Free as Freedom, not Free as Free Pizza!” />

-

Udruženje Informatičara BiH - Cross-platform and Portable Development With PHP, LAMP/WAMP development, AJAX and Javascript, ASP, dot NET, C sharp, C++, C, VB, Oracle, tutorials and tips...
Free as Freedom, not Free as Free Pizza!


 
Web http://www.uibih.co.nr

Add to Google

Tuesday, December 26, 2006

OSDL's Portland Project Helps ISVs Port Products to Linux

Community collaboration eliminated differences in desktop environment installation and runtime capabilities that were keeping ISVs from Linux.

Visit IT Business Edge for the OSDL's Portland Project Helps ISVs Port Products to Linux interview.

[more]

'Selfish' Archive Strategy Key to Compliance for the SME

Focusing first on their specific business needs will help SMEs develop effective archiving strategies that meet compliance requirements.

Visit IT Business Edge for the 'Selfish' Archive Strategy Key to Compliance for the SME interview.

[more]

Small Devices, Big Dangers

Some Apple iPods have shipped with Windows viruses. The takeaway is that portable devices with large and, in some cases, removable storage repositories are becoming more common in the enterprise.

Visit IT Business Edge for the Small Devices, Big Dangers interview.

[more]

Cable Operators' Aggressive Outlook

The cable industry -- through the confederation of four major operators and Sprint Nextel -- is on the verge of becoming a player in cellular and creating a national footprint that will allow it to compete with incumbent long-distance carriers.

Visit IT Business Edge for the Cable Operators' Aggressive Outlook interview.

[more]

Corporate Wikis — ECM Alternative?

When people think of wikis, they think of Wikipedia. Corporate wikis are a lot different.

Visit IT Business Edge for the Corporate Wikis -- ECM Alternative? interview.

[more]

Simplified Backup

Separating backups into individual recovery images allows quick restoration.

Visit IT Business Edge for the Simplified Backup interview.

[more]

Management Drives up Costs of E-Mail Archives

Hosted e-mail not necessarily cheaper for large shops, but scale offers some advantages.

Visit IT Business Edge for the Management Drives up Costs of E-Mail Archives interview.

[more]

The Case for Open Source Indemnification

OpenLogic is offering open source indemnification because that's what its customers are asking for.

Visit IT Business Edge for The Case for Open Source Indemnification interview.

[more]

Open Source: The Wave of the Future

VCs don't mind pouring money into open source companies -- especially when their products are in great demand and they have strong communities behind them.

Visit IT Business Edge for the Open Source: The Wave of the Future interview.

[more]

Planning for Data Breach Notifications

Data breach notification plans should be extensions of existing data security protocols and should involve legal and HR departments as well as the data managers.

Visit IT Business Edge for the Planning for Data Breach Notifications interview.

[more]

Microsoft, Security Vendors Get to the Kernel of the Matter

Microsoft, which recently began selling stand-alone security products, is in a battle with established security vendors over future access to the kernel of the 64-bit version of Windows Vista.

Visit IT Business Edge for the Microsoft, Security Vendors Get to the Kernel of the Matter interview.

[more]

Cable Operators' Quiet Telecommuter Play

The cable industry is quietly introducing expanded services for telecommuters.

Visit IT Business Edge for the Cable Operators' Quiet Telecommuter Play interview.

[more]

On the Road to Data Management

Master data management (MDM) can be implemented without a tremendous amount of disruption, provided you take it in steps and have a clear plan of what you want to accomplish.

Visit IT Business Edge for the On the Road to Data Management interview.

[more]

Business Process Management: Strategy vs. the Dashboard

For successful BPM, focus on decision support, not flashy dashboards.

Visit IT Business Edge for the Business Process Management: Strategy vs. the Dashboard interview.

[more]

Open Source Systems Management Offers Flexibility

Open source works for systems management in part because you don't have to wait for the vendor to release management tools for new technology.

Visit IT Business Edge for the Open Source Systems Management Offers Flexibility interview.

[more]

Is Security Good Business as Well as Good Sense?

Corporate security always has been something of a poor stepchild. Executives realize it's important, but traditionally have under-invested in it because it's not a profit center.

Visit IT Business Edge for the Is Security Good Business as Well as Good Sense? interview.

[more]

Creating a Compliant Mobile Workforce

Compliance requirements cover all of the network, including the pieces that come and go.

Visit IT Business Edge for the Creating a Compliant Mobile Workforce interview.

[more]

Beyond Pilot SOAs

SOA advice: Control the development process.

Visit IT Business Edge for the Beyond Pilot SOAs interview.

[more]

Putting the Brakes on Virtual Sprawl

Virtual sprawl is turning into the new bugaboo for IT managers.

Visit IT Business Edge for the Putting the Brakes on Virtual Sprawl interview.

[more]

New E-Discovery Rules Will Change Document Management

Better organization and enterprise-wide archiving and search capabilities are the keys to compliance with the new e-discovery rules.

Visit IT Business Edge for the New E-Discovery Rules Will Change Document Management interview.

[more]

VoIP: Full Steam Ahead ... Slowly

With VoIP, bigger companies don't have much to gain from long-distance savings, since their pricing already was low.

Visit IT Business Edge for the VoIP: Full Steam Ahead...Slowly interview.

[more]

The Webmail Threat

Companies are concerned about the security of corporate e-mail. In most cases, however, companies aren't attentive to the parallel threat of Webmail.

Visit IT Business Edge for The Webmail Threat interview.

[more]

Federated CDI: When Is It Right?

Federated CDI makes a lot of sense when you're looking for up-to-the-minute information, and having a single version of the truth may not always be necessary However, for predictive analysis, the conventional data warehouse is the way to go, says Ron Schumacher of Initiate Systems.

Visit IT Business Edge for the Federated CDI: When Is It Right? interview.

[more]

Semantic Web Already Here

Enthusiasts talk about the coming of the semantic Web, but in many practical ways, it's already here.

Visit IT Business Edge for the Semantic Web Already Here interview.

[more]

Microsoft, Novell Should Rethink Their Patent Pledge

If Microsoft believes Linux code infringes its patents, the company should simply ask the "suspect" coders to cease and desist, says a leading Linux community site editor.

Visit IT Business Edge for the Microsoft, Novell Should Rethink Their Patent Pledge interview.

[more]

Security Strategy: Big Problems First

Software does a good job of finding and cleansing viruses and detecting and blocking intrusion attempts. The next step is to develop systems that prioritize threats.

Visit IT Business Edge for the Security Strategy: Big Problems First interview.

[more]

Verdict on WiMax: Slow Going, but Great Promise

WiMax won't take the world by storm. Instead, the landscape will be shaped by slow and incremental growth.

Visit IT Business Edge for the Verdict on WiMax: Slow Going, but Great Promise interview.

[more]

Which Way Toward Enterprise Mobility Infrastructure?

Enterprise mobility offers tremendous benefits, but is exceedingly difficult to implement. But there are ways in which multiple scenarios can be plotted.

Visit IT Business Edge for the Which Way Toward Enterprise Mobility Infrastructure? interview.

[more]

No More Hula for Novell

Novell strives to cultivate open source rather than fragment the efforts of the community.

Visit IT Business Edge for the No More Hula for Novell interview.

[more]

Real-Time Information in the Factory

Manufacturing systems have been dealing with mountains of data for years. And they're getting smarter than ever.

Visit IT Business Edge for the Real-Time Information in the Factory interview.

[more]

Protecting Endpoints

The increasingly complex array of mobile devices, their greater capacity, and the sophistication of online criminals mean that organizations must pay as much attention to endpoints as they do to the perimeter.

Visit IT Business Edge for the Protecting Endpoints interview.

[more]

Good Days Ahead for Mobile E-Mail Providers

Mobile e-mail is on the cusp of great change as mid-level employees, "prosumers" -- employees able to buy equipment and use services without corporate signoff --and consumers broaden the market.

Visit IT Business Edge for the Good Days Ahead for Mobile E-Mail Providers interview.

[more]

The Art of Virtual Blade Management

Virtual blades are turning into the solution of choice for Web hosting services, but they represent a significant management challenge.

Visit IT Business Edge for The Art of Virtual Blade Management interview.

[more]

Save Money with Fewer Controls, Less Complexity

World-class companies' finance costs are a smaller percentage of revenue than other companies because they were poised to recover from Sarbanes-Oxley implementation more quickly.

Visit IT Business Edge for the Save Money With Fewer Controls, Less Complexity interview.

[more]

Biometrics Recognizes Its Promising Future

A key area of biometrics development is "frictionless" approaches that check identity without requiring the subject to do anything.

Visit IT Business Edge for the Biometrics Recognizes Its Promising Future interview.

[more]

Match, Surpass PSTN Voice Quality: Sounds Like a Plan for VoIP

In order for VoIP to succeed, the quality of the end-user experience must at least match that of legacy networks.

Visit IT Business Edge for the Match, Surpass PSTN Voice Quality: Sounds Like a Plan for VoIP interview.

[more]

Practical Approaches to Disaster Recovery

Major natural disasters get the lion's share of attention, but there is a multitude of smaller events that often go unnoticed though they can cause severe network disruption.

Visit IT Business Edge for the Practical Approaches to Disaster Recovery interview.

[more]

Change Doesn’t Come Easily for ITIL

Change is rarely an easy thing. That's certainly proving to be the case with a refresh of the IT Infrastructure Library (ITIL).

Visit IT Business Edge for the Change Doesn't Come Easily for ITIL interview.

[more]

Java Open Review: Fixing the Bugs and Filling the Holes

Software isn't complete until it's secure, says Brian Chess, and the Java Open Review project gives Java developers another set of eyes on their code to help them avoid security gaps.

Visit IT Business Edge for the Java Open Review: Fixing the Bugs and Filling the Holes interview.

[more]

E-Discovery Rules Force Firms to Get Their (Record) Houses in Order

Maybe the new rules on electronic document discovery will convince people that e-mail really is a core business transaction medium.

Visit IT Business Edge for the E-Discovery Rules Force Firms to Get Their (Record) Houses in Order interview.

[more]

Don't Worry About Hackers (as Much as Other Problems)

Companies are seeking too much data, replicating it in too many places, keeping it too long, categorizing it in a dangerous fashion, and doing a poor job of investigating the impact of breaches.

Visit IT Business Edge for the Don't Worry About Hackers (as Much as Other Problems) interview.

[more]

VoIP Peering: No Easy Answers, on Any Level

Sending calls from one carrier to another was always a complex task. It's gotten even more complicated as the growing VoIP industry seeks to trade traffic with both other VoIP providers and legacy telephone carriers.

Visit IT Business Edge for the VoIP Peering: No Easy Answers, on Any Level interview.

[more]

Design Time Governance for SOA

Too much emphasis on governance at the early stages of an SOA project can result in a rebellion, but no early governance at all is not the solution.

Visit IT Business Edge for the Design Time Governance for SOA interview.

[more]

Service-Oriented Management Architectures to the Rescue

We're all agreed that unified management in data systems is a good thing, but how do you go about controlling the range of technologies and vendor solutions that have evolved in the typical center?

Visit IT Business Edge for the Service-Oriented Management Architectures to the Rescue interview.

[more]

Top 16 Vista time-saving tips

These shortcuts will save you motion as well as time when using Microsoft's latest Windows operating system. Many work with other Windows versions, too.

[more]

Social networks influence online holiday shopping

Excluding travel and auctions, consumers spent $21.7 billion at U.S. online stores between Nov. 1 and Dec. 20, a 26% increase over the same period last year, according to comScore Networks Inc.

[more]

Career Advancement A to Z: Computerworld's Top Tips

Get our best advice on finding a new job, getting paid what you're worth and dealing with workplace challenges. Plus: must-have hot skills.

[more]