When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. More >
Avoid falling for social media pitfalls of sharing and trusting too much. This is a time when a little skepticism and being wary can go a long way toward protecting your personal and organizational information. More >
Online communities are driving competitive advantage for many business-to-business (B2B) firms. More >
Even if you don’t have a computer, the nightly news bombards you with tweets from the candidates and anyone who has an opinion about the candidates. More >
There are positives and negatives associated with repositioning a consumer product for business, especially one as popular as Facebook. More >
In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. More >
When registering domains, should we forego the likes of .com, .org, and .net, and adopt generic extensions that are becoming increasingly common?More >
Temporary brick-and-mortar extensions of online retail outlets pop up in various locations to give those retailers a means of providing a touch-and-feel experience to customers.More >
More companies are demanding cloud-based services that are global, but also physically co-located with their regional offices.More >
The real value that the Internet of Things brings is at the intersection of gathering data and leveraging it.
Even if you don’t have a computer, the nightly news bombards you with tweets from the candidates and anyone who has an opinion about the candidates.
Enterprise social collaboration solutions are most successful when they contribute to business value and benefits that address company goals.
Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business.More >
This excerpt focuses on the conceptual aspects of defect management, including the basic concepts of a defect, how to mana...
This report lays the foundation for a rational approach to software metrology, with the scope of the current effort being ...
This excerpt from chapter 2 focuses on major browser security issues, including same-origin policy, sandboxing, malicious ...
This paper explores a methodology to score adherence of a web page to WCAG 2.0 conformance requirements....