|How to Craft Content that Gets You Hired and Promoted
As organizations increasingly rely on intranets, portals, blogs and wikis to disseminate business information to employees, they need technology professionals who can write concise, clear and engaging prose.
Dice (December 10, 2008)
More "Safe" Jobs for the Downturn
It always pays to prepare for the worst.
Dice News (November 25, 2008)
Ten Tech Jobs You’ve Never Heard Of
Some of today’s hottest IT jobs are virtually unknown.
Dice (November 19, 2008)
Integrating Your Cloud And On-Premises Applications
Software-as-a-service levels the playing field for small and midsize businesses, but what about all of those on-premises apps you're not ready to ditch? Can they play together? Companies including Boomi, Cast Iron, and SnapLogic are working to bring the cloud down to earth.
bMighty.com (October 13, 2008)
Running Your IT Infrastructure In The Clouds
Software-as-a-service applications are bringing enterprise-level functionality to small and midsize businesses, often with greater reliability and at lower cost than packaged alternatives. Could on-demand IT infrastructure, procured via the cloud, be next?
bMighty.com (October 6, 2008)
Running Your Business In The Cloud
The lure of cloud computing is obvious: freedom from managing applications, platforms, and infrastructure -- abstracting IT complexity to the point where it just works and, often, at a much lower price than running or hosting it yourself. That appeal has spawned a growing, vocal contingent of cloud computing "completists" who are more than happy to surrender their IT concerns to the cloud.
bMighty.com (September 29, 2008)
Home Security Gets A Web Makeover
Forget the closet control panel, today's Internet- and smartphone-enabled home security systems allow browser-based management, SMS updates, live video feeds, and money-saving DIY options.
InformationWeek (September 13, 2008)
Privacy Skills Can Boost Your Career
Driven by continued data breaches and new regulations, the demand for privacy professionals continues to increase.
Dice (July 31, 2008)
Classify This! 10 Best Practices to Jumpstart Your Data Classification Program
Many CIOs dream of applying automated classification to any data generated in the enterprise in hopes of ensuring scarce security resources will protect its most sensitive data.
ITPolicyCompliance.com (July 7, 2008)
Stopping Bullies at Work
Studies find bullying is alive and well in the workplace. Learn strategies for coping.
Dice (May 30, 2008)
Powerful Enterprise Software Small Biz Can Afford
The latest "software-as-a-service" applications are worth a good look. Reprint.
Forbes.com (May 21, 2008)
SaaS: Enterprise Power Comes to Smaller Businesses
Before Software as a Service, the latest and greatest business applications -- ERP, CRM, HR, and financial packages -- were restricted to large enterprises able to pay for and manage them. But SaaS delivers this power to smaller businesses
bMighty.com (May 13, 2008)
ID Theft Monitoring Services: What You Need To Know
Fee-based services say they'll protect your identity, privacy, credit, name, and more. Find out what they can and can not do -- and learn what you can do to defend yourself.
InformationWeek (May 9, 2008)
|Buh-Bye Groupware: The Rise of Lightweight Collaboration Tools
A number of new collaboration tools enable smaller businesses to collaborate and share data in real time, without the typical costs or IT management overhead. Learn how companies are putting them to work.
bMighty.com (April 30, 2008)
|Should You Hire A Convicted Hacker?
Cisco and many other majors won't employ any ex-cons; nevertheless, security experts from the dark side are finding their expertise is in quiet demand.
InformationWeek (March 11, 2008)
PCI compliance lagging in Europe
European companiesí PCI compliance levels appear to be markedly lower than their business counterparts in North America. See how the experts explain the difference
ITPolicyCompliance.com (February 29, 2008)
Reboot Your Records Retention Strategy
Under the Federal Rules of Civil Procedure (FRCP), organizations must demonstrate that their electronic information is complete, accessible, and reliable. As a result, companies must formalize their retention management strategy and rapidly put in place the organizational and technological changes required to retrieve any given record.
IT Compliance Institute (January 15, 2008)
10 Database Security Tips For Smaller Businesses
The typical small and midsize business builds and administers its databases for performance and high availability -- not security. Make sure your database doesn't bite back
bMighty.com (January 14, 2008)