The traditional PC as the corporate 'thick client' has long been at the forefront of desktop computing. It has represented a favourable compromise between functionality, performance and cost. However, a number of challenges remain: Desktop Management: Centralising desktop management is an extremely difficult task in the face of a broadly distrib Read More
Would you like to see how your information technology infrastructure and procedures stack up against other small businesses? A group of companies, including Small Business Trends, have formed an industry coalition to benchmark the IT effectiveness of small and medium sized businesses around the world. Read More
This first segment of the "Boardroom Throw Down" pits the world famous Donald Trump against the infamous Gordon Gekko, a vicious negotiator and business man from the classic movie “Wall street”. These two icons are compared against 4 different dimensions; shrewdness, long term vision, magnetism, and accumulated wealth... Read More
With the potential for compromises in one virtual system or hypervisor to lead to compromises in multiple applications in a virtualized environment, the risks are too great for organizations to make security an afterthought. With virtualization technologies becoming pervasive in the data center, here are five essential steps for addressing virtual Read More
Few reports have surfaced of security breaches in virtual-server environments, but the potential looms large. "Every single platform we have had in IT eventually gets compromised. There is no reason for us to think that the hypervisor is going to be any different," says Pete Lindstrom, a senior analyst with Burton Group. "While hypervisors seem Read More
Adoption of radio frequency identification based on Electronic Product Code (EPC) standards to track goods moving among trading partners was never bound to be easy. Aligning the benefits for retailers, manufacturers, distributors and logistics providers is an ongoing challenge. Each company has its own interests and goals, and is pursuing the appl Read More
Security researchers are warning that the popular social bookmarking service Digg is being abused by malware distributors by creating fake news stories and promoting them, or by posting malicious comments to legit entries. Read More
The Procter & Gamble Co. (P&G), a pioneer in the use of Electronic Product Code (EPC) technologies in the supply chain, has ceased placing EPC tags on promotional displays bound for Wal-Mart's RFID-enabled stores. Kim Zimmer, Procter & Gamble's leader for global EPC RFID technology and operations, sent an e-mail this week to the company's contr Read More
The battle by Microsoft to secure its Live Hotmail system from spammers appears to have failed yet again with the news that the latest version of its CAPTCHA authentication system has been broken. Read More
To steal your identity, a cybercriminal doesn't have to have direct access to your bank account or other personal information. Read More
Subscribe

Share your small business tips with the community!
Share your small business tips with the community!
Share your small business tips with the community!
Share your small business tips with the community!