A few years ago, there was lots of excited chatter about how we were on the brink of becoming a paperless society. No longer would offices be cluttered up by reams of reports. Faxes would be replaced by electronic communiques. Even items that it seemed would have to be printed because they required a physical signature would disappear as we learned to trust digital signatures on e-mails.
OK, you're in the home stretch. You've issued your telecom RFP, assessed the responses and concluded your contract negotiations. You've got rates you can live with and services that represent a net improvement over what you're getting now. You're done, right?
Techies usually hate dealing with sales folk, because we seem to come from different worlds. Engineering is about honesty: Either that bridge will hold or it won't. Sales is about deceit (or so we geeks assume): Lie to the customer and cash the commission.
For many moons now, PC publications have talked about ways to connect devices wirelessly. As far as wired connections went, innovations have seemed thin on the ground. However, a way of physically connecting devices using something called Powerline -- a concept that has been around for three or four years -- is now making its presence felt in the U.K.
The 2.6.19-rc4 prepatch release did not go quite as well as the developers might have liked; some confusion over the return type for an internal function led to an undesirable mixing of pointer and integer types in the depths of the block layer. As it turns out, gcc noticed this problem and duly issued warnings about it, but nobody saw them before the mistaken patch was merged and the resulting kernel shipped. This is, in other words, a problem which should have been easily avoidable.
Businesses of all sizes today are graduating from the first stage of Internet use, dominated by e-mail, to a new stage characterized by increasing use of the Internet for research and of instant messaging (IM) to supplement telephone and e-mail for communications both inside the company and with clients and business partners.
If you have given your trusted employees and key contractors remote access to your network via a client virtual private network (VPN), congratulations! By now, you have seen the productivity and cost benefits from allowing collaboration that surmounts geographical separation.
Blocking Web site access to overly curious users in an open environment poses policy and technical challenges. You can meet the challenge with simple tools and target the result to a selected audience.
Thinking about disaster recovery, a year after Hurricane Katrina, and on the fifth anniversary of 9/11, it's a good idea to look at contingency planning, especially for the organizations that would need to operate during a disaster. This is a different issue than transferring operations to a remote site. There are various issues in operating in a disaster environment, usually starting with electrical power but also extending to employee concerns and the need for resupply.
We do a lot of work on our sites to ensure that our readers can find our content through search engines, particularly Google. Over the 10 years we've been publishing media Web sites we've successfully avoided pitfalls that could damage referrals from search engines. We've also made some significant mistakes - from which we've recovered! Consequently we thought we would share the experience we've gained by putting together our definitive top ten list of mistakes that can damage your referrals from Google (we'll let you guess which ones we were guilty of).
Say you wanted to protect your Wi-Fi network from surrounding buildings. The most obvious way to do this would be to secure the devices on your network using the wireless security protocol of choice. A very effective, but more extreme, way to do this would be to secure the building itself by making it act as a Faraday cage, shielding the radio frequency waves used by Wi-Fi.
A few years back, I used an old 486 running Red Hat Linux and tcpdump to easily diagnose a client's denial-of-service attack, illustrating the benefits of creating a powerful network analysis tool from "scrap" parts. There are plenty of tools to build a similar Windows-based network analyzer, but Linux can run on machines that can't efficiently run Windows.
Buyers of Wi-Fi equipment and systems must be assured that all products have the performance and stability to carry mission-critical applications and data. However, testing of Wi-Fi, or 802.11, devices and systems for performance and stability is a challenge for the industry because of the complexity of the 802.11 protocol. That is compounded by the inherent mobility of the wireless devices and the prevalence of radio frequency interference.
In order to achieve success with omnichannel customer experience strategy, companies need to utilise user personas, while maintaining excellence across all channels, according to customer transformation service expert, Brad Starr.
Copyright 2015 IDG Communications. ABN 14 001 592 650. All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.