- Welcome Guest
- Sign In
"The 2008 Aberdeen Report: The State of the Market" reveals that investments in new enterprise applications are the top IT initiative for 2008. Aberdeen's research also shows that, on average, organizations are using six business-critical applications and are planning to roll out four new applicatio...
If John McCain wanted a strong woman on his side, he couldn't have done much better than Carly Fiorina, the former CEO of HP who has recently been making a name for herself on the political scene. Fiorina has been serving as an economic adviser and advocate for the McCain campaign, and there have be...
In July, Nielsen Media Research reported "watching video on the Internet is no longer a novelty; 119 million unique viewers viewed 7.5 billion video streams in May 2008. In addition, as of Q1 2008, 91 million Americans owned a video-capable phone." As content owners look to mobilize their video cont...
When it comes to the preferred avenue for information access, the Internet continues to be the medium of choice. From news to commerce to entertainment, our always-on culture is constantly finding new ways to satisfy its digital fix, placing unknown and sometimes intensive demands on enterprise netw...
New directories are a valuable tool for Web sites that need that extra boost in search engine ranking or in their number of visitors. They make for a great way to increase Web exposure and expand your Web site's advertising. Since many of the top Web directories are quite expensive and take time to ...
End-user organizations are looking to leverage enterprise applications to achieve competitive advantages and operational efficiencies, and to improve information flow in their value chains. In order to maximize the return on investment from these deployments, organizations are optimizing their netwo...
Social networking tools aren't really new in the computing world. After all, AOL was the granddaddy of social networking environments back in the Internet's early days. But the extension of these environments to mobile devices is new. According to an Informa Telecoms report, about 50 million people,...
The iPhone 3G's battery life and problems with MobileMe have many favoring the older model, but lines are still forming for the 3G version. This showcases both the amazing capabilities of brilliant marketing and the risks associated with applying it to the wrong product. At the core of the iPhone's ...
We're facing a Web security gap. The Web has become the primary source of infections in enterprises, surpassing e-mail. Although most enterprises do some form of URL filtering on their Web traffic, it's proven to not be an adequate security solution alone. Only 15 percent of organizations are perfor...
Web 2.0 technologies are empowering enterprises in ways we could only have imagined a few years ago. They have evolved beyond consumer-grade blogs and wikis into enterprise-class solutions driving collaboration, productivity, sales and cost savings. But despite the business value they deliver, are e...
Physicists tell us that time is not constant. Interesting as that may be for physicists, it's also a concept that the rest of us can get behind once we put a little bit of a different spin on it. I'm not suggesting that we should all get out our lab coats and play make-believe cosmologist. Instead, ...
The other day I was visiting a partner company and asked if they had wireless Internet access I could use. The IT guy said they had not installed a wireless network due to security concerns, so instead he let me plug into the network to get access to a Web site I needed for our discussion. I don't b...
We live in interesting times. According to Gartner Research VP Robert Anderson, if all the people on the MySpace virtual community banded together, they'd form the eighth largest country in the world. Never before in history could people create such large communities and communicate so readily as t...
The proliferation of portable computing is fueling the need for mobile embedded security solutions. By enabling new applications while overcoming the risk of thefts and infringements, mobile security has become a vital requirement for both consumer and enterprise applications. Mobile applications su...
Want to try an experiment? Part 1: Get yourself a crowd of willing co-experimenters -- about 20 to 30 -- and tell them that you're going to ask them a trivia question. Tell them you're going to read the question to them and when you count to three, everyone should shout out their answer at the same ...