|
|
Why Pay CPC When There's CPA? |
|
News from the U.S. reports that Google is optimistic about extending its test of a cost-per-action (CPA) payment model alongside its traditional cost-per-click (CPC) business. Its a development that demonstrates the ... |
|
|
|
|
|
|
04.04.07
|
|
|
|
|
|
Prevention's The Name Of The Game |
|
Preventing an incident developing into a crisis for the business, or allowing it to escalate into a disaster that may result in its downfall is often given too little attention by those responsible for crisis management. Indeed, ... |
|
|
|
|
|
|
02.04.07
|
|
|
|
|
|
Defending In Depth |
|
Organisations are under attack. Not from competitors, federal regulations or consumer outrage, although those are concerns. But enterprises - and subsequently their client base - have become marked targets. To leverage ... |
|
|
|
|
|
|
30.03.07
|
|
|
|
|
|
OS Patching, Add It To Your Security Policy |
|
Information technology personnel have grown accustomed to the virtual onslaught of security updates, or patches, that are released monthly, weekly and sometimes even daily for the key operating systems on their networks. With ... |
|
|
|
|
|
|
29.03.07
|
|
|
|
|
|
Designing Systems For Availability |
|
Business continuity has traditionally been a big issue for organisations given the effect that an issue can have on everyday operations. Losing your IT systems leads to staff being unable to work, while customers and partners ... |
|
|
|
|
|
|
28.03.07
|
|
|
|
|
|
Cyber Security & Other Games |
|
Cyber security has proved to be an elusive goal that now requires a radical shift in the mental models of IT practitioners. The first issue stems from the idealised concept of security with the implicit belief that a system ... |
|
|
|
|
|
|
27.03.07
|
|
|
|
|
|
Making COOP Count |
|
The 21st Century has already thrown up a series of catastrophic incidents that have had a worldwide impact. The Tsunami, Hurricane Katrina and, closer to home, the London bombings and Avian flu have each played a devastating ... |
|
|
|
|
|
|
26.03.07
|
|
|
|
|
|
Open Source Is Anarchy, Not Chaos |
|
Many people think of anarchy as a system devoid of governance; a situation in which there is a total lack of organisation or control. But thats chaos, not anarchism. If open source used a chaotic system (which is an ... |
|
|
|
|
|
|
23.03.07
|
|
|
|
|
|
7 Sins Of Information Risk Management |
|
Information Risk constitutes any possible event that will prevent information from being used as the business intended it to. Successful information management mitigates all information related risks and ensures that ... |
|
|
|
|
|
|
22.03.07
|
|
|
|
|
|
Doing Your Byte, Storage Goes Green |
|
Climate change is one of the most important global issues facing mankind in the 21st century. There is growing recognition that our traditional energy supplies are neither endless nor secure, and an increased understanding of ... |
|
|
|
|
|
|
21.03.07
|
|
|
|
|
|
Second Life, Second Identity? |
|
Information is precious and personal information is perhaps the most valuable information we have. Companies and organisations which collect consumer and customer data use this information to analyse and measure specific ... |
|
|
|
|
|
|
20.03.07
|
|
|
|
|
|
Making Services Pay |
|
The traditional break/fix IT services model has had its day. In an increasingly competitive environment, managed service providers simply cannot deliver the depth, breadth or quality of service required using the traditional on ... |
|
|
|
|
|
|
19.03.07
|
|
|
|
|
|
Can David Ever Beat Goliath? |
|
Is big ever better? Or is convenient really a mask for corporate laziness and ineptitude? Todays convenience culture is endemic - and it has spread to the business arena. It all seems so straightforward: the one stop shop ... |
|
|
|
|
|
|
16.03.07
|
|
|
|
|
|
The Evolution Of VoIP |
|
All over the globe, VoIP (Voice over IP, or Internet calling) is helping transform the way people communicate. No longer just a tool for PC hobbyists, VoIP is emerging as the communication method of choice for millions of ... |
|
|
|
|
|
|
15.03.07
|
|
|
|
|
|
Don't Choke In The Name Of Security |
|
News reports about network security breaches have become commonplace. Accompanying these reports is usually a staggering price tag for network downtime, lost productivity, lost revenue, and loss of customer trust. Each time ... |
|
|
|
|
|
|
14.03.07
|
|
|
|