Tek-Tips | Information Technology RSS feed for this section

ICT Vendors Opportunites with Japanese CleanTech Market

As seen in Smart Grid, ICT technologies will have new market, CleanTech. The US ICT vendors have a lot of business opportunities in the Japanese market. The Japan External Trade Organization (JETRO) is a Japanese government organization for promoting mutual trade and investment between Japan and the rest of the world. In San Francisco recently […]

Read full story Comments { 0 }

The Green IT Perspective on Data Centers, Cloud Computing, and Sustainability

As 2009 draws to a close, I would like to ponder each element in the title of this blog. The information sources are my blog posts and others’. I will talk about data center market trends in this blog and treat the rest of the subjects later. Regulatory pressure on data centers The U.S. House […]

Read full story Comments { 0 }

Clouding the Solution Landscape: Mediocrity vs Strategy – Going the Easy Path….

We live in a time where 10 years ago is deemed as ancient history (from an IT view), a time that is well past, so different to today – a time that aside from reflecting on where we came from, provides little more to help improve what we have today. Information Security is hampered by […]

Read full story Comments { 5 }

Data Classification Policies – Forgotten Purpose

Data Classification.  I’m not sure I have ever seen an implementation of a Data Classification policy that I would say, is very successful. It’s a scary thought given that Data Classification is a key foundation policy for Information Security. For those who have implemented a Data Classification policy, ask yourself these questions. (For those that […]

Read full story Comments { 0 }

Overcomplicating Information Security and Risk Management

If I had to highlight a key problem area for organizations when it comes to how they approach Information Security and Risk Management overall, it would be the over-complication of their implementation(s), or lack thereof. (Sounds strange for the latter but it’s that “complication” that also results in the “lack thereof”). Technology has done little […]

Read full story Comments { 3 }

Signed, Sealed – Delivered? The Payoff of Showing Your “Trust Mark”

A big benefit of buying an SSL Certificate from a known brand includes the recognition value of their trust mark, so it is highly important that you use this to maximum benefit on your Web site. Here are some tips on how to place the trust mark for maximum impact.

Read full story Comments { 0 }

Review of Information Security and Risk Management Strategy – Complex or Straightforward Exercise?

In any strategic planning cycle, performance and strategy re-assessments are a vital component in keeping a strategy effective and up to date. One way to measure the performance of the Information Security strategy is to develop a set of metrics that include benchmarks across the various phases and sub-phases of the strategy. The goal of […]

Read full story Comments { 0 }

I.T. Decisions – Who Makes Them In Your Organization?

Owen Greaves is that rare IT consultant who bridges that chasm between IT and marketing. As a regular guest blogger for Tek-Tips, Owen will be sharing his insights with us about IT management, technology consulting and the impact of social media on the IT professional. Please help us in welcoming Owen to the Tek-Tips community. […]

Read full story Comments { 2 }

More Thoughts on Middleware and Regulatory Compliance

By T.Rob In yesterday’s post Is Your Sarbanes-Oxley Certification Sound? I proposed that it is not possible to be SOX compliant if anonymous users can manipulate messaging traffic in the enterprise. I couched that in terms of WebSphere MQ because that is the messaging software I am most familiar with. I framed the discussion in […]

Read full story Comments { 0 }