Staffing Shortage Makes Vulnerabilities Worse

Businesses don’t have sufficient staff to find vulnerabilities or protect against their exploit, according to a new report by Ponemon Institute. For enterprise IT groups, responding to the volume of new vulnerabilities is growing more difficult – compounded by a chronic lack of skilled cybersecurity professionals to deal with the issues. That is one of the […]

Read more
The #StateOfCSS 2019 Survey

After the State of JavaScript, help us identify the latest CSS trends I’ve been using CSS for 10+ years, so I know it pretty well by now. I can handle flexbox, I’ve mastered SASS, and I even know the difference between ems and rems. But wait, now there’s Grid, too? And position: sticky? And what’s this […]

Read more
PACE – People, Alignment, Culture, and Execution

McAfee was founded in 1987, and at 32 years old, we’re moving faster than ever before with more precision, agility, and innovation. With McAfee’s expected growth in 2019 as the device-to-cloud cybersecurity company, we recognize the need to ensure that the Americas Channel Team is sharply focused. As I’ve met with members of my team, […]

Read more
Project Prospects: A systems view of risk

This 5-minute read proposes a more comprehensive systems view of project risk management, moving on from the fill-out-the-template approach. Risk pervades our lives, shapes our strategies, and influences our behavior. It accompanies every project, but unlike the triple constraint, you can actually ignore it and (with some luck) be successful. Please don’t; this is not […]

Read more
How to Design for 3D Printing

3D Printing is a revolutionary new technology that allows you to realize, well, just about anything. The most common form of 3D printers use a special form of plastic filament to print durable, hard ABS plastic components or items. However, there are 3D printers—industrial mostly—that can work with materials like concrete, glass, titanium, steel and […]

Read more
Top