Salesforce LiveMessage lets organizations communicate in a bi-directional manner using services such as Facebook Messenger. More >
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. More >
Avoid falling for social media pitfalls of sharing and trusting too much. This is a time when a little skepticism and being wary can go a long way toward protecting your personal and organizational information. More >
Online communities are driving competitive advantage for many business-to-business (B2B) firms. More >
Even if you don’t have a computer, the nightly news bombards you with tweets from the candidates and anyone who has an opinion about the candidates. More >
There are positives and negatives associated with repositioning a consumer product for business, especially one as popular as Facebook. More >
When registering domains, should we forego the likes of .com, .org, and .net, and adopt generic extensions that are becoming increasingly common?More >
Temporary brick-and-mortar extensions of online retail outlets pop up in various locations to give those retailers a means of providing a touch-and-feel experience to customers.More >
More companies are demanding cloud-based services that are global, but also physically co-located with their regional offices.More >
Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years.
The Intel Atom processor E3900 series employs 14-nanometer silicon to push processing horsepower out to the very edge of distributed IoT environments.
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.
Shadow IT can only remain in the shadows if IT allows it. Providing greater autonomy to users, developers, business units and tech admins will produce a more dynamic, flexible approach to workflow management.More >
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...
This report lays the foundation for a rational approach to software metrology, with the scope of the current effort being ...
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...
This paper explores a methodology to score adherence of a web page to WCAG 2.0 conformance requirements....