Social media as far more than just an outbound-only tool. Successful businesses are turning their social media efforts into two-way, real-time communications with their customers, says one analyst
Businesses are again starting to, at least, take a look at how improving critical enterprise resource management systems can bolster operations, according to a Forrester analyst. Plus, how ERP Software-as-a-Service (SaaS) is now an attention-getter
The Internet Crime Complaint Centre has received warnings about spam e-mails with links on the FBI and Facebook. How simple security practices can combat botnets
In two bold moves, one or more thieves stole US$449,000 from the city of Carson, Calif., but the eagle-eyed city treasurer noticed the actions and called police. A computer forensics team at the city's bank has looked at the hard drives from her city-issued laptop computer and identified the likely entry point for the thefts as a Trojan horse virus.
Fresh on the heels of a string of highly publicized corporate data breaches, 63 per cent of respondents to a new data security study said they did not believe they could prevent such breaches.
Business technology optimization is the new buzz word at HP. The company says its imminent purchase of Mercury Interactive will help it to create the most powerful management software portfolio in the industry.
After the U.S. House approved a controversial telco bill and rejected an amendment that sought to keep large telephone or cable TV companies from controlling access to the Internet, supporters of that "net neutrality" amendment vowed to fight on.