IT Strategy | News, how-tos, features, reviews, and videos
Business strategy guru Gary Hamel blames obsolete management practices for your failure to establish a culture of innovation. One solution: Stop focusing on efficiency.
The coming year will see hackers set their sights on users of Web 2.0, mobile and RFID technologies due to the vast potential for financial gain each represents, according to a cybersecurity think tank.
Why do so many IT leaders do such a terrible job of running their departments like a business? Because they put too much emphasis on supply and not enough on demand.
Changes in IT and customer expectations mean business executives need to be more customer-focused than ever.
Two decades ago, the world's number-one retailer used IT to reinvent global supply chains. The world caught up and now Web 2.0 technologies are forcing retailers to pay more attention to customers. No longer a leader, Wal-Mart's IT is at a
New website to debut in 2008 central to struggling retailer's turnaround strategy.
Web 2.0 makes businesses vulnerable to a new class of security threatsu2014attackers using Web browsers and Web traffic to sneak undetected past legacy firewalls, intrusion prevention systems and URL filters.
Video surveillance technology, employed in conjunction with other security measures such as supplementary technology, information sharing with authorities, and widespread employee and consumer education, can help solve any number of crimes.
Steve Schuckenbrock, the computer maker's CIO and president of its services business, tells how IT is at the center of Dell's pursuit of consulting contracts, acquisitions and supply chain improvement efforts.
Tips to help businesses and other organizations protect critical information assets traveling through their networks.
Sponsored Links