Mention cloud computing to a mainframe professional, and he's likely to roll his eyes. Cloud is just a much-hyped new name for what mainframes have done for years, he'll say.
Stories by Tam Harbert
It's a CIO's worst nightmare: a call from the Business Software Alliance, saying that some of the software your company uses might be pirated.
Mention cloud computing to a mainframe professional, and he's likely to roll his eyes. Cloud is just a new name -- and a lot of hype -- for what mainframes have done for years, he'll say.
It's a CIO's worst nightmare: You get a call from the Business Software Alliance (BSA), saying that some of the Microsoft software your company uses might be pirated.
If you're like most IT professionals, you constantly feel as if you should be paying more attention to security. But it's tough to find the time, budget and staff to do the best job possible.
It's 9:00 in the morning, or 3:00 in the afternoon, or even 10:00 at night. Do you know what your users are up to? More than ever, IT managers can answer, "Oh, yes."
When IT services company Dataprise helped a customer with a desktop virtualisation project last year, it found itself dealing with desktop virtualisation's little secret: No one — including vendors — seems to knows how to licence the software.
Web-based email is booming. Services such as Gmail, Yahoo Mail and Hotmail are convenient, accessible and, best of all, free. Many of us have come to rely on them without giving it a second thought.
But second thoughts may be in order, according to security experts, privacy advocates and some webmail users. Few consider the fact that webmail is inherently different than POP3 email. It differs in who administers it and how, in the ways it may be vulnerable to hacking, and in the type of help you can expect when you have a problem.
For example, the most popular webmail services are prime targets of malicious hackers. Some webmail users run into mysterious technical problems that are never explained or solved. And most webmail users never really know where their data is being stored or for how long — or how well it is being safeguarded.
Last summer, Michael Vu, a 40-year-old IT consultant, found himself in a wholly unexpected place.
Firms provide new way to surf Internet wave