloud-based IT services, and the increasing popularity of apps such as online banking mean that IT needs to pay closer attention to authentication.
When people talk about the Internet of Things (IoT), the most common examples are smart cars, IP-addressable washing machines and Internet-connected nanny cams.
Chances are you've heard about the Internet of Things (IoT)—or you will soon enough. The term carries a number of definitions. But in general, the IoT refers to uniquely identifiable objects, such as corporate assets or consumer goods, and their virtual representations in an Internet-like structure.