Latest (all topics)
Top stories
Hardware
All-in-One printer
Apple Mac
Audio
Backup
Book
Broadband
Camcorder
CD drive
Desktop PC
Digital camera
DVD drive
Gaming
Graphics card
Hard disk
Input device
Laptop
LCD
Mobile phone
Modem
Monitor
Motherboard
Multimedia
Networking
PDA
Printer
Processor
Projector
Scanner
Server
Tuning
UPS
Video
Web camera
Whiteboard
Miscellaneous
Software
Apple Mac
Audio
Backup
Business
Developer
Educational
Game
Graphics
Internet
Linux
Networking
Operating System
PDA
Security
Server
Utilities
Miscellaneous
 
 

1 2 3 4 5 ... »

OS Patching, Add It To Your Security Policy
Information technology personnel have grown accustomed to the virtual onslaught of security updates, or patches, that are released monthly, weekly and sometimes even daily for the key operating systems on their networks. With ...
 
29.03.07
 
7 Sins Of Information Risk Management
Information Risk constitutes any possible event that will prevent information from being used as the business intended it to. Successful information management mitigates all information related risks and ensures that ...
 
22.03.07
 
EIM & SaaS, Evaluating For Reliability
The demand for automated incentive compensation has brought it into the on-demand world. Implementing a world-class enterprise incentive management (EIM) system is essential given today’s fierce global competition, and as ...
 
06.03.07
 
Stop Slurping On Your Networks
How can you fight pod slurping in your offices? No, it’s not a plant-care issue, but the threat from malicious parties hijacking business data using USB devices, such as MP3 players, memory sticks or digital cameras. Some ...
 
05.03.07
 
The Dirty Dozen, Killing False Positives
In the classic war movie The Dirty Dozen, Lee Marvin’s maverick major must make a crack fighting unit from an unruly squad of prisoners, then launch an all-out assault behind enemy lines. It’s a near-impossible ...
 
15.02.07
 
The Importance Of Being Interesting
I don’t think I would be exaggerating if I said that a high percentage of the material dealing with the topic of Business Continuity (BC) is diabolically dull. There is a croaking, all pervading, dusty dryness which coughs from ...
 
09.02.07
 
E-Filing For Beginners
E-mail is the new paper. It is now used for over 80% of written business communication. Given the exponential rise in e-mail-based business communication over recent years, there is a definite need for the e-filing cabinet, in ...
 
02.02.07
 
Me, Myself & iPod
According to research by Marc Prensky consultancy, the typical 21-year old graduate entering the workplace has approximately 5000 hours of gameplay experience, exchanged 250,000 e-mails and instant messages, spent 10,000 hours ...
 
01.02.07
 
Turning Regulation Lemons To Lemonade
Half full or half empty? Companies can regard compliance with the past five years of regulatory frenzy, as a burden that threatens their financial balance sheet or even their operational capacity. Or as an opportunity to ...
 
30.01.07
 
Test Before You Leap
Like many people, I am a prolific reader of the newspapers and keep up with news and current affairs by reading at least one a day. Yet, for a while now, and I must say with growing frustration, I’ve noticed an increase in ...
 
25.01.07
 
A Practical Guide To Continuity Planning
While critical information is the lifeblood of every organisation, small companies often spend more time planning their company picnic than they do for an event, which could put them out of business! Certainly, the threat of ...
 
17.01.07
 
Best Practices For Preserving Security
The centralisation of branch office servers and storage enables enterprises to more effectively manage and secure critical business information. By moving servers out of branch offices and consolidating IT infrastructure to ...
 
22.12.06
 
Using Compliance To Your Advantage
Compliance has propelled storage from back office obscurity to the top of the boardroom agenda and with its newly raised profile comes newly raised budgets, the likes of which would have previously been unimaginable for a ...
 
19.12.06
 
The Lost Art Of Managing Risk
The speed of technology evolution and adoption is increasingly taking away our ability to assess and manage its impact on business with the overrun creating massive governance and operational gaps resulting in exposure and ...
 
15.12.06
 
Dispelling Common Patching Myths
According to an April 2006 report from the Yankee Group, the various security investments enterprises have made do, indeed, make it more difficult for ‘criminals, spies and miscreants’ to break into corporate ...
 
08.12.06
 
   
     
© 2007 Black Letter Publishing Ltd. - Disclaimer - Terms - About - Contact - Advertise - Newsletter

Hosted By Gradwell - Powered By Eclipse Internet - Sponsored By Ipswitch & Microboards DVD Duplicators