Related Content
![]() |
The Most Memorable Security Breaches of 2013 This year may go down as the year of Internet security breaches. After all, it was only this year that people began to look over their shoulders at the NSA. However, the NSA wasn't responsible for all of this year’s most memorable security breaches. Read on for a 2013 roundup. |
|
![]() |
Five Future Mobile Strategies for Small Businesses With so much web traffic being generated from mobile devices, it’s essential for a business to have a mobile site that’s functional and user-friendly. But that can be difficult even for the big brands, so how can small businesses do it? Here are the mobile strategies they should be thinking about. |
|
![]() |
How to Brag about Your Work Accomplishments without Being a Braggart No one likes to listen to people who constantly brag. But some things are worth bragging about, or at least making people aware of. If you would like credit for your contributions without the noise of tooting your own horn, there are some approaches you might consider. Naomi Karten tells you how. |
|
![]() |
Are Information Technology Careers Only for the Young? The topic of age discrimination is uncomfortable and, at times, even hard to prove beyond a shadow of a doubt. However, recent cases of age discrimination in the US and abroad have proven that there is at least a perception that age matters in employment—and especially in the IT field. |
|
![]() |
Should Just-in-Time Training Be Just in Time? Conventional wisdom suggests that technical training should be provided just before its actual business use. The theory is that if you provide the training too soon, the person will not remember much of what was taught. But at its best, technical training is not an event—it’s a process. |
|
![]() |
Using Big Data to Make Big Decisions on Hiring, Firing, and Retention Predictive analytics has primarily been used to determine the future of the market, consumer trends and demands, and how products might fare in the industry. Now companies could be turning predictive analytics on its axis, forcing the scope inward as they look to use big data in hiring and firing. |
|
![]() |
Handoffs Aren't Bad—Just Think of Cooks in the Kitchen Some people are confused by the word handoff. They think it means people have not done their jobs and other people had to cover for them. Sometimes that happens, but usually it's more like when one chef cooks his part of the meal, then hands off the plate to the next chef to finish the dish. |
|
![]() |
Not-To-Do Lists Are Just as Valuable as To-Do Lists To-do lists focus on tasks you have to do in the near term. Not-to-do lists, by contrast, tend to focus on more general things you want to banish from your life. Your objective in using a not-to-do list could be to achieve greater productivity, manage your time better, or discontinue a bad habit. |