As an industry professional, you're eligible to receive a printed copy of the journal.

Fill out your address below.






Please reset your password to access the new DRJ.com
Reset my password
Welcome aboard, !
You're all set. We've send you an email confirmation to
just to confirm you're you.

Welcome to DRJ

Already registered user? Please login here

Existing Users Log In
   

Create new account
(it's completely free). Subscribe

2012 DRJ Highlights

2012 – the year is almost over. And what a year it has been. For the DRJ community and team, this has been a busy year of planning, development and continual learning. It has been our goal, as always, to provide you with the best resources available –...

Blog

Find Outstanding Sessions At Spring World 2013! Our agenda is packed with sessions that bring you the solutions and strategies you need in the New Year. Discover expert tips from some of the industry’s best and network with hundreds of practitioners from around...

Blog

Find Outstanding Sessions At Spring World 2013! Our agenda is packed with sessions that bring you the solutions and strategies you need in the New Year. Discover expert tips from some of the industry’s best and network with hundreds of practitioners from around...

DRJ Introduces – DRJ Live Learning Center

Introducing DRJ’s Newest Educational Resource: The DRJ Live Learning Center Missed a session at one of DRJ’s conferences? Is there a session you want to review again for reference? The DRJ Live Learning Center connects you to educational sessions recorded...

Tackling a Few Cloud Computing Concerns

By far, the biggest concerns surrounding cloud computing are issues regarding security and privacy in the cloud.  The notion of giving up total control of important, sensitive data scares people, as it is no longer “safe” behind the corporate wall. A...

Risky Business

In the broad spectrum of activities which might be called Information Security, we must always first and foremost implement, execute and follow through with risk management. Risk management is the backbone or foundation of any good information security program.  ...

Using the Cloud to Ensure Business Continuity

In today’s fast-paced society, companies of all sizes need affordable ways to deliver quality IT services reliably and continuously.  One of the key benefits of cloud computing, one that is also often overlooked, is how cloud computing can help ensure...