Best Practice stories - Page 67
Mitigating the risks of non-proprietary software in the enterprise
Tue, 25th Jan 2011
#
open source
#
smb
#
mindjet
Enterprises leveraging non-proprietary software must navigate quality, security, and support pitfalls to sustain growth.
Year of the cloud
Sat, 1st Jan 2011
#
digital entertainment
#
software development
#
tvnz
2010: The year cloud computing reshaped our technological landscape, promising efficiency but raising crucial security queries.
Mobile whizzkids
Wed, 1st Dec 2010
#
martech
#
software development
#
javascript
A consumer survey reveals that poor mobile web performance can harm retailer reputations. Amazon and Walmart excel, but many lag behind. Here's how to improve.
Dynamic, sophisticated and potentially deadly - Imperva details security trends for 2011
Wed, 17th Nov 2010
#
document management
#
ecm
#
martech
Imperva reveals top 2011 security trends, highlighting threats from mobile devices, cloud data security, and social network privacy.
Tomorrow's too late
Fri, 1st Oct 2010
#
iaas
#
analyst report
#
retail
Hours may as well be days in data recovery land. We want instantaneous back-up post systems outage and we want it now.
New Plymouth re-signs Juniper
Wed, 15th Sep 2010
#
network infrastructure
#
juniper networks
#
network management
New Plymouth District Council renews its data centre with Juniper, deploying advanced networking solutions to enhance service reliability for 70,000 residents.
Going postal
Wed, 1st Jul 2009
#
email security
#
email
#
vps
Amid the rise in email threats, experts highlight the crucial need for robust security and best practices for mail server setup.
Top ten reasons for your customers to use Windows Essential Business Server 2008
Sat, 1st Nov 2008
#
datacentre infrastructure
#
microsoft
#
cloud services
Designed for mid-size business EBS 2008 brings together the series of Microsoft technologies that mid-sized businesses need most.
Why perimeter security is not enough
Wed, 1st Oct 2008
#
ddos
#
risk & compliance
#
wireless networks
Mark Edmead stresses that effective security encompasses processes and people, not just tech, challenging outdated perimeter-focused strategies.
Your data is at risk
Mon, 1st Sep 2008
#
data analytics
#
martech
#
planning
There is no escape and your data is at risk. Here is my challenge to you. Rethink the way you transfer information.