Computer Warehouse Group (CWG), one of the fastest growing information and communication technology companies in Africa, is organizing a breakfast session on IP Surveillance Solution. The theme of the Breakfast Session is “Detect and curb physical security threat in your environment”. The session will afford you details on how the IP surveillance technology may be… Read more CWG PLC: Invitation To a Breakfast Session on IP Surveillance on April 29th
Windows XP finally reached its end-of-life this April (2014), after which Microsoft ceases to release bug fixes for the operating system. If you’ve upgraded your PC then everything should be fine – but what about your bank? Have they upgraded? The Risk Isn’t Necessarily With You Have you upgraded from Windows XP yet? If not, you can easily… Read more Use The ATM And Risk Losing Your Money!
Is it safe to use? How secured is it? Are there quality softwares? These are some of the common questions asked by small scale business owners when they are faced with decisions to adopt open source solutions that could make their day-to-day operations more efficient. For many entrepreneurs without any IT background (but a sharp… Read more Open Source Softwares As An Alternative For Small Businesses
Indeed, much of what follows should sound familiar. This could be a good thing. Earth-shattering predictions have a knack for missing the mark. (Apocalypse 2012, anyone?) So the job-market calls that Jack Cullen, President of IT staffing firm Modis, and other industry experts shared with InformationWeek are more realistic and more useful if you’re looking for… Read more What IT Skills And Roles Will Be In Demand In 2014?
This article was first published in Diary of a Geek on April 20, 2011 If your capacity as an IT professional involves dealing with people in your office going on the road with mobile devices and bemoaning policies that keep them from accessing the company’s network because of pesky security protocols, then my heart goes… Read more Embracing Employee – Acquired Smartphones Without Compromising Security
Darwinism is no stranger to IT. Given the pace of innovation, today’s plum post is almost always one shift away from becoming tomorrow’s pink slip. But the trends currently taking hold of IT organizations may have a broader impact on IT employment than we’ve seen in years. It’s no secret that the cloud computing revolution… Read more The 9 most endangered Jobs in IT
The iPad is transforming the way businesses use technology. More than just a consumer phenomenon, the iPad is disrupting business models and power structures within corporate information technology (IT) departments. Within 90 days of being released, the device was already adopted by 50 percent of Fortune 100 companies. This unprecedented rate of market penetration represents… Read more iPad in the Enterprise
Not securing your wireless network is pretty dangerous these days. As an IT professional you really have a responsibility to not only secure your own wireless LAN, but also those of the people close to you. I mean, if you were a doctor and stopped by y…
If your capacity as an IT professional involves dealing with people in your office going on the road with mobile devices and bemoaning policies that keep them from accessing the company’s network because of pesky security protocols, then my heart goes out to you. It’s rough trying to balance the legitimate needs of a staff […]