HomeLatest News

Latest News

How to Leverage Unified Communications to Gain Competitive Advantage

Unified communications is such a broad term that it can be a little daunting to approach. Like "networking" in the '80s or "the Internet"...

How to Conduct Risk-Based IT Compliance Self-Assessments

The U.S. Securities and Exchange Commission provided interpretive guidance on the implementation of a risk-based approach for management's self-assessment of Internal Controls over Financial...

Managing a Mobile Platform

Mobile administrators charged with growing a company's mobile initiatives quickly find that proper management is essential for providing a consistent and predictable experience to...

Zenprise Eases BlackBerry Management

Zenprise for BlackBerry and Exchange has everything a company needs to monitor and troubleshoot mobile e-mail delivery-as long as that environment comprises BlackBerry smart...

Security in a Virtualized World

Aside from "the hypervisor has never been compromised," virtualization platform makers aren't likely to talk too much about security concerns. Impediments to selling lots...

INSIDE WIRELESS: CTIA WIRELESS-Wireless Data Is Finally Big Business

It wasn't many years ago that analysts were saying, "Someday, wireless data is going to become successful and, eventually, exceed voice revenues." Well, having...

IBM Delivers Cognos Services

In the first software and services release related to its acquisition of Cognos, IBM has announced a blended human capital management services and software...

Enterprise Encryption Strategies for Data Protection Take Careful Planning

If a laptop, CD or smart phone is stolen, encryption can be the difference between a data breach and a close call. With so...

NASA Tech Auction Set

Looking for some cool NASA Goddard Space Flight Center next gen technology? How about a new signal processing technology called the Hilbert-Huang Transform? Who...

Still Overflowing After All These Years

A lot of people at Microsoft must have been alternately angry and embarrassed last week at the details of MS08-052. This series of vulnerabilities...