Blog Posts Tagged with "Information Technology"

49afa3a1bba5280af6c4bf2fb5ea7669

How to Weather the Outsourcing Storm

December 03, 2010 Added by:Mike Meikle

A quick overview, 2.8 million business support jobs lost since 2000, a large chunk of that being IT. Also IT stands to lose another 450k-500K jobs by the time 2014 rolls around. This is discussed in the eWeek article. InfoWorld points to the 500k IT jobs lost in 2008-2009 alone...

Comments  (0)

6d117b57d55f63febe392e40a478011f

WikiLeak's Next Dump May Alter Enterprise Security Forever

November 30, 2010 Added by:Anthony M. Freed

If the recent classified data disclosures by whistleblower organization WikiLeaks can be said to have governments in a scramble, then it would be fair to say that the pending release of confidential records from private enterprises should have executives and shareholders in a serious pucker...

Comments  (6)

F520f65cba281c31e29c857faa651872

Road to Effective Information Management Part Two

November 20, 2010 Added by:Rahul Neel Mani

In the second part of his interview Manoj Chugh, President India and SAARC, EMC Corporation in a long, exclusive conversation with Rahul Neel Mani talks about how the company has reacted to customer demands, private clouds and EMC’s role in sustainability...

Comments  (0)

1f2f664e68a603b3c54890fbbcd37857

Security Awareness in a Connected World

November 16, 2010 Added by:Mark Gardner

In a new more open internet age, where privacy is somewhat discarded, the threat to the enterprise is increased, because of the blurring between home and work. It is only by shouting above the noise to get the security message across, can the enterprise be protected...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Small Businesses Need Protection from Security Threats

November 13, 2010 Added by:Dan Dieterle

Zero day exploits, which are previously unidentified software exploits that allow hackers complete remote access to your system, are found constantly. Keeping up with these can be a chore, but is a critical step in protecting your network...

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

Are You a Demanding User?

November 12, 2010 Added by:Christopher Burgess

When we raise our heads and look into our infrastructure, at times we are thwarted due to the lack of similar technology being availed or an information technology implementation policy standing between us and the new capability. The reality is, we aren't alone...

Comments  (0)

98180f2c2934cab169b73cb01b6d7587

Federal Cyber Security: Are We Winning or Losing?

November 09, 2010 Added by:Jon Stout

The state of our cyber defense was summarized by Michael Chertoff when he concluded that it may take a digital 9-11 to get business, consumers and governments to fortify their cyber security defenses. In effect we are fighting an asymmetrical war and, at present, we appear to be losing...

Comments  (0)

F520f65cba281c31e29c857faa651872

The Road to Effective Information Management

November 05, 2010 Added by:Rahul Neel Mani

EMC completed its first 10 years in India. EMC has come a long way from being a storage box pusher to a preferred information management partner. Manoj Chugh, President EMC India in an exclusive conversation with Rahul Neel Mani talks about how the company grew both in size and stature...

Comments  (0)

4ff49873e3fed9a24adf0d37ae00b780

Will A Security Conference Help Your Company?

November 04, 2010 Added by:Lee Munson

Why send your IT staff to a conference? Security conferences are a place where both white and black hat hackers come out to show what they have discovered over the past year. The one thing that a hacker cares about more than money in this world is respect from his peers...

Comments  (0)

7e6249b5c7f6b63c28587c820b16edcb

Reconnaissance Gone Retail and Security - A Challenging Duality

November 03, 2010 Added by:Robert Gezelter

A few years ago, the possession of a notebook computer would have been cause for a warning that electronic devices are not allowed within the building. Now, much, if not all of the facility is equipped with Wi-Fi, and there is an unencrypted Wi-Fi available for patients and visitors...

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Consider Security Before Introducing New Systems

November 02, 2010 Added by:Simon Heron

Unified communication can be a great aid to productivity by bringing together various communication tools such as IM, chat, click-to-call, video and VOIP calls. This can mean restructuring the corporate network. Again, there are important considerations involved in such a restructure...

Comments  (0)

Page « < 5 - 6 - 7 - 8 - 9 > »