The protection of data in remote offices is increasingly recognised as a huge problem for organisations of all types and sizes.
The challenge in implementing open source systems is deciding which is the most effective approach.
PCs that appear to be functioning normally may be lulling users into a false sense of security.
It is essential to give production managers the right tools to manage risk.
Having a great idea is a good start, but efficient processes to back it up are key to success.
With new network security challenges, the correct approach is to make security architecturally inherent.
E-government seeks to deliver a number of benefits, but these efforts are hampered by an old and fickle servant: data.
It is no longer enough to develop powerful, bug-free applications that meet current business requirements.
Critics of open source's place in the enterprise were previously overly vocal but have since faded into the woodwork.
Of all the elements that make up successful software testing, only two are essential.
Effective content management should be a concern no matter the size of the enterprise.
The automation of wireless network configuration has long been possible only with the use of proprietary vendor solutions, but that is all changing.