The simplest way to protect data on mobile devices is to not store it there in the first place. Encrypting data on mobile devices, or adopting remote access tools to stop information leaving the confines of the data center, are some other ways of protecting data.
The promise of desktop virtualization technology is to centralize applications at the datacentre to make them easier to manage and provision -- stretching hardware resources and keeping nagging software conflicts to a minimum in the bargain. In some cases, the same technology helps accomplish all three, bringing greater control and flexibility to IT without users mourning the loss of "their" beloved desktops.
To deliver branded e-commerce sites for customers such as JLO by Jennifer Lopez, Members Only and OP, eFashion Solutions wanted a platform it could easily customize and enhance, without being chained to custom, homegrown code. Open source was the answer, said Mitch Pirtle, the company
Wireless security? Conventional wisdom on wireless networks goes like this: They are inherently dangerous. They can leak your secrets to the outside world, through easily accessible radio waves. You'd be better off carrying around your corporate treasure in a sieve.
Many technology execs want entry-level IT employees to hit the ground running, with concrete skills for real IT work. And they often don't see that in college grads, who typically require on-the-job training or additional certification from vocational technical schools.