Here is what’s happening in our community lately:
- Ask a question, win a t-shirt
- Featured IT blogger
- Featured questions
- Featured blog posts
- Messages from the TechTarget network
Ask a Question, Win a T-Shirt
We’re rewarding great questions on IT Knowledge Exchange by giving away ten t-shirts to good questions asked in the community through February 9th. View the blog post today for more information and start firing up those questions.
Featured IT Blogger of the Week
This week’s featured blogger is Phil Koster, on “Joe, the Consultant.” Phil is a systems engineer who blogs about the benefits and caveats of enterprise virtualization. He was kind enough to feature us on his blog last month, and we’re glad to reciprocate! You can visit his blog here:
Over the past week, we’ve seen some great questions come through IT Knowledge Exchange, but some questions are still waiting for an answer. Click on one of our selected questions below, and spread the knowledge!
Featured Blog Posts
Browse the sampling of selected blog posts below or go here to view all.
>> Cisco might be entering the server market (Musings of an IT Consultant)
>> What about spending money when you have no money? (IT Career JumpStart)
>> Windows 7 after my first week (SQL Server with Mr. Denny)
>> Cisco’s latest wireless innovation – New 802.11n Access Point (Network Technologies and Trends)
Start your own IT blog and earn some extra cash.
Messages from the TechTarget network
Security never sleeps. Compliance requirements don’t deflate in a
recession. Now more than ever, IT teams must tighten privacy
policies, make smart purchasing decisions and learn how to do more
with less. Attend “How to Use SIEM to Cut Costs and Save Money” on
January 29th at 2:00 pm EST. Mark your calendar and register online
through our secure website today!
Instant messaging (IM) and other real-time communications are widely
used throughout most enterprises today, but their use remains largely
unmanaged. That puts organizations at risk for loss of intellectual
property and crucial data, rising costs around e-discovery, fines for
noncompliance, legal exposure from inappropriate use, and network
vulnerabilities resulting from unauthorized access. To mitigate
real-time communications risks and maintain accountability,
organizations must secure buy-in from top management, establish
strong policies for message archiving and appropriate use, and adopt
good tools to enforce those policies. This paper identifies key
concerns and identifies six steps to improve control over
organizational use of real-time communications.
As always, we want your feedback.
Send it to me at firstname.lastname@example.org