Jump to the cloud with IBM, literally

[Sponsored] The IT heroes of mid-size organizations may often feel like they're jumping through hoops as they work to find the best technology platform for their business to run on. IBM Corp. wants

Published on: June 9th, 2014 ITBusiness Staff

Dos and don’ts of project management: part 2

In my previous blog on project management, I talked about project planning. In this blog I will be talking about managing risks and dependencies. In order to deliver a project on time, it

Published on: April 15th, 2013 Catherine Aczel Boivie

Number of crowdfunding sites jumped 60 per cent globally in 2011

Startups around the world raised $1.8 billion through 453 crowdfunding sites in 2011, a British report says.The number of crowdfunding sites grew by 60 lastyear, topping growthof 38 per cent in 2008, according

Published on: July 16th, 2012 ITBusiness Staff

Taking stock of Facebook’s flaws at 500 million users

Facebook has a huge problem. No, it's not privacy, security, application spam or even horrible P.R. from the upcoming movie, "The Social Network." These are short-term annoyances for the company, but not existential

Published on: July 23rd, 2010 Mike Elgan

Five major cloud computing liability factors and how to deal with them

It was an embarrassing moment for the world's most famous cloud-based enterprise. In May 14 this year Google suffered a widespread outage that crippled the search engine's hosted Google Apps services including Gmail,

Published on: July 3rd, 2009 Nestor Arellano

One-third of employees willing to steal company data if the price is right

More than one third of employees would steal sensitive company information if they thought they could earn a decent price from the theft, says Infosecurity Europe. Research by the security event organizer revealed

Published on: April 27th, 2009 Carrie-Ann Skinner and Jeremy Kirk

Malware menace growing – and what you can do about it

Large businesses using social networking tools are vulnerable to far greater security attacks than their systems are equipped to handle, say Internet security experts.In addition Web-based technologies such as VoIP (voice over Internet

Published on: May 16th, 2008 Nestor Arellano