What are Web services anyway?
The amorphous term “Web services” has a lot of people confused. What exactly does it mean? Here’s one explanation that should help you sort it out and decide how to put Web services to use for your organization.
Content: Article | Author: David Berlind | Source: TechRepublic | Subject: IT / Technology / E-Business
Mark Scureman
Most people don’t listen with the intent to understand. They listen with the intent to reply. They filter everything through their own paradigm and experiences, so that what they hear may not be what you said.
Content: Quotation | Source: TechRepublic | Subject: Communication
Understanding how 10/100Base-T Ethernet operates
“Since the late 1990s, 10/100Base-T Ethernet (also known as IEEE 802.3 and CSMA/CD) has become the de facto standard for local area networks. We’re going to look at the elements involved in using Ethernet in a 10/100Base-T network, including the components of a frame, how Ethernet technology functions, and where this suite of technologies fits into the OSI reference model.”
Content: Article | Author: Mike Mullins | Source: TechRepublic | Subject: IT / Technology / E-Business
A Culture of Teamwork From an Employee’s View
Trust and Respectometer
Identifying the 10 Most Common Application-level Hacker Attacks
E-mail viruses and worms get more press, but Web application security can be a bigger problem for many firms. Most sites have flaws that hackers can use to cause trouble. Take a fresh look at your site after reading about these application security holes.
Content: Article | Author: Izhar Bar-Gad | Source: TechRepublic | Subject: IT / Technology / E-Business
Management service providers: Ready for prime time?
The MSP Association defines a management service provider (MSP) as “a company that delivers information technology infrastructure management services over a network to multiple customers on a subscription basis.” Before the Internet became a commodity, organizations leased private networks from major communication service providers that managed those networks for a fee. In recent years, many organizations, such as hospitals, universities, and other businesses—small, medium, and … [ Read more ]
Content: Article | Author: Gopan Madathil | Sources: Auerbach, TechRepublic | Subject: IT / Technology / E-Business | Industry: Information Technology
Creating the Next-Generation IS Organization
IT Business Assessment Checklist
50 Essential Excel Tips
Check Box Example Spreadsheet
Rethinking the IT domain: When PDAs, phones go online
These days, many employees use either a PDA or cell phone for both personal and work-related purposes. This article provides advice on how to bring order, control costs, protect company data, and maintain support with multiple computing devices.
Content: Article | Sources: Gartner, TechRepublic | Subject: IT / Technology / E-Business | Industry: Information Technology
Use these Fourteen Points to improve the quality of your data
This article (along with an earlier article by the same author) takes a look at W. Edwards Deming’s famous “14 Points”. Though focused on applying these points to data management, the discussion also serves as a good introduction for those unfamiliar with this hallmark of the TQM movement.
Content: Article | Author: Dan Pratte | Source: TechRepublic | Subjects: Management, Operations
Vendor Rating Form
Best Practices in Business Continuity Planning
Protect your network with an Intrusion Detection System
According to research by the International Computer Security Association, in 1998, at least one computer attack or break-in occurred every second. Back in the good old days of the Internet, firewalls were an afterthought. But today, they’re basic equipment. The problem is, they’re not enough, according to a January Gartner report titled “Intrusion Detection System (IDS): Perspective.”
“Many organizations believe that since they have firewalls … [ Read more ]
Content: Article | Authors: Gerald Arcuri, Kristen Noakes-Fry | Sources: Gartner, TechRepublic | Subject: IT / Technology / E-Business | Industry: Information Technology
How does the waterfall development methodology play in the enterprise?
Sure, you’ve heard of the waterfall development methodology and have probably used it (whether you knew it or not). But how is it used at the enterprise level? Here’s a look at the process, typical deliverables, and what to expect from each step.
Content: Article | Author: Tom Mochal | Source: TechRepublic | Subject: Project Management
In depth: Protect your data with these security measures
A network is never entirely safe from snoops and spies, but new technology such as wireless networks is making security even more difficult. This report from Auerbach Publications offers a plan of attack.
Content: Article | Author: James Trulove | Sources: Auerbach, TechRepublic | Subject: IT / Technology / E-Business
