Mary K. Pratt Freelance journalist Search CIO Top 7 metaverse tech strategy do's and don'ts 22 Apr 2022 Search HRSoftware VR in recruiting, hiring: Current adoption, future potential 15 Apr 2022 WhatIs Prepare for a CIO Interview With These 20 Questions 29 Mar 2022 Search CIO CIO (Chief Information Officer) 29 Mar 2022 Search ITChannel MSPs set up IT services for retail transformations 22 Mar 2022 Search Data Management 10 key elements to follow data compliance regulations 16 Mar 2022 Search CIO The CIO's guide to understanding the metaverse 15 Mar 2022 Search Data Management data stewardship 15 Mar 2022 Search CIO Why CIOs should rethink their COVID-19 digital strategy 11 Feb 2022 Search Data Management How big data collection works: Process, challenges, techniques 07 Feb 2022 Search Data Management data transformation 01 Feb 2022 Search Data Management data profiling 31 Jan 2022 Search Business Analytics data curation 31 Jan 2022 Search Enterprise AI How cloud RPA is key to automation's future 21 Jan 2022 Search CIO CIOs can avoid tech hype with business-IT alignment 06 Jan 2022 Search Data Management 5 challenges IT faces using open source data management 30 Dec 2021 Search IoT Fortify security with IoT data protection strategies 21 Dec 2021 Search Business Analytics Predictive analytics in marketing: Achieving success 17 Dec 2021 Search Business Analytics Predictive analytics in healthcare: 12 valuable use cases 13 Dec 2021 Search IoT Bolster physical defenses with IoT hardware security 13 Dec 2021 Search Enterprise AI TinyML at the very edge of IoT shows signs of promise 09 Dec 2021 Search Enterprise AI Will autonomous vehicles transform the supply chain? 30 Nov 2021 Search IoT Top 5 benefits of edge computing for businesses 29 Nov 2021 Search CIO Top 10 edge computing use cases and examples 23 Nov 2021 Search CIO How CIOs can improve employees' digital fluency quotient 22 Nov 2021 Search CIO Why the CIO-CFO relationship is key to digital success 11 Nov 2021 Search IoT Learn the basics of cryptography in IoT 19 Oct 2021 Search CIO Top 10 promising 5G use cases CIOs should know 17 Sep 2021 Search CIO e-procurement (supplier exchange) 10 Sep 2021 Search Business Analytics How to structure and manage a data science team 29 Aug 2021 Search CIO Evaluating the benefits of 5G for businesses 25 Aug 2021 Search Enterprise AI AI accountability: Who's responsible when AI goes wrong? 19 Aug 2021 Search IoT Cybersecurity executive order 2021 pushes IoT security 17 Aug 2021 Search Security How privacy engineers promote innovation and trust 12 Aug 2021 Search IoT IIoT platforms optimize analysis of industrial data 01 Jul 2021 Search Enterprise AI 5 ways AI bias hurts your business 25 Jun 2021 Search CIO 9 digital experience monitoring vendors to watch 18 Jun 2021 Search Data Management How automated metadata management improves business insights 01 Jun 2021 Search CIO RPA vs. BPA vs. DPA: Compare process automation technologies 11 May 2021 Search Enterprise AI How to hire data scientists 10 May 2021 Search Enterprise AI Data scientists vs. machine learning engineers 05 May 2021 Search HRSoftware Guide to digital badges for the workplace 30 Apr 2021 Search Data Management Building a big data architecture: Core components, best practices 29 Apr 2021 Search CIO The future of e-commerce: Trends, tips, traps to avoid 23 Apr 2021 Search AWS Experts raise privacy concerns over Amazon fleet surveillance 21 Apr 2021 Search IoT IoT interoperability standards complicate IoT adoption 19 Apr 2021 Search App Architecture Using a business rules engine to streamline decision-making 09 Apr 2021 Search IoT IoT data quality determines project profitability 08 Apr 2021 Search Data Management Why consider an open source data catalog 31 Mar 2021 Search IoT Focus the role of data analytics in IoT on actionable insights 15 Mar 2021 Search Software Quality Low-code and BPM: Differences and similarities 05 Mar 2021 Search CIO What are the advantages and disadvantages of RPA? 01 Mar 2021 Search AWS Is construction Amazon's next target for disruption? 24 Feb 2021 Search Data Management The top 5 graph database advantages for enterprises 22 Feb 2021 Search Security Enterprise ransomware prevention measures to enact in 2021 10 Feb 2021 Search IoT Reach business objectives with the right IoT data pipeline 08 Feb 2021 Search CIO Understanding the difference between RPA and AI 03 Feb 2021 Search CIO What CIOs need to know about RPA in IT operations 20 Jan 2021 Search Security Biometric security technology could see growth in 2021 11 Jan 2021 Search App Architecture BPM vs. BPA: The differences in strategy and tooling 04 Jan 2021 Search CIO The impact of blockchain in the midst of the COVID-19 pandemic 29 Dec 2020 Search Security Enterprise cybersecurity threats spiked in 2020, more to come in 2021 22 Dec 2020 Search ITOperations ITSM and DevOps don't have to be at odds 18 Dec 2020 Search IoT Understand the IoT Cybersecurity Improvement Act, now law 11 Dec 2020 Search CIO 5 strategies to deliver customer service in information technology 10 Dec 2020 Search Security Zero-trust initiatives rely on incremental security improvements 10 Dec 2020 Search Security Security operations center use cases, strategies vary 04 Dec 2020 Search Data Management Top 5 U.S. open data use cases from federal data sets 02 Dec 2020 Search App Architecture Navigating the evolving BPA tools market 19 Nov 2020 Search Security AI in security analytics is the enhancement you need 02 Nov 2020 Search CIO Cybersecurity and resilience tips from the city of Atlanta CIO 30 Oct 2020 Search IoT IoT creates safer workplaces and promotes greater adoption 21 Oct 2020 Search Disaster Recovery CCPA compliance still unclear long past deadline 02 Oct 2020 Search CIO CMMC requirements set to ripple throughout DOD supply chain 24 Sep 2020 Search IoT Tips to select the right microcontrollers for IoT 23 Sep 2020 Search CIO MSP roles and responsibilities are undergoing rapid change -- here's why 18 Sep 2020 Search CIO Top 5 executive soft skills CIOs need to lead today 14 Sep 2020 Search IoT Shadow IoT poses growing threat to network security 28 Aug 2020 Search CIO RPA in ERP modernizes legacy system with automation 14 Aug 2020 Search Security 10 tips for cybersecurity awareness programs in uncertain times 03 Aug 2020 Search CIO Why ISO 56000 Innovation Management matters to CIOs 31 Jul 2020 Search IoT IoT platforms: How they work and how to choose one 29 Jul 2020 Search Security Complexity exacerbates cloud cybersecurity threats 21 Jul 2020 Search Business Analytics What does a business intelligence analyst do? 24 Jun 2020 Search Business Analytics 5 valuable business intelligence use cases for organizations 22 Jun 2020 Search IoT 10 steps to IoT deployment success 19 Jun 2020 Search IoT How to detect a botnet infecting IoT devices 17 Jun 2020 Search IoT How an IoT botnet attacks with DDoS and infects devices 09 Jun 2020 Search CIO What is the future of hybrid cloud for businesses? 19 May 2020 Search Enterprise AI AI's impact on business: The quest to make money 19 May 2020 Search AWS What Amazon's culture and practices can teach your company 14 May 2020 Search IoT Learn the IoT botnets basics every IT expert should know 04 May 2020 Search Enterprise AI Value of AI in capitalizing on big data, expanding automation 28 Apr 2020 Search App Architecture The 5 essential elements of an RPA strategy 27 Apr 2020 Search Security Securing a remote workforce amplifies common cybersecurity risks 27 Apr 2020 Search CIO The inevitable future of blockchain in the enterprise 20 Apr 2020 Search Security With US ban, Huawei products put CISOs on notice 17 Apr 2020 Search IoT How to plan for data storage in IoT deployments 17 Apr 2020 Search App Architecture The 7 crucial RPA developer skills 13 Apr 2020 Search CIO Why data in digital transformation is crucial to your business 07 Apr 2020 1 2 3 4 5