eweekdev

Five Ways Your Best Employees Can Compromise Your Network … And Not Even Know It

“I’m a small business. No one is going to bother trying to hack my network.” Wrong. In fact, 56 percent of small businesses surveyed by the Small Business Technology Institute had at least one security incident in the previous 12 months. More and more, instead of going after the big boys, cyber-criminals are attacking small […]

A Pragmatist’s Guide to Structuring IT Asset Data

By: Scott Parkin, LANDesk ITSM Product Manager This is a challenge for any business manager, but is especially difficult for IT asset managers in companies where key asset data is spread across multiple applications, departments, disciplines and sources. The IT asset manager needs to aggregate, analyze and act on data from Purchasing, Finance, IT, Service […]

How to Choose Open-Source Telephony

By: David Mandelstam Open-source telephony is a system supporting all types of telephony applications such as PBXes, call centers, interactive voice response systems, chat lines and many other types of voice technologies. They are all based on universally available, free and open-source telephony software such as the Asterisk project. OST runs on standard PC servers […]

How to Take Advantage of Virtual, Online Event Technology

There is little question in the event and trade show space that online events and virtual trade shows are an emerging marketing and lead generation vehicle. According to iCongo CEO Irwin Kramer, this evolving technology allows companies to market their goods and services more effectively by breaking down physical barriers and enabling collaboration between trading […]

How to Use ‘Best Practices’ in Security Incident Management

/images/stories/70×50/bug_knowledgecenter_70x70_%282%29.jpgWhile a security breach is often a surprise, the genesis of how it came about seldom is. Surprise or not, quite often the security breach introduces situations full of complexities that are difficult to synthesize in a timely manner. While all of this is transpiring, so-called “solutions teams” are being built, brought together and introduced […]

How to Integrate People, Processes and Technology

/images/stories/70×50/bug_knowledgecenter_70x70_(2).jpgAs organizations continually increase their dependence on IT systems to conduct business, mitigating IT risk has become a top priority. But effectively managing IT risk is no longer a matter of only addressing technology-it’s now about integrating people, processes and technology. The effectiveness of even the best technology and processes is frequently undermined if employees […]

How to Adopt Unified Communications and Collaboration: Three Phases

By: Bob Hersch The companion to this article (“Launch a Plan for Unified Communications and Collaboration in Three Steps”) suggests taking stock of network readiness, migration approach, and choice of vendors before pursuing a detailed plan and implementation. With this foundation in place, your organization must decide when the time is right to embrace unified […]

How to Launch a Plan for Unified Communications and Collaboration in Three Steps

By: Bob Hersch Despite the wealth of gadgetry at our disposal-phone, e-mail, instant messaging, videoconferencing and diverse software-too often we hit communications gridlock. Colleague X learns of a new sales opportunity with a key client and needs to quickly review a pitch presentation with Colleague Y in New York and Colleague Z in London. This […]

Packet Shaping for the Rest of Us

By: Jorge Abellas “My Internet access is so slow! Do you know what is going on?” If you are an IT manager responsible for Internet connectivity for your SMB (small to midsize business), this is one of the most horrifying questions you can hear from a user-even more so if that user happens to be […]

VMworld 2008: NEC Virtualizes the Workstation

By: Arnaud Dimberton CANNES-Denis Gallon, head of virtualization sales for NEC, discussed VPCC (Virtual PC Center) with eWEEK correspondent Arnaud Dimberton. NEC generates $18 billion in annual revenues, of which it reinvests $5,9 billion in R&D. Wholly dedicated to business to business, NEC is investing massively in virtualization. Tell us about VPCC. VPCC is different. […]