Often a departmental business manager submits a request to the IT organization for a new server to host a critical business-intelligence application. The request itself is unremarkable; after all, it is common for a business unit to ask IT to deploy additional hardware infrastructure to support their application requirements. However the company may have multiple […]
Posted on March 5th, 2010 by admin
Filed under: Uncategorized | 250 Comments »
Google Goggles could violate your privacy without your knowing it. Goggles lets you send photos of a business card, book cover or even bar code from your Android-based smartphone to Google for quick identification and data manipulation. Now if that software is extended to include photos your personal privacy could be impacted. The way it […]
Posted on March 5th, 2010 by admin
Filed under: Uncategorized | 260 Comments »
As of January 1, 2010, all organizations with operations and/or customers in the state of Massachusetts are required to follow comprehensive information security requirements regarding both paper and electronic records containing personal information. These requirements include enforcing password security, encrypting all personal information stored on laptops and removable devices and ensuring up-to-date firewall protection, operating system […]
Posted on March 5th, 2010 by admin
Filed under: Uncategorized | 4 Comments »
Fringe benefits are cut by most entetprises. Health insurance is the only benefit that has reamined. Companies have started to cut back on the fringe benefits provided to IT Professionals. For example in January of 2008 95% of IT professionals had health insurance supplied by their employers while in June 2009 only 88% did. […]
Posted on March 5th, 2010 by admin
Filed under: Uncategorized | 239 Comments »
The IT job descriptions contained within the Internet and Information Technology Position Descriptions HandiGuide® was updated in 2010 and contains over 650 pages; which includes sample organization charts, a job progression matrix, over 231 job descriptions, best practices for resume screening and best practices for phone screening. The author of this book has extensive experience […]
Posted on March 5th, 2010 by admin
Filed under: Uncategorized | 251 Comments »
It was reported in Computerworld that Google apologized after it mistakenly e-mailed potentially sensitive business data last week to other users of its business listings service. The company’s Local Business Center allows businesses to create a listing for Google’s search engine and Maps application, as well as add videos, coupons or photos. Google then provides […]
Posted on March 5th, 2010 by admin
Filed under: Uncategorized | 244 Comments »
Job cuts in technology were fierce in 2009, but 2010 is expected to see modest growth in a number of subsectors. The last time layoffs were this bad was in 2005. Job cuts in technology were fierce in 2009. Last year saw 174,629 jobs lost in the sector, catapulting up 12.3 percent from the 2008 […]
Posted on March 5th, 2010 by admin
Filed under: Uncategorized | 241 Comments »
Everyone knows that police can peek inside an email account it if they have a paper search warrant But cybercrime investigators are frustrated by the speed of traditional methods of faxing, mailing, or e-mailing companies these documents. They’re pushing for the creation of a national Web interface linking police computers with those of Internet and […]
Posted on March 5th, 2010 by admin
Filed under: Uncategorized | 256 Comments »
U.S. defense contractors growing use of offshore (outsource) subsidiaries from 2003 to 2008 allowed the Defense Department to save money on contracts but also resulted in the loss of U.S. tax revenue and unemployment benefits for some U.S. workers, according to a new report from the Government Accountability Office. Practical Guide for IT Outsourcing a […]
Posted on March 5th, 2010 by admin
Filed under: Uncategorized | 247 Comments »
The key service management business questions facing CIOs and senior IT managers today are: What are the service management impacts with the ever-increasing technical complexity on margins and customer satisfaction? Where are the areas where margin-improvement opportunities exist? How can IT minimize the maintenance-contract price pressure to drive new service-revenue opportunities to the bottom line? […]
Posted on March 5th, 2010 by admin
Filed under: Uncategorized | 237 Comments »