The headlines are full of worry about inflation. A few politicians in the U.S. (and elsewhere) are accusing the Fed of feeding inflationary fires through "QE II," the...
|
|
For most companies, the IT Strategy process is straightforward and revisited on an annual basis. It's wise to begin this process by setting the parameters of the IT strategy.
|
|
IPv4 addressing is the technical underpinning of today's Internet, but the Internet of the future is already being built using IPv6. Organizations need to execute a...
|
|
October 2010 saw the introduction of a new version of the payment card industry data security standard (PCI DSS). Understand the implications of changes within PCI DSS 2.0...
|
|
I am writing to you today for two reasons. First, because until these announcements, you seemed to understand the China Model and its one-sided intentions. And second,...
|
|
Organizations engaged in a backup architecture redesign must align their architecture with business properties and requirements to minimize costs, while ensuring adequate...
|
|
This is an unprecedented time in U.S. education, and awareness that we have a problem has never been higher. Billions of dollars of public and private money are lined up...
|
|
A friend of mine gave the gift of a new Kindle for Christmas. Being the thoughtful type, he told the recipient he would leave it on his own Amazon account, and that she...
|
|
(25-Jan-11) Business people contemplating technology purchases today rely heavily on online forums, communities and blogs to do their research. Most purchasers use mobile...
|
|
Each organization will have different priorities for the use of Software Assurance (SA). Use this tool to calculate the true dollar value of SA to build your business case...
|
|