Mary K. Pratt Contributor - SearchCIO IoT Agenda Focus the role of data analytics in IoT on actionable insights 15 Mar 2021 SearchSoftwareQuality low-code and no-code development platforms 11 Mar 2021 SearchCIO 10 digital transformation benefits for business 10 Mar 2021 SearchSoftwareQuality Low-code and BPM: Differences and similarities 05 Mar 2021 SearchCIO What are the advantages and disadvantages of RPA? 01 Mar 2021 SearchBusinessAnalytics self-service business intelligence (self-service BI) 01 Mar 2021 SearchAWS Is construction Amazon's next target for disruption? 24 Feb 2021 SearchDataManagement The top 5 graph database advantages for enterprises 22 Feb 2021 SearchSecurity Enterprise ransomware prevention measures to enact in 2021 10 Feb 2021 IoT Agenda Reach business objectives with the right IoT data pipeline 08 Feb 2021 SearchCIO Understanding the difference between RPA and AI 03 Feb 2021 SearchCIO What CIOs need to know about RPA in IT operations 20 Jan 2021 SearchSecurity cyber attack 13 Jan 2021 SearchSecurity Biometric security technology could see growth in 2021 11 Jan 2021 SearchAppArchitecture BPM vs. BPA: The differences in strategy and tooling 04 Jan 2021 SearchSecurity 15 benefits of outsourcing your cybersecurity operations 30 Dec 2020 SearchCIO The impact of blockchain in the midst of the COVID-19 pandemic 29 Dec 2020 SearchSecurity Enterprise cybersecurity threats spiked in 2020, more to come in 2021 22 Dec 2020 SearchITOperations ITSM and DevOps don't have to be at odds 18 Dec 2020 IoT Agenda Understand the IoT Cybersecurity Improvement Act, now law 11 Dec 2020 SearchCIO 5 strategies to deliver customer service in information technology 10 Dec 2020 SearchSecurity Zero-trust initiatives rely on incremental security improvements 10 Dec 2020 SearchHRSoftware 20 social media recruiting strategies that work 08 Dec 2020 SearchSecurity Security operations center use cases, strategies vary 04 Dec 2020 SearchDataManagement Top 5 U.S. open data use cases from federal data sets 02 Dec 2020 SearchHRSoftware social recruiting (social media recruitment) 01 Dec 2020 SearchCIO IT strategy (information technology strategy) 30 Nov 2020 SearchAppArchitecture Navigating the evolving BPA tools market 19 Nov 2020 SearchCIO Top 5 CI/CD best practices for CIOs to follow 12 Nov 2020 SearchCIO disruptive innovation 09 Nov 2020 SearchSecurity AI in security analytics is the enhancement you need 02 Nov 2020 SearchERP supplier relationship management (SRM) 02 Nov 2020 SearchCIO Cybersecurity and resilience tips from the city of Atlanta CIO 30 Oct 2020 IoT Agenda IoT creates safer workplaces and promotes greater adoption 21 Oct 2020 SearchDisasterRecovery CCPA compliance still unclear long past deadline 02 Oct 2020 SearchCIO 5 blockchain use cases in finance that show value 29 Sep 2020 SearchNetworking 5G network security concerns and how to prepare for them 28 Sep 2020 SearchCIO CMMC requirements set to ripple throughout DOD supply chain 24 Sep 2020 IoT Agenda Tips to select the right microcontrollers for IoT 23 Sep 2020 SearchCIO MSP roles and responsibilities are undergoing rapid change -- here's why 18 Sep 2020 SearchCIO Top 5 executive soft skills CIOs need to lead today 14 Sep 2020 IoT Agenda Shadow IoT poses growing threat to network security 28 Aug 2020 WhatIs.com corporate culture 27 Aug 2020 SearchCIO RPA in ERP modernizes legacy system with automation 14 Aug 2020 SearchSecurity Build shadow IT policy to reduce security risks 06 Aug 2020 SearchSecurity 10 tips for cybersecurity awareness programs in uncertain times 03 Aug 2020 SearchCIO Why ISO 56000 Innovation Management matters to CIOs 31 Jul 2020 IoT Agenda IoT platforms: How they work and how to choose one 29 Jul 2020 SearchSecurity Complexity exacerbates cloud cybersecurity threats 21 Jul 2020 SearchBusinessAnalytics business intelligence architecture 13 Jul 2020 SearchEnterpriseAI unsupervised learning 08 Jul 2020 SearchEnterpriseAI machine learning bias (AI bias) 01 Jul 2020 SearchSecurity 6 tips to prevent a data breach and keep your enterprise safe 26 Jun 2020 SearchBusinessAnalytics What does a business intelligence analyst do? 24 Jun 2020 SearchBusinessAnalytics 5 valuable business intelligence use cases for organizations 22 Jun 2020 IoT Agenda 10 steps to IoT deployment success 19 Jun 2020 IoT Agenda How to detect a botnet infecting IoT devices 17 Jun 2020 SearchEnterpriseAI 10 common uses for machine learning applications in business 09 Jun 2020 IoT Agenda How an IoT botnet attacks with DDoS and infects devices 09 Jun 2020 SearchCIO What is the future of hybrid cloud for businesses? 19 May 2020 SearchEnterpriseAI AI's impact on business: The quest to make money 19 May 2020 SearchAWS What Amazon's culture and practices can teach your company 14 May 2020 IoT Agenda Learn the IoT botnets basics every IT expert should know 04 May 2020 SearchEnterpriseAI 5 AI risks businesses must confront and how to address them 28 Apr 2020 SearchEnterpriseAI Value of AI in capitalizing on big data, expanding automation 28 Apr 2020 SearchAppArchitecture The 5 essential elements of an RPA strategy 27 Apr 2020 SearchSecurity Securing a remote workforce amplifies common cybersecurity risks 27 Apr 2020 SearchCIO The inevitable future of blockchain in the enterprise 20 Apr 2020 SearchSecurity With US ban, Huawei products put CISOs on notice 17 Apr 2020 IoT Agenda How to plan for data storage in IoT deployments 17 Apr 2020 SearchAppArchitecture The 7 crucial RPA developer skills 13 Apr 2020 SearchCIO Why data in digital transformation is crucial to your business 07 Apr 2020 SearchCIO Agile Manifesto 07 Apr 2020 SearchCIO proof of concept (POC) 02 Apr 2020 SearchSecurity Will nonprofit's evolution of zero trust secure consumer data? 31 Mar 2020 SearchCIO How IT can build an agile business partnership 31 Mar 2020 SearchCIO Contract risk management: Focus on these 6 areas 25 Mar 2020 SearchCIO How to write an RFP and statement of work for an IT services contract 24 Mar 2020 IoT Agenda Understand IoT data storage options for data deluge 18 Mar 2020 SearchCIO Quantum information science continues to advance with federal efforts 28 Feb 2020 SearchHealthIT How one medical center overcame legacy EHR systems 24 Feb 2020 SearchSecurity Zero-trust model case study: One CISO's experience 18 Feb 2020 SearchCIO data governance policy 14 Feb 2020 SearchCIO CIO succession planning: The transition of power 10 Feb 2020 SearchCIO Why cloud migration failures happen and how to prevent them 06 Feb 2020 SearchAWS Amazon's environmental impact delivers climate change concerns 04 Feb 2020 SearchSecurity CISOs face a range of cybersecurity challenges in 2020 03 Feb 2020 SearchSecurity Can IDaaS adoption improve enterprise security posture? 31 Jan 2020 IoT Agenda IoT skills and 4 experts every IoT project needs 15 Jan 2020 SearchCIO What is the state of CIO tenure today? 13 Jan 2020 SearchCustomerExperience virtual agent 09 Jan 2020 SearchCIO RPA bots: Unattended vs. attended vs. hybrid 06 Jan 2020 SearchCIO The rise of RPA bots and the role of C-level decision makers 02 Jan 2020 SearchCIO Why better data visibility is necessary for your business 20 Dec 2019 SearchAppArchitecture Business process automation software requires a strategy 09 Dec 2019 SearchCIO Town of Falmouth pursues automation innovation to save costs 20 Nov 2019 SearchSecurity Rise in ransomware attacks prompts new prevention priorities 19 Nov 2019 SearchCIO IAM-driven biometrics in security requires adjustments 18 Nov 2019 SearchCIO 10 cloud migration process tips CIOs need to consider 28 Oct 2019 SearchSecurity How the future of data privacy regulation is spurring change 28 Oct 2019 1 2 3 4