If you're over budget this year, your BYOD policy may be to blame.
My – how research has changed in the 20 years I have been working in IT and high-tech! Normally, you would have to scour reams and reams of articles in trade rags delivered via snail mail to find information relevant to your work. Now we have the ability to set alerts, custom feeds and create targeted searches to find many more ‘diamonds in the rough’ than was even possible 10 years ago.
Imagine if your WhatsUp Gold expert simply stopped showing up for work. What’s your Plan B? What is your backup plan for their sudden or even planned absence?
Did you know that this year the number of Wi-Fi connected devices will exceed the world’s population? With the growing number of Wi-Fi connected devices, there have been more and more public Wi-Fi networks created. Nowadays, whether you are in a coffee shop or train station, there is probably a public Wi-Fi in your general area.
There has been a lot of buzz around WAN optimization over the past few months, with numerous mentions of what WAN optimization is and what it brings to the table. On the surface, it is certainly a cool technology, but it is a technology that requires some additional thought before implementing. It is certainly another great tool in the network managers arsenal.
Breach, which is set for release in a few weeks, focuses on the true story of an FBI upstart who must investigate his boss who is suspected to be selling secrets to the Soviet Union. For those of you who read the story in paperback or in weekly new journals, a strong lesson materializes in a story early on that is applicable to the numerous breaches we have heard about at TJX and other retail and insurer organizations. Regardless of how strong and robust your physical and digital security plan is, the success or failure of the plan more likely will lie with the human capital charged with installing, managing and watching the systems.
Get our latest blog posts delivered in a monthly email.