Monday, September 26, 2011
|
|
MUST READ5 Things We Know About Amazon's Kindle TabletBy Eric ZemanAmazon is holding a press conference in New York on September 28, and will likely introduce the Amazon Kindle tablet. Here's what we know.
RELATED • Take Charge Of Your Mobile App Strategy • 10 Mobile Security Vendors To Watch
Corporate Espionage's New Friend: Embedded Web Servers Many types of Web-connected photocopiers, scanners, and VoIP servers have no default passwords or other security enabled to stop remote eavesdropping.
Liferay Portal Adds Social Features, Marketplace Open source Java portal LifeRay 6.1 improves social capabilities, welcomes app developers.
IBM Tops Oracle, HP In Data Center Win Indian engineering giant Escorts Group opts for Power systems over PA-RISC, Exadata, as part of a technology refresh.
Facebook Looks Beyond Like, But Not Far Enough Facebook says it's defining a new language for how people connect. In this limited language, you are what you eat, watch, read, and buy.
How Yammer Helps ReachLocal Reach Farther Web marketing company adopted Yammer's enterprise social networking to hold the organization together during period of rapid growth.
How To Fix The Personal Health Record Mess So few Americans are interested in creating a digitalized PHR that Google had to close its service. But there are ways to get the public interested.
ECM Reaches For The Clouds IT doesn't have to give up content management features when users adopt online storage and document sharing.
|
|
|
|
|
|
DOWNLOAD OUR DIGITAL SUPPLEMENT ON ECM Most companies have little control over their heaps of unstructured data, our research reveals. It's time for an enterprise content management strategy.
ALSO: Kurt Marko looks at the latest tools for integrating content management with online storage and file-sharing sites.
DOWNLOAD NOW (Registration Required)
|
|
ANALYTICS & WHITEPAPERS
MOST POPULAR NEWS
5 Things We Know About Amazon's Kindle Tablet Amazon is holding a press conference in New York on September 28, and will likely introduce the Amazon Kindle tablet. Here's what we know.
10 Massive Security Breaches They make the news on a regular basis: incidents in which a company or government agency's security is breached, leading to a loss of information, personal records, or other data. There are many ways to measure the size or cost of a security breach. Some result in the loss of millions of data records, some affect millions of people, and some wind up costing the affected businesses a lot of money. Not to mention, the questions of you calculate the value of personal medical information vs. credit card numbers. Here are ten security breaches of epic scale, plus one "bonus" incident that ranks among the boneheaded moves of all time.
12 Brawny Business Intelligence Products For SMBs Business intelligence isn't just for the big boys anymore. Check out our short list of star SMB options, from easy-to-deploy SaaS choices to affordable versions of the biggest BI suites.
20 Innovative IT Ideas To Steal InformationWeek 500 innovators have creative solutions to not-so-unusual business problems. How can these help your company?
Gmail Add-On Boosts Support Features The Shared Inbox add-on for Google Apps Business accounts is designed to provide improved help desk and customer support ticket features for businesses using Gmail as their main communications platform.
WEBCASTS
7 Types of Power Problems IT Security Professionals or Mobile Administrators should attend this LIVE webcast to learn how to identify users connecting personal devices to the network, protect enterprise data through Apple security policies and enforce application whitelists/ blacklists on any iOS device It Happens Wednesday, October 5, 2011 -- Time: 10:00 am PT / 1:00 pm ET More Information & Registration
|
|
|
RESOURCES AND EVENTS
|