Medicine has the Hippocratic Oath. The heavily regulated medical profession licenses its practitioners and tracks and restricts the prescription of drugs. But what about IT?

Sign Up for the Magazine

Departments

Tech Tips

What is simple to one individual may appear complex and overwhelming to another.

Road Warriors

Don't cry if your mobile users occasionally lose their notebooks or even have them stolen. Instead, use this app to help get them back.

Money Matters

Technology veterans say it takes a village, alignment and accountability to craft an effective budgeting process.

Reviews

This database is no longer a target for the schoolyard bully.

Out-of-the-Box ROI

Unified threat management packages can simplify your multilayered network security, but these all-in-one appliances aren't for everyone.

Tech Watch

Reasons to like and love Windows Vista.

Best Practices

Better search engine optimization results start with a utilitarian site map when function trumps form.

How To

Sometimes your end users require over-the-shoulder support. Here are a few tips for remotely guiding and troubleshooting client computers in a Windows Server environment.

Security

Network devices of any kind are security holes. Reset default settings and put policies to work that will prevent laziness from turning your network's body armor into a sieve.

Best Practices

Whether preparing a complex, companywide application rollout or choosing a workgroup scanner, a formal evaluation process can streamline and justify your decision.

Best Practices

Hackers love to exploit security holes. With Google hacking, they've found a doorway into sensitive information from Web servers, applications, error messages and subdomains.

Features

Feature

Think you have a foolproof disaster recovery plan? These businesses thought so too, but after surviving Hurricane Katrina, they have a few words of advice for IT leaders.

Feature

How 16 kilobytes of memory, an external hard drive and dogged determination turned an ex-con into a techie.

Feature

Business executives and recruiters reveal the top IT skills in demand in today's job market.

Feature

A plan of attack to help you help your boss understand IT's value

Opinion

The Lowdown

Involving all stakeholders is important, but it's not enough to ensure an effective information technology strategy.

Inside I.T.

It's our job to sell the ideas <em>behind</em> the strategy.

Speaking from Experience

Technology is a powerful tool. So is integrity.