Security is changing: smart clients and remote working mean that the security perimeter is getting closer to the server. How will you protect your clients’ networks tomorrow?
Storage is cheap and it’s easy to create documents, so most companies have tens or hundreds of thousands of documents on the computers in their companies. So how do your customers find a document on a particular topic? The worrying answer is probably that they can’t...
The lowest price isn’t always the best value; paying a little extra for a notebook that’s designed for business could be a better deal.
MAC spoofing is one of those odd tricks: it’s not very useful most of the time (and it can be extremely awkward in a well-managed environment) but sometimes it’s the only technique that will solve the problem.
Once considered a fad for teenagers, social media tools have become accepted components of any business’s marketing strategy. Dell is on Facebook; SAP is on LinkedIn; IBM has a large presence on the animated virtual world Second Life. Should you be there, too?
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010