Latest (all topics)
Top stories
Hardware
All-in-One printer
Apple Mac
Audio
Backup
Book
Broadband
Camcorder
CD drive
Desktop PC
Digital camera
DVD drive
Gaming
Graphics card
Hard disk
Input device
Laptop
LCD
Mobile phone
Modem
Monitor
Motherboard
Multimedia
Networking
PDA
Printer
Processor
Projector
Scanner
Server
Tuning
UPS
Video
Web camera
Whiteboard
Miscellaneous
Software
Apple Mac
Audio
Backup
Business
Developer
Educational
Game
Graphics
Internet
Linux
Networking
Operating System
PDA
Security
Server
Utilities
Miscellaneous
 
 

« 1 2 3 4 5 ... »

Finding Time To Make IT More Strategic
IT departments are currently faced with an avalanche of exciting new technologies that need to be evaluated and assimilated, along with the requirement to comply with new regulations, support ongoing change and align IT with a ...
 
13.03.07
 
A Baker's Dozen Of Security Bytes
The lifespan of laptops, PDAs and smartphones is falling as the pace of technology marches ever onwards. But for every new mobile device purchased by organisations of all sizes there is usually a piece of legacy hardware that ...
 
12.03.07
 
Patching Up Security
CEOs and CFOs know that viruses can damage their business and cost millions. But many do not realise that an anti-virus programme cannot help when it comes to the increasingly frequent flaws that are being exposed in corporate ...
 
08.03.07
 
Linux, OS Choice For Availability
If you ask any IT manager if they would want an operating system that was ‘guaranteed’ to be available and supporting applications running continuously 24 hours a day, 365 days a year, then the answer would probably be very ...
 
07.03.07
 
EIM & SaaS, Evaluating For Reliability
The demand for automated incentive compensation has brought it into the on-demand world. Implementing a world-class enterprise incentive management (EIM) system is essential given today’s fierce global competition, and as ...
 
06.03.07
 
Stop Slurping On Your Networks
How can you fight pod slurping in your offices? No, it’s not a plant-care issue, but the threat from malicious parties hijacking business data using USB devices, such as MP3 players, memory sticks or digital cameras. Some ...
 
05.03.07
 
Back Up Or Pack Up
Information is the lifeblood of estate agents - after all, it’s what their business runs on. Whether it’s property details, buyer/seller contact information and requirements, billing data or legal correspondence, it is something ...
 
01.03.07
 
Getting 10GigE With IT
As rising volumes of data traffic, media-rich applications and datacentre consolidation drive forth the need for increased bandwidth scalability and high-speed connections, 10GbE is creeping everywhere within the enterprise, and ...
 
28.02.07
 
How Cybercrime Operations Work
Hackers are no longer motivated by notoriety - it’s now all about the money. Cybercrime has become a profession; a business model - and the demographic of your typical mastermind cybercriminal is changing rapidly from lone ...
 
27.02.07
 
Do Or Die
Why do so many companies have a do or die approach to flexible working? Many companies, especially those within the financial sector, are waking up to the need to put in place contingency plans for remote working in the event of ...
 
26.02.07
 
Second Time Around
Second user systems are environmentally friendly, cost-effective and make sound business sense. So rather than pay a premium for the latest technology, businesses should be looking to maximise their IT budgets by deploying fully ...
 
23.02.07
 
Stop Wasting Money On Penetration Testing
Penetration Testing is the final word in proving that technical compliance and good security pratices are in place - or so it should be. But how do you know if you’re getting a good service or not? What if the consultant ...
 
22.02.07
 
HP Spying Case Highlights Data Conundrum
The well-publicised HP spying scandal has again brought into sharp focus the value which companies place on confidential company data and intellectual property. In an attempt to discover how board level information was ...
 
21.02.07
 
Password Malpractice, Are You Guilty?
The explosion of passwords in today’s enterprise has created a sea of holes in the security infrastructure. Some CIOs have responded to the challenge by bringing in the lifeboats, figuratively speaking, but in many cases the ...
 
16.02.07
 
The Dirty Dozen, Killing False Positives
In the classic war movie The Dirty Dozen, Lee Marvin’s maverick major must make a crack fighting unit from an unruly squad of prisoners, then launch an all-out assault behind enemy lines. It’s a near-impossible ...
 
15.02.07
 
   
     
© 2007 Black Letter Publishing Ltd. - Disclaimer - Terms - About - Contact - Advertise - Newsletter

Hosted By Gradwell - Powered By Eclipse Internet - Sponsored By Ipswitch & Microboards DVD Duplicators