Would you hire a liar?
Nobody likes a liar. Except if you are hiring for sales-orientated jobs, a pilot study by researchers at the University of Chicago’s Booth School of Business has indicated.
Nobody likes a liar. Except if you are hiring for sales-orientated jobs, a pilot study by researchers at the University of Chicago’s Booth School of Business has indicated.
We often use them without thinking, but they should be used with care.
One of the problems CIOs face when they are seeking to innovate and bring about change in their companies, is the fact IT leaders all think alike.
Here are 6 tips for managing your suppliers
Psychopaths get a bum rap. For most of us the term brings to mind the axe-wielding, Huey Lewis and the News fan Patrick Bateman of American Psycho, but in psychological terms, we all sit on the spectrum of this personality trait.
Managing modern networked systems and applications is daunting because infrastructure is complex and things can go wrong in so many parts of the technology stack -- servers, storage, network devices, applications, hypervisors, APIs, DNS, etc. How can you address the challenge?
In the previous column on hacking PingPlotter I discussed how you can use the tool's Web interface and the curl utility to add targets to be tracked, for example, to add a single host you would enter the following on the command line:
As software-defined networking and network function virtualization begin to take hold in the enterprise, it's worth examining each concept to see how they complement each other. The end result: More generic network hardware and more open software.
An easy step-by-step guide to the Bash command-line shell and shell scripting
We're at an awkward stage as the age of network-streamed multimedia matures. Broadband and cell providers have only recently realized the public's enormous appetite for streaming video, VoIP, and the combination of both.
In the IT industry, change is the only constant. So how can IT professionals best prepare themselves for the future? Follow these steps.
To some, the job of a higher-education CIO might seem downright cushy. After all, unlike their corporate counterparts, these IT leaders don't have to answer to shareholders, cater to business-line leaders or survive acrimonious mergers.
<em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>
<em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>
How long would you stay at a job, or in a career field, in which --regardless of your passion for the work and your talent, skills and achievements -- you were consistently bombarded with both overt and subliminal messages that you just did not belong?
Today’s workplaces are becoming increasingly complex and fluid – particularly when it comes to security management. The modern worker expects to be able to work from anywhere, on any device, and at any time. Office spaces are no longer centralised with singular technology and protected by a robust firewall. They’re now wireless, with hot-desks, hybrid infrastructure (both cloud-based and on-premise), and all kinds of connectivity scenarios. Unless your flexible, digital workplace is designed with security as top of mind, security issues can very easily occur – and can have a lasting impact on your business’ overall safety.