Latest (all topics)
Top stories
Hardware
All-in-One printer
Apple Mac
Audio
Backup
Book
Broadband
Camcorder
CD drive
Desktop PC
Digital camera
DVD drive
Gaming
Graphics card
Hard disk
Input device
Laptop
LCD
Mobile phone
Modem
Monitor
Motherboard
Multimedia
Networking
PDA
Printer
Processor
Projector
Scanner
Server
Tuning
UPS
Video
Web camera
Whiteboard
Miscellaneous
Software
Apple Mac
Audio
Backup
Business
Developer
Educational
Game
Graphics
Internet
Linux
Networking
Operating System
PDA
Security
Server
Utilities
Miscellaneous
 
 

1 2 3 4 5 ... »

Why Pay CPC When There's CPA?
News from the U.S. reports that Google is ‘optimistic’ about extending its test of a cost-per-action (CPA) payment model alongside its traditional cost-per-click (CPC) business. It’s a development that demonstrates the ...
 
04.04.07
 
Prevention's The Name Of The Game
Preventing an incident developing into a crisis for the business, or allowing it to escalate into a disaster that may result in its downfall is often given too little attention by those responsible for crisis management. Indeed, ...
 
02.04.07
 
Defending In Depth
Organisations are under attack. Not from competitors, federal regulations or consumer outrage, although those are concerns. But enterprises - and subsequently their client base - have become marked targets. To leverage ...
 
30.03.07
 
OS Patching, Add It To Your Security Policy
Information technology personnel have grown accustomed to the virtual onslaught of security updates, or patches, that are released monthly, weekly and sometimes even daily for the key operating systems on their networks. With ...
 
29.03.07
 
Designing Systems For Availability
Business continuity has traditionally been a big issue for organisations given the effect that an issue can have on everyday operations. Losing your IT systems leads to staff being unable to work, while customers and partners ...
 
28.03.07
 
Cyber Security & Other Games
Cyber security has proved to be an elusive goal that now requires a radical shift in the mental models of IT practitioners. The first issue stems from the idealised concept of security with the implicit belief that a system ...
 
27.03.07
 
Making COOP Count
The 21st Century has already thrown up a series of catastrophic incidents that have had a worldwide impact. The Tsunami, Hurricane Katrina and, closer to home, the London bombings and Avian flu have each played a devastating ...
 
26.03.07
 
Open Source Is Anarchy, Not Chaos
Many people think of anarchy as a system devoid of governance; a situation in which there is a total lack of organisation or control. But that’s chaos, not anarchism. If open source used a chaotic system (which is an ...
 
23.03.07
 
7 Sins Of Information Risk Management
Information Risk constitutes any possible event that will prevent information from being used as the business intended it to. Successful information management mitigates all information related risks and ensures that ...
 
22.03.07
 
Doing Your Byte, Storage Goes Green
Climate change is one of the most important global issues facing mankind in the 21st century. There is growing recognition that our traditional energy supplies are neither endless nor secure, and an increased understanding of ...
 
21.03.07
 
Second Life, Second Identity?
Information is precious and personal information is perhaps the most valuable information we have. Companies and organisations which collect consumer and customer data use this information to analyse and measure specific ...
 
20.03.07
 
Making Services Pay
The traditional break/fix IT services model has had its day. In an increasingly competitive environment, managed service providers simply cannot deliver the depth, breadth or quality of service required using the traditional on ...
 
19.03.07
 
Can David Ever Beat Goliath?
Is big ever better? Or is convenient really a mask for corporate laziness and ineptitude? Today’s convenience culture is endemic - and it has spread to the business arena. It all seems so straightforward: the ‘one stop shop’ ...
 
16.03.07
 
The Evolution Of VoIP
All over the globe, VoIP (Voice over IP, or ‘Internet calling’) is helping transform the way people communicate. No longer just a tool for PC hobbyists, VoIP is emerging as the communication method of choice for millions of ...
 
15.03.07
 
Don't Choke In The Name Of Security
News reports about network security breaches have become commonplace. Accompanying these reports is usually a staggering price tag for network downtime, lost productivity, lost revenue, and loss of customer trust. Each time ...
 
14.03.07
 
   
     
© 2007 Black Letter Publishing Ltd. - Disclaimer - Terms - About - Contact - Advertise - Newsletter

Hosted By Gradwell - Powered By Eclipse Internet - Sponsored By Ipswitch & Microboards DVD Duplicators