• HTML5 is set to become the new internet standard by the end of 2014.

    W3C aims for full recommendation of HTML5 by year’s end

    Gradually, imperceptibly, beneath your very fingers on the keyboard, the internet is becoming something different. Many users may never even notice the change, especially since it’s not intended to effect what you see so much as what goes on beneath the surface that lets you see it. Since 1997, the internet has hummed along on …

    Read Article
  • Take these steps to keep your data secure.

    How to avoid the five most common causes of data breaches

    Organizations around the country lost over 250 million records in data breaches during 2013 alone. This startling statistic, compiled by the Privacy Rights Clearinghouse, corresponds to more than one record for every adult American. Those records include credit card numbers, health information, employment data and other sensitive information that may lead to identity theft for …

    Read Article
  • Knowing — and implementing — a few simple fixes can keep your enterprise a step ahead of IT security threats.

    Security 101: Know the basics of eternal vigilance

    This feature first appeared in the Spring 2014 edition of Certification Magazine. “Boss, I think that someone got into my system.” Those are words that no computer user ever wants to utter, and no manager ever wants to hear. Unfortunately, they are heard in offices around the world every day. Last year, the Center for Strategic …

    Read Article
  • Computer script THUMB

    To script or not to script, that is the question — for DBAs

    Recently I was asked whether a person pursuing a career as an Oracle database administrator needs to have knowledge of scripting languages. One answer to that question could be no — if the potential DBA is someone who really likes performing the same basic tasks over and over, day in and day out. Said person …

    Read Article
  • Cert Mag Icon

    IT Folks, Here’s Another Potential Headache for You

    A survey shows employees use their personal devices to access work data even if there’s a policy against it.

    Read Article
  • Cert Mag Icon

    Reduce Security Risk of Web Applications

    Use of Web applications has soared, but there are security vulnerabilities that create dangerous risk.

    Read Article
12345...