Ben Kepes has a post up discussing the dangers of Rogue IT and why IT departments don’t like to say no, but have to. Illustrating with examples of Rogue IT, Ben’s conclusion is that both sides – IT and business users – should talk and understand each other’s position, a detente if you will. But ..
Web monitoring solutions are used to monitor web site access. That is a given. But what if the data being collected does not represent a true and fair view of a user’s activity online? In the case of social websites such as Facebook, Twitter and Linkedin, no web filtering solution shows an accurate view of ..
Why are people surprised that the market for tablets, i.e., iPad, is exploding? Tablets don’t get viruses, don’t need patching, don’t slow down, don’t need defragging – they just work. And if you think mobile is new market, think again – how many iPad and iPhone viruses made it into the wild? Here’s a safe ..