Taking Dell private is a bold move, but won't ensure success. If you can't recognize opportunities and execute properly as a public company, buying yourself shelter from investors only takes you so far. The bigger challenge will be rejiggering the corporate culture and core processes to make more innovation possible.
corporate issues - News, Features, and Slideshows
Four things are clear from Cisco’s better-than-expected Q1 FY 2013 results:
Tech vendors have been as bombastic as ever promoting the magical and amazing things their latest smartphones, cloud computing wares and network gear can do. When things go wrong, they're naturally a little less visible, but plenty of companies have sucked it up and done the right thing this year (perhaps with a little legal prodding here and there) and publicly apologized for minor and major customers inconveniences.
Just because you don't have a large enterprise doesn't mean you can't run your IT operation like the big guys. Here are seven ways to help your SMB--a small or medium-size business--implement some of the lessons big IT operations have learned over the years. Using these tips, you should be able to improve productivity, cut costs, and keep your business running smoothly.
Everyone knows that there's a correct way to carve poultry into parts. In fact, basic carving methods haven't changed much since the time of the Roman Empire a couple of thousand years ago. If you want to be considered a great cook, you need to learn these ancient lessons. For chickens, it usually sounds something like this:
With the economy struggling and financial markets in a state of chaos, this is becoming a hard time to be an IT manager.
What do you get when you add the human propensity to screw stuff up to the building of large-scale IT systems? What the military calls the force-multiplier effect -- and the need for a cadre of top-notch QA engineers.
US military strategists, CIA analysts, international agency officials and Nobel Prize winning economists concur with the consensus of the world's scientific community: the Climate Crisis is a planetary security issue, as well as a national security issue for each of the one hundred ninety two countries that belong to the United Nations. But the Climate Crisis is also, by extension, a corporate security issue, as well as, yes, a cyber security issue.
It was 9:30 on the morning of March 4, 2002, and something was terribly wrong at the offices of PaineWebber UBS. Computers in branches all over the country began showing disc errors. A logic bomb buried deep within the machines had wiped their hard drives clean, preventing 17,000 brokers from making trades.
A new report warns that the cost from lost productivity at work related to the new NFL season could add up to US$10.5 billion. And there we were, thinking the biggest waste of time at work came from fielding an endless stream of IT industry reports?
Back in 2004, InfoWorld's then-CTO Chad Dickerson polled the best and brightest to reveal 20 IT mistakes that were surefire recipes for cost overruns, missed deadlines, and in some cases, lost jobs.
Not long ago, the legal department at a financial services company in New York got a phone call from a hospital in London. The query: Why are you hacking us? With two known IP addresses, it wasn't difficult for the financial firm's information security staff to go back through the logs looking for traffic between the two organizations. And with the traffic identified, locating the computer from which the hacks were taking place didn't take long, either. The culprit: an individual who-as their human resources records soon confirmed-had formerly worked at that very hospital.
Picture in your mind the facilities management guy or gal in your building: Are you envisioning someone in a pair of overalls and a screwdriver tucked in the back pocket?
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- Join Skeeve Stevens, Stanley Shanapinda, and more on how to manage metadata to maximise your ability to detect and prevent an attack. Register
- New Destination Gigamon Security Resources IS HERE
- Ransomware explosion is the latest security wakeup call for CxOs
- The Future is Encrypted. Manage It.
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- CLOUDSEC2016 - Timothy Wallach, Cyber Taskforce FBI (USA) speaks on the status & evolution of global cybercrime. Save your seat
- Test Your Knowledge of Network Encryption
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- See Your Traffic for What It Really Is
- Join special guest Jeff Lanza, Retired FBI Agent (USA), Ty Miller, Mark Gregory & Andy Solterbeck for a discussion on ransomware security
- Caution: That SSL Blind Spot is Growing