Avoid lawsuits, penalties, and misunderstandings by clearly defining acceptable use of e-mail for both employees and the enterprise. Define retention periods, set privacy...
|
|
Moves, Adds, and Changes (MACs) can be a big hassle if managed poorly. Control the process to reduce IT support costs and increase end-user satisfaction. Use these tips...
|
|
IT managers with a desire to understand software testing can quickly become overwhelmed by the various types of testing, all seeming equally important. However, when...
|
|
Server virtualization and iSCSI networked storage are emerging as a natural match particularly for small and mid-sized enterprises (SMEs) buying their first storage area...
|
|
Historically, delivering virtual desktops to remote users required a separate connectivity and virtualization infrastructure, but that is starting to change. VMware...
|
|
E-mail archiving adoption should trigger an evaluation of existing e-mail acceptable use policies. Enterprises should establish a clear, explicit understanding with...
|
|
The behavioral interview is the culmination of the recruiting process. It provides an opportunity for the enterprise to get to know a candidate and learn more about how...
|
|
A recent Info-Tech study finds that, despite all the hype surrounding Service-Oriented Architecture (SOA), adoption is limited. Internal integration at a trial and/or...
|
|
Conducting a successful behavioral interview requires careful planning and a process. IT managers who fail to properly prepare risk hiring the wrong person or driving...
|
|
IT organizations are continually challenged by users and senior management to prove they can, and do, deliver a strong value proposition. However, without a clear...
|
|