Latest (all topics)
Top stories
Hardware
All-in-One printer
Apple Mac
Audio
Backup
Book
Broadband
Camcorder
CD drive
Desktop PC
Digital camera
DVD drive
Gaming
Graphics card
Hard disk
Input device
Laptop
LCD
Mobile phone
Modem
Monitor
Motherboard
Multimedia
Networking
PDA
Printer
Processor
Projector
Scanner
Server
Tuning
UPS
Video
Web camera
Whiteboard
Miscellaneous
Software
Apple Mac
Audio
Backup
Business
Developer
Educational
Game
Graphics
Internet
Linux
Networking
Operating System
PDA
Security
Server
Utilities
Miscellaneous
 
 

«... 3 4 5 6 7 ... »

Minimising The Risks Of Unexpected Shocks
Small businesses make up 99% of all businesses in the UK, yet according to some studies only 46% of them have a plan in place should disaster strike. In the last eighteen months high profile incidents such as the Buncefield ...
 
21.12.06
 
Microsoft/Novell Agreement Is Good For Linux
Being ever aware of Microsoft's monopolisation endeavours, coupled with working in a Linux world inherently mistrustful of the software giant, it may seem strange that I believe the Microsoft/Novell agreement will be great for ...
 
20.12.06
 
Using Compliance To Your Advantage
Compliance has propelled storage from back office obscurity to the top of the boardroom agenda and with its newly raised profile comes newly raised budgets, the likes of which would have previously been unimaginable for a ...
 
19.12.06
 
The Lost Art Of Managing Risk
The speed of technology evolution and adoption is increasingly taking away our ability to assess and manage its impact on business with the overrun creating massive governance and operational gaps resulting in exposure and ...
 
15.12.06
 
Disaster Recovery Is Not Just For Big Fish
Smaller companies are less likely to have robust procedures in place to deal with unexpected events. Research by the Bank of Scotland Business Banking suggests that this is in fact the case. Even with events like the ...
 
14.12.06
 
Botox & IT Security, Are You Too Late?
As a 50 something male, personal grooming takes on whole new meaning. Never mind that my hair stops growing on my head and now appears to be sprouting from places I could never have imagined - today when I go to the hairdresser ...
 
13.12.06
 
Calling For Next-Generation Network Security
The widespread use of credit cards for virtually all of our financial transactions has increased exponentially with the rapid adoption of e-commerce throughout the worldwide economy. With the increased use of credit cards comes ...
 
12.12.06
 
Web 2.0, Don't Let It Pass You By
Google’s recent acquisition of YouTube is clear evidence that Web 2.0 is here to stay, but what will be its impact in the business environment? Web 2.0 has emerged as a hot topic in the enterprise space. It is more than just ...
 
11.12.06
 
Dispelling Common Patching Myths
According to an April 2006 report from the Yankee Group, the various security investments enterprises have made do, indeed, make it more difficult for ‘criminals, spies and miscreants’ to break into corporate ...
 
08.12.06
 
Asset Management Key To Compliance
A study of 1000 UK employees carried out by YouGov in 2006, revealed that 60 per cent of users accessed personal Web and e-mail applications from corporate endpoints at least once a week. Unless carefully managed, these ...
 
07.12.06
 
Filtering Out The E-Mail Content Security Hype
Corporate e-mail is at risk. Vulnerable to external attack from viruses, spam, spyware and phishing technologies. And vulnerable to abuse from within, which could result in: acceptable use policies being compromised; ...
 
06.12.06
 
Start-Ups Must Invest Wisely In IT
Many will remember the trends of the late 80s and early 90s, where the most important investments for successful businesses were seen as company cars and salubrious offices. Stories abound about businesses investing in ...
 
01.12.06
 
End-User Experience, The Key To Continuity
The post-dotcom boom has been a tough time for many IT departments. As budgets have tightened, an increased focus has been placed on making existing infrastructures and applications work more cohesively in order to drive user ...
 
30.11.06
 
Sex, Spies & Hard Drives
On average, 70 per cent of re-sold hard disk drives and memory cards contain pornographic material, according to research carried out on 1000 hard disk drives over the course of a year by Disklabs Data Recovery and Computer ...
 
29.11.06
 
H.G. Wells, Dr Who & CPR Are The Same...
They are all able to travel through time, although Continuous Data Protection AND Recovery (CPR) is not attacked by its arch-enemy to stop it. Where CPR differentiates itself is to deliver the Brave New World (or was that a ...
 
27.11.06
 
   
     
© 2007 Black Letter Publishing Ltd. - Disclaimer - Terms - About - Contact - Advertise - Newsletter

Hosted By Gradwell - Powered By Eclipse Internet - Sponsored By Ipswitch & Microboards DVD Duplicators