Here are the influential voices leading the conversations where nonprofits and technology overlap.
Although it might make sense to perform IT audits internally, tread carefully.
Blogging is all the rage, but when your employees blog, make sure you know the legal ramifications.
To blog or not to blog? That is the question.
Check out five utilities that your IT team might want to add to its digital toolkit.
By using BitLocker Drive Encryption, you can protect your data on systems running Windows Vista.
Diligently downloading fixes on Patch Tuesday isn't enough to protect your network from increasingly frequent zero-day attacks.
Consider forging stronger Web links as part of your SEO strategy.
Small-Business Tax Deduction Increase; The Video Disc Arrives; The Intergalactic Network; Be Smart When Prepping for Certification Tests; Is It Love or Big Brother?; What's Good for Your Battery Is Good for Your Notebook
Here's how to shift from a peer-to-peer to a centralized network.
Let users connect plug-and-play printers without the need to manually install third-party drivers.
Before you buy, make sure you know what you want to keep out — and let in.
Getting the most out of notebook batteries isn't intuitive, but it is pretty easy.
Try these tips to help prevent eavesdropping and information leaks from affecting your wireless networks and devices.
Are new hybrid hard drives hype or a decently priced alternative?
Avoid the journey into legal liability land by exiting at the next signpost &mdash encrypted drives.
CIOs should look for ways to help organizations that train young adults to become systems professionals.
Information security is complex, but it’s still a mixture of knowledge, technology and common sense — leaning heavily on the common sense part of the equation.
Monitoring and failing to monitor electronic communications in the workplace both involve risk.