Careers & Certifications
Expert Analysis
Cisco Certifications Confront Changing Skills Needs
Ethan Banks, Senior Network ArchitectCommentary
New certs focused on network programmability, IoT, and IT/business skills will help steer IT pros toward emerging technologies. They could also help Cisco keep its hold on the market.
By Ethan Banks Senior Network Architect,
CommentPost a comment  |  Read  |  Post a Comment
How To Build A Federal Information Security Team
(ISC)2 Writers Bureau, Commentary
Federal security officers face many challenges building and maintaining an information security team. Here are some tips for putting together a group of employees that will protect your systems and data.
By (ISC)2 Writers Bureau ,
Comment1 Comment  |  Read  |  Post a Comment
Have You Hugged Your Sysadmin Today?
Susan Fogarty, Editor in ChiefCommentary
Celebrate System Administrator Appreciation Day by showing some gratitude toward the IT pros who do it all.
By Susan Fogarty Editor in Chief,
Comment7 comments  |  Read  |  Post a Comment
IT Budgets Up In 2015, Hiring Tepid
Robert Mullins, News
A survey shows organizations will spend more on IT next year, but IT pros don't expect those extra dollars will translate into bigger IT departments.
By Robert Mullins ,
Comment1 Comment  |  Read  |  Post a Comment
Cisco DevNet Focuses On Developers
Marcia Savage, Managing Editor, Network ComputingNews
The program provides APIs and aims to promote DevOps by bringing network engineers and software developers together.
By Marcia Savage Managing Editor, Network Computing,
Comment3 comments  |  Read  |  Post a Comment
8 Gotchas Of Technology Contracting
Craig Auge, Partner, Vorys
IT projects often involve multiple legal contracts for technology and services. Avoid these "gotchas" to ensure smooth agreements and relationships.
By Craig Auge Partner, Vorys,
Comment6 comments  |  Read  |  Post a Comment
Government Security: Saying 'No' Doesn't Work
Steve Jones, Group Strategy Director, Big Data & Analytics, CapgeminiCommentary
It's time for government agencies to move beyond draconian security rules and adopt anomaly analytics.
By Steve Jones Group Strategy Director, Big Data & Analytics, Capgemini,
CommentPost a comment  |  Read  |  Post a Comment
3 BYOD Risk Prevention Strategies
Jim Szafranski, SVP Customer Platform Services, FiberlinkCommentary
An effective BYOD plan must balance control with convenience. Here's what to keep in mind.
By Jim Szafranski SVP Customer Platform Services, Fiberlink,
Comment2 comments  |  Read  |  Post a Comment
12 Hot Programming Languages To Learn
Ericka Chickowski, Contributing Writer, Dark Reading
With the growing software-defined networking trend, networking pros are under pressure to learn some coding. Here are a dozen programming languages worth checking out.
By Ericka Chickowski Contributing Writer, Dark Reading,
Comment8 comments  |  Read  |  Post a Comment
The IT Nerd's Summer Reading List
Marcia Savage, Managing Editor, Network Computing
If you're looking for a good book to take on your summer vacation, we've got 12 recommendations, including technical guides to brush up on your skills and just-for-fun reads.
By Marcia Savage Managing Editor, Network Computing,
Comment23 comments  |  Read  |  Post a Comment
IT Hiring Climbs Despite The Cloud
Tony Kontzer, News
Computer Economics survey indicates that many organizations expect to expand their IT staffs this year, but IT capital budgets remain flat.
By Tony Kontzer ,
Comment14 comments  |  Read  |  Post a Comment
Testing Fuels The NVMe Revolution
David Woolf, Senior Technical Staff, University of New Hampshire InterOperability LaboratoryCommentary
Testing procedures and tools developed at places like UNH's InterOperability Laboratory help technologies like NVMe advance.
By David Woolf Senior Technical Staff, University of New Hampshire InterOperability Laboratory,
Comment4 comments  |  Read  |  Post a Comment
11 Best IT Certifications For Cutting-Edge Skills
Susan Fogarty, Editor in Chief
Networking and infrastructure professionals looking to improve their job skills should consider these groundbreaking training programs.
By Susan Fogarty Editor in Chief,
Comment31 comments  |  Read  |  Post a Comment
Academia: Government's Biggest Cyber Security Ally?
W. Hord Tipton, Commentary
Federal cyber security programs need access to fresh talent. They can boost the quality of that talent by bolstering cyber security training in colleges and universities.
By W. Hord Tipton ,
Comment5 comments  |  Read  |  Post a Comment
Target Hires GM Exec As First CISO
Kristin Burnham, Senior Editor, InformationWeek.comCommentary
Target names Brad Maiorino as its first chief information security officer to oversee the company's security and technology risk strategy.
By Kristin Burnham Senior Editor, InformationWeek.com,
Comment6 comments  |  Read  |  Post a Comment
Chris Hoff Talks SDN, Security & More
Susan Fogarty, Editor in ChiefCommentary
Join us on Friday, June 13, to discuss network security with Chris Hoff, one of IT's most insightful security leaders.
By Susan Fogarty Editor in Chief,
Comment3 comments  |  Read  |  Post a Comment
In Praise Of Shadow IT
Eric Zeman, Commentary
80% of those employed by enterprises larger than 1,000 people circumvent IT to use cloud-based tools, new research says. I say let them.
By Eric Zeman ,
Comment12 comments  |  Read  |  Post a Comment
IT Pro Salaries: The Gender Gap Widens
Scott M. Fulton, III, Principal and Senior Partner, IngenusNews
InformationWeek's 2014 US IT Salary Survey showed a growing disparity between what female networking and datacenter professionals are paid compared to their male counterparts.
By Scott M. Fulton, III ,
Comment12 comments  |  Read  |  Post a Comment
IT Salary Survey 2014: Security
InformationWeek Staff,
Security IT professionals are well positioned for future career growth, with many successfully competing for better benefits and higher salaries even in today's tight job market.
By InformationWeek Staff ,
CommentPost a comment  |  Read  |  Post a Comment
Cisco Live's 7 Best Scenes
Susan Fogarty, Editor in Chief
Attendees at Cisco Live this week were showered in APIs and ACI, and swimming in selfies. Take a look at the highlights from the annual customer event.
By Susan Fogarty Editor in Chief,
Comment16 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Hot Topics
7
Have You Hugged Your Sysadmin Today?
Susan Fogarty, Editor in Chief,  7/25/2014
1
IT Budgets Up In 2015, Hiring Tepid
Robert Mullins 7/25/2014
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
Video
Slideshows
Twitter Feed