2021-06-03 22:29
A guide to getting first-party data from your customers
With the recent rise in data privacy, it’s only going to become more difficult for marketers to get the info they need for successful targeting and segmenting. The EU’s introduction of GDPR brought this topic to the mainstream several y
2021-06-03 22:29
Get a lifetime of CompTIA certification training today for just $50
The Computing Technology Industry Association — otherwise known as CompTIA — sets the standard by which IT professionals are judged. That makes earning one of their credentials really important, which is why we’re happy to offer disco
2021-06-03 17:48
Apple to try new hybrid workplace model for a year
Apple appears to be making a reluctant effort to embrace remote working after COVID-19 wanes, according to a memo shared with workers from CEO Tim Cook.
2021-06-03 17:48
Apple to try new hybrid workplace model for a year
Apple appears to be making a reluctant effort to embrace remote working after COVID-19 wanes, according to a memo shared with workers from CEO Tim Cook.
2021-06-03 16:10
The missing context around Google's Android privacy fallout
If you've read much tech news lately, you might be feeling a slight sense of shock right now.
2021-06-03 16:10
The missing context around Google's Android privacy fallout
If you've read much tech news lately, you might be feeling a slight sense of shock right now.
2021-06-03 12:00
The business user’s guide to Gmail
Gee whiz, Gmail sure isn't like most other email services.
2021-06-03 12:00
The business user’s guide to Gmail
Gee whiz, Gmail sure isn't like most other email services.
2021-06-02 20:41
When is a cybersecurity hole not a hole? Never
In cybersecurity, one of the more challenging issues is deciding when a security hole is a big deal, requiring an immediate fix or workaround, and when it's trivial enough to ignore or at least deprioritize. The tricky part is that much of
2021-06-02 20:41
When is a cybersecurity hole not a hole? Never
In cybersecurity, one of the more challenging issues is deciding when a security hole is a big deal, requiring an immediate fix or workaround, and when it's trivial enough to ignore or at least deprioritize. The tricky part is that much of