The managed services business model has redefined the traditional practice of outsourcing essential services.
Having gone beyond the hype, the WiMax ball is finally rolling in earnest.
The second instalment of the 17 rules of CRM deals with the vital role of planning, preparation and implementation.
In future, contact centres will incorporate technology that enables them to silently drive agent actions.
Threat taxonomy or threat classification is the process of grouping threats by their common properties.
Much still needs to be done to ensure a successful outcome for corporate social investment beneficiaries.
The first four of 17 CRM rules collected from executives, managers, employees and consultants.
Enterprise search technology has been expensive, limiting it to the largest of organisations.
Broadband is booming and technology is rapidly converging, giving SMEs more technology choice.
The IT industry goes through constant change, but one thing stays the same: the need for more storage.
Companies cannot conduct data quality projects unless they know where they are headed and the extent of the journey.
Business intelligence projects generally take too long and cost too much, but there is a solution.
Technology has always promised to deliver efficiency, but has fallen short on many occasions.