Roundtable: Next gen firewalls - when old security isn't enough
How can a reseller make the push to install what is, by some accounts, an essential part of any modern security infrastructure?
How can a reseller make the push to install what is, by some accounts, an essential part of any modern security infrastructure?
Laptops used to be the only devices on the company's wireless network. But Wi-Fi has become a ubiquitous standard used by a host of devices -- including desktop PCs, laptops, netbooks, tablets, smartphones, printers, storage devices, and projectors.
There are more than a few critics of cloud computing, even at PCWorld; I'm probably one of them. But I've been turning over in my mind different perspectives on the cloud. I've tried to set aside the views of the IT executive, who seems to dominate the debate.
Yet another survey is indicating that security is a big issue for those intending to take up cloud computing.
In recent weeks WikiLeaks has been targeted by denial-of-service (DoS) attacks, had its hosting service shutdown, been bounced off of Amazon hosting, had its funding through PayPal, MasterCard and other sources shut down, and its leader arrested on sexual assault-related charges. The fact that WikiLeaks remains stubbornly and defiantly online holds some lessons for other sites when it comes to resilience and survivability.
Just because you don't have a large enterprise doesn't mean you can't run your IT operation like the big guys. Here are seven ways to help your SMB--a small or medium-size business--implement some of the lessons big IT operations have learned over the years. Using these tips, you should be able to improve productivity, cut costs, and keep your business running smoothly.
Innovation Awards is the market-leading awards program for celebrating ecosystem innovation and excellence across the technology sector in Australia.
By Kalyan Madala, CTO, IBM ASEANZK