Employee monitoring: When IT is asked to spy
It's 9:00 in the morning, or 3:00 in the afternoon, or even 10:00 at night. Do you know what your users are up to?
It's 9:00 in the morning, or 3:00 in the afternoon, or even 10:00 at night. Do you know what your users are up to?
As a new decade opens, more and more data centre operators find themselves struggling with an enterprise bottleneck not of their own making.
As wave after wave of corporate layoffs remake the American business landscape, IT managers find themselves wondering if they should consider a personal bailout strategy of their own -- government IT job.
How to save make-or-break IT initiatives in troubled times.
IT buys the technology; facilities buys the energy. That's the way it's always been in corporate America. But that may be changing.
Telecommuting is back on workers' radars in a big way these days, thanks to gas prices that were a whopping 30 percent higher this summer than last.
Telecommuting is back on workers' radars in a big way these days, thanks to sky-rocketing petrol prices.
It's no exaggeration to say the '00s have been the decade when the electronic sensor left the factory floor and went, well, everywhere.
Web-based e-mail is booming. Services such as Gmail, Yahoo Mail and Hotmail are convenient, accessible and, best of all, free. Many of us have come to rely on them without giving it a second thought.
Last year, Michael Vu, a 40-year-old independent IT consultant, found himself in a wholly unexpected place midway through his career.
It still weighs heavily on Bryan's mind, what he found on that executive's computer, especially when he thinks of his own daughters. He's particularly troubled that the man he discovered using a company computer to view pornography of Asian women and of children was subsequently promoted and moved to China to run a manufacturing plant.
With the rise in identity theft and online security breaches, RSA Security seems poised to take off. But how far it goes depends on how well the company is able to expand its authentication technology to new markets and devices.