Mention cloud computing to a mainframe professional, and he's likely to roll his eyes. Cloud is just a much-hyped new name for what mainframes have done for years, he'll say.
Stories by Tam Harbert
It's a CIO's worst nightmare: a call from the Business Software Alliance, saying that some of the software your company uses might be pirated.
Mention cloud computing to a mainframe professional, and he's likely to roll his eyes. Cloud is just a new name -- and a lot of hype -- for what mainframes have done for years, he'll say.
It's a CIO's worst nightmare: You get a call from the Business Software Alliance (BSA), saying that some of the Microsoft software your company uses might be pirated.
If you're like most IT professionals, you constantly feel as if you should be paying more attention to security. But it's tough to find the time, budget and staff to do the best job possible.
It's 9:00 in the morning, or 3:00 in the afternoon, or even 10:00 at night. Do you know what your users are up to? More than ever, IT managers can answer, "Oh, yes."
When IT services company Dataprise helped a customer with a desktop virtualisation project last year, it found itself dealing with desktop virtualisation's little secret: No one — including vendors — seems to knows how to licence the software.
Web-based email is booming. Services such as Gmail, Yahoo Mail and Hotmail are convenient, accessible and, best of all, free. Many of us have come to rely on them without giving it a second thought.
But second thoughts may be in order, according to security experts, privacy advocates and some webmail users. Few consider the fact that webmail is inherently different than POP3 email. It differs in who administers it and how, in the ways it may be vulnerable to hacking, and in the type of help you can expect when you have a problem.
For example, the most popular webmail services are prime targets of malicious hackers. Some webmail users run into mysterious technical problems that are never explained or solved. And most webmail users never really know where their data is being stored or for how long — or how well it is being safeguarded.
Last summer, Michael Vu, a 40-year-old IT consultant, found himself in a wholly unexpected place.
Firms provide new way to surf Internet wave
- Technical Analyst, Cybercrime Operations VIC
- Technical Analyst, Cybercrime Operations ACT
- IT Project Coordinator VIC
- Senior Test Data Management Consultant VIC
- SAP HR / Payroll Analyst QLD
- Business Analyst VIC
- Senior Project Manager NSW
- Senior Business Analyst NSW
- DevOps Engineers x 3 VIC
- Windows 10 Deployment Technician WA
- Free Whitepaper! Learn how to create an analytics environment that is governed, scalable and self-serve.
- Free Whitepaper! The 5 criteria to help you select the right analytics platform for your organization.
- Free Whitepaper! Learn how IT is evolving from producer to enabler, and fostering collaboration around analytics.