Necessity Is The Mother
If you've spent any length of time supporting users, you know that there is no end to the imaginative workarounds they can come up with when a system goes down and they have work that still needs to happen. Yes, necessity is the mother of invention, or some other kind of mother, but when it comes to e-mail workarounds, the inventiveness of users can cause problems.
And it's hard to quibble with their intent. Businesses can no longer build slack into their schedules as a just-in-case measure wh
It's Just An Operating System
"The operating system doesn't matter." -- Research In Motion Co-CEO Jim Balsillie, keynoting the recent Harvard Cyberposium 11.
It's not the first time such a sentiment has been uttered by executives who find themselves competing against Microsoft. And many, many more of us wish it could be the case but Balsillie and the rest of us know that Microsoft continually makes the operating system matter.
At the core of his argument Balsillie is right. While Research In Motion is running in
Solving The Storage Riddle
Businesses employ a variety of storage services to help them chart their way through proliferating storage options (Originally published in Information Week)
Two Decades Later, We Still Do Windows
It can't be possible. Has it really been 20 years since I took those 5.25-inch floppy disks and loaded a new operating system called Windows, of all things, on my PC/XT clone with the amber monitor, and remarked to myself, "Now What?"
The answer to that question was not immediately forthcoming. In fact, it took a few years to figure out why Windows would ever be important, and perhaps a decade before we all went, "A-ha." Windows in the mid-80s was essentially DOS with a graphical overlay. It ca
Microsoft, Cisco Take Aim at NAT
Microsoft and Cisco have thrown their weight behind the ICE standard, which promises a method of completing VoIP calls in Network Address Translation environments.
Technology Can Help Distinguish Between Control And CONTROL
Controlling the use of the messaging infrastructure is a fight as old as business itself. The challenges today are more complex, to be sure, but essentially unchanged since the Romans, Egyptians, and Babylonians sent teams of runners covering more than 200 miles per day.
We want our communications to be secure, accurate, and limited to the mission(s) of the enterprise. In my own experience, that quest has led to some rather extreme and unsuccessful attempts at control.
I've worked for a compa
A Phishing Top 10 List
In case you are among the lucky few who never get those annoying phishing e-mails—the ones that inform you that your account with an organization that you don't do business with is going to be suspended unless you respond and give them all your personal information— here's the top 10 phished organizations on the Internet, according to data collected by CipherTrust from thousands of customers using its IronMail gateway appliance.
Now these are all reputable organizations that would nev
IBM, ClearCube Offer "Bank In A Box"
The system, designed primarily for bank branches, combines IBM's blade server and PC blade platform, client systems from ClearCube, and services from IBM Global Services in a package that costs
The Worst VoIP Gotchas
It's not as easy as you think to implement VoIP on your network. Here's how to avoid the worst VoIP "gotchas."
Is E-mail Old School. . .
. . . or are IM users still in school? AOL today released the results of its annual Instant Messaging Trends Survey which reported a significant spike in IM usage over last year.
At first blush AOL's survey, conducted by independent researcher Opinion Research Corp. and based on responses from more than 4,000 Internet users in the 20 largest U.S. markets, would seem to fly in the face of comments I made in
You Know It's Getting Bad When . . .
Message technology vendors and service providers: New capabilities and features integrations in the messaging space are fine and dandy but given their druthers, users would opt for just getting rid of the plague of spam/spim and other malware. Even the Holy Grail of the "universal inbox" takes a deep back seat to once-and-for-all locking out all the junk that continuously floods our message servers.
In our most recent reader poll, 85 percent of the readers said they would take a final heave-ho
Six Reasons To Avoid VoIP
VoIP gets all the headlines, but it's not for every enterprise. Here are six reasons why VoIP may not be right for you.
Mobilization By The Dashboard Light
I was chatting today with Paul Fulton, CEO of Orative, a maker of enterprise mobile telephony software, and he said something that got me thinking once again about this whole notion of presence and the intersection of enterprise applications and mobile voice and messaging technology. Fulton mentioned the old separation-of-church-and-state that has kept mobile devices from truly integrating with enterprise communications and data systems: Consumers own the devices; carriers own the networks; and
Japan Demonstrates Next-Gen TV Broadcast
Aiming at next-generation broadcasting, Japan Broadcast Corporation (NHK) has demonstrated a live relay of a 4x x 8k resolution Super Hi-Vision program connecting a 260-km distance by a fiberoptic network
Microsoft Acquires Swiss VoIP Company
The acquisition of Zurich-based Media-streams.com AG will give Microsoft engineering talent, technology, and intellectual property it can apply to products for Internet phone calls that work in conjunction with E-mail,
Your Next IM Could Be Your Network's Last
The rising tide of instant messaging threats will eventually lead to an automated worm that will strike hundreds of thousands of machines in seconds, IM security firms warn
Truth Is Stranger Than (Science) Fiction
FaceTime Communications says it has some good news for you. The company feels so confident about some new patent pending technology that it is offering a "worm-free guarantee" to users of its IMAuditor 6.5. FaceTime's confidence stems from new discovery techniques that utilize behavioral attributes such as message frequency, content matching and URL identification, in addition to traditional threat signatures. T