|
|
Implementing SSH: Strategies for Optimizing the Secure Shell Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to... | | The 2nd Digital RevolutionIn the 1990s I sat in the office of a CFO of what was then a Fortune 100 company. He was not happy about the annual technology bill. Back then – and for decades before – technology was tactical. He said something about technology being his last unmanaged expense. I gave him a list of 10 things we should do to improve... | | Technology Blueprints: Technology Foundations for High Performance CompaniesIn the present era of the post "new economy," scores of successful companies are now tending more than ever to steer away from the old model of extreme reward by extreme speculation. While innovation thrives today, it is focused on the fundamentals of value and high performance. Technology blueprints are concrete, proven tactical and... |
|
How to Cheat at Managing Information SecurityInformation security is different from many other disciplines both within mainstream information technology and other business areas. Even though there are now many good books on various areas, getting the breadth of knowledge across the many subareas is still difficult, but it is essential to success.
Unlike so many... | | Search Engine Marketing, Inc.: Driving Search Traffic to Your Company's Web SiteEffective search engine optimization (SEO) and search engine marketing (SEM) is now crucial to the success of your business. But it's never been more challenging—especially if you're responsible for a large, complex site. Finally, there's a definitive source for reliable information for implementing an effective search engine optimization and... | | |
|
|
|
Result Page: 8 7 6 5 4 3 2 1 |