Blog Posts Tagged with "Information Technology"


How to Weather the Outsourcing Storm

December 03, 2010 Added by:Mike Meikle

A quick overview, 2.8 million business support jobs lost since 2000, a large chunk of that being IT. Also IT stands to lose another 450k-500K jobs by the time 2014 rolls around. This is discussed in the eWeek article. InfoWorld points to the 500k IT jobs lost in 2008-2009 alone...

Comments  (0)


WikiLeak's Next Dump May Alter Enterprise Security Forever

November 30, 2010 Added by:Anthony M. Freed

If the recent classified data disclosures by whistleblower organization WikiLeaks can be said to have governments in a scramble, then it would be fair to say that the pending release of confidential records from private enterprises should have executives and shareholders in a serious pucker...

Comments  (6)


Road to Effective Information Management Part Two

November 20, 2010 Added by:Rahul Neel Mani

In the second part of his interview Manoj Chugh, President India and SAARC, EMC Corporation in a long, exclusive conversation with Rahul Neel Mani talks about how the company has reacted to customer demands, private clouds and EMC’s role in sustainability...

Comments  (0)


Security Awareness in a Connected World

November 16, 2010 Added by:Mark Gardner

In a new more open internet age, where privacy is somewhat discarded, the threat to the enterprise is increased, because of the blurring between home and work. It is only by shouting above the noise to get the security message across, can the enterprise be protected...

Comments  (0)


Small Businesses Need Protection from Security Threats

November 13, 2010 Added by:Dan Dieterle

Zero day exploits, which are previously unidentified software exploits that allow hackers complete remote access to your system, are found constantly. Keeping up with these can be a chore, but is a critical step in protecting your network...

Comments  (0)


Are You a Demanding User?

November 12, 2010 Added by:Christopher Burgess

When we raise our heads and look into our infrastructure, at times we are thwarted due to the lack of similar technology being availed or an information technology implementation policy standing between us and the new capability. The reality is, we aren't alone...

Comments  (0)


Federal Cyber Security: Are We Winning or Losing?

November 09, 2010 Added by:Jon Stout

The state of our cyber defense was summarized by Michael Chertoff when he concluded that it may take a digital 9-11 to get business, consumers and governments to fortify their cyber security defenses. In effect we are fighting an asymmetrical war and, at present, we appear to be losing...

Comments  (0)


The Road to Effective Information Management

November 05, 2010 Added by:Rahul Neel Mani

EMC completed its first 10 years in India. EMC has come a long way from being a storage box pusher to a preferred information management partner. Manoj Chugh, President EMC India in an exclusive conversation with Rahul Neel Mani talks about how the company grew both in size and stature...

Comments  (0)


Will A Security Conference Help Your Company?

November 04, 2010 Added by:Lee Munson

Why send your IT staff to a conference? Security conferences are a place where both white and black hat hackers come out to show what they have discovered over the past year. The one thing that a hacker cares about more than money in this world is respect from his peers...

Comments  (0)


Reconnaissance Gone Retail and Security - A Challenging Duality

November 03, 2010 Added by:Robert Gezelter

A few years ago, the possession of a notebook computer would have been cause for a warning that electronic devices are not allowed within the building. Now, much, if not all of the facility is equipped with Wi-Fi, and there is an unencrypted Wi-Fi available for patients and visitors...

Comments  (0)


Consider Security Before Introducing New Systems

November 02, 2010 Added by:Simon Heron

Unified communication can be a great aid to productivity by bringing together various communication tools such as IM, chat, click-to-call, video and VOIP calls. This can mean restructuring the corporate network. Again, there are important considerations involved in such a restructure...

Comments  (0)

Page « < 5 - 6 - 7 - 8 - 9 > »