Search Results

Results 2341-2360 of 3282 for Staff
OPINION

A Leet Primer

Leet has outgrown its roots as an obscure communication system for computer bulletin board users and has become a broad cultural phenomenon. It is expressed by acronyms and synonyms, and by substituting letters with numbers, punctuation marks, and phonetic combinations. In leet, leet itself can be expressed as l33t or 1337. The full formal long form is elite or 31337...

IBM Updates ‘Self-Healing’ Software

IBM announced its latest "self-healing" software, touting a sidestep to IT staff-stealing glitches and other outages through managed monitoring, application manager, and multi-platform system automation software Big Blue said by freeing IT teams from finding and fixing glitche...

Forecast: ID Theft by Insiders to Grow Dramatically in ’06

"Many retailers have not educated their employees on the value of customer information to the company, nor have they educated them on employee responsibilities towards protecting and correctly handling this information. One example would be the use of skimmers in restaurants. Several thefts have been reported due to wait staff taking the customers' credit card then running it through their skimmer in order to later be able to retrieve this number," said Ansanelli...

Lawsuits, Copyright Pilfering Allegations Added to Sony CD Snafu

"Offering replacement CDs and MP3 downloads are nice, but they should also be offering refunds so consumers have that option if they want it," Corynne Mcsherry, an EFF staff attorney, told TechNewsWorld "And that's just in respect to XCP," she added. "They haven't offered to r...

OPINION

Sony, HP, Apple, Google: Who is on Your Side?

Why it this pertinent to this discussion? Because Google appears to be secretly building something. Based on the types of staff they are hiring, one possibility is that they are planning on entering the PC business with a revolutionary box initially targeted at the consumer market. This product would be tied back to the massive high-speed network acquisitions they have made and would probably be based on a Linux derivative in embedded form. What you would buy is an appliance PC that could easily be as far ahead of the MacMini as the Mac was ahead of the IBM PC when it was launched...

Web Portal Gives Patients Control of Mammogram Records

The process is now done mostly by culling through charts by hand and hiring staff to ask doctors if they have patients who fit the study parameters and are willing to participate Eventually, Danois said, he wants i3 to work with IBM and other partners to create a system that c...

Branding Overboard

Four: Half of the entire HQ has become a multimedia center, and the staff frequently dress in Disney characters and skateboard the halls Most corporations seriously think that free-flow creativity is the way for modernized hip-hop success. They fail to see that real creativity...

OPINION

Why You Shouldn’t Buy Products From Sony This Season

According to Slashdot, California, the litigation capital of the world, has filed a class action lawsuit against Sony and another one is pending in New York. The filing argues that Sony, by attacking its customers with this rootkit, has violated at least three California statutes designed to protect consumers and asks the court to prevent the sale of Sony CDs in California and also seeks unspecified damages. If these virus and Trojan attacks continue I think we may be on the way to record damage awards in a number of states rivaling what happened with Microsoft after their DOJ trial. One has to question whether Sony has the assets to weather this kind of storm. At the very least Sony may find the need for a new executive staff rather quickly...

Matchmaker Takes Advantage of IT Services Outsourcing Trend

So who are companies turning to for protection, repairs, and rollouts? More and more, the answers are coming from outside, as businesses forgo in-house IT staff and get IT answers from outside firms ...

OPINION

Crisis Management: Is Your Company Ready?

Immediately gather your senior management and fully describe to them the problem and how you intend to address it. Of course, it is an absolute must that you remain composed and project a calm, in-control image to your senior staff. Be sure to stress to them the importance of projecting a calm image to all involved, including your employees...

Generating Leads From Your Frontline

Four companies have taken the steps to look to their frontline employees as a source of generating new leads from prospects and existing customers. Continental Airlines, RBC Financial Group, County National Bank, and Alpha Company are among the companies that have enabled their frontline employees to create leads from the many more interactions these employees have compared to their revenue-generating counterparts. One company put the ratio at 150:1, meaning for every revenue-generating contact from sales, support spoke to customers 150 times. Cross-selling and up-selling is a natural extension for support staffs. If you haven't encountered this with your credit card provider, you will soon. The financial services industry continues to be one of the most prevalent users of this strategy with significant results...

Winners, Losers of Corporate Image 2005

The most common problem is that the image has no relationship whatsoever with the corporate objectives. Still, senior teams regularly send out very confusing messages to internal layers of staff and ask them to band around the existing image and sing along with out having any solid base or substance. This very often makes it a chicken-or-the-egg dilemma...

Newspapers Putting More Into Online Presence

Online Staffing Grows While cost-cutting measures to go along with the circulation decreases abound, the staffing at online operations has been growing again....

EXCLUSIVE INTERVIEW

StillSecure CTO Outlines Biggest Network Security Vulnerabilities

Ashley: We've traditionally "trusted" endpoint devices because they were configured and managed by the organization's IT staff. Of course now everyone recognizes that this kind of thinking is highly flawed. So many worms and Trojans have demonstrated how fallible our existing network security is; once inside the firewall any compromised endpoint device can do very serious damage...

Controversy Continues Over FCC’s Internet Wiretapping Rule

"We're deeply concerned that extending a law written specifically for the public telephone network to these emerging technologies will stifle the sort of innovation that has been the hallmark of the Internet revolution," said John Morris, staff counsel for CDT Grievance About ...

OPINION

E-Commerce Companies Must Globalize to Thrive

This "localization of information" has become a basic cost of doing business, as businesses compete with international rivals long-accustomed to offering service tailored to local markets. Besides improving customer service, this in-language approach has the added benefit of reducing staffing levels and taking other significant costs out of the customer service equation. In fact, Forrester and IDC have noted that costs for companies offering local language and self-service capabilities drop substantially when buyers serve themselves rather than speaking with a costly customer service representative...

Sony DRM Gets Sneakier

"It's hard enough to keep a computer running without a music company installing something you don't know about and you can't uninstall," Electronic Frontier Foundation staff attorney Fred von Lohmann told TechNewsWorld Playing Problems...

Trend Micro Unveils Spyware Protection Package

"As more people work from different environments, including telework from home, the issue of home security becomes critical to avoid infecting the network, especially for smaller companies that don't have a large IT and security staff," Spira said Statistics from The Dieringer...

ANALYSIS

Customer Relations Managers Face Job Transformations – Part 2

Once tasked with client management responsibilities at the offshore call center, Bradford had responsibility for the full lifecycle of program implementation, from initial conception through the training, ramp up, and long-term implementation. Now working on contract assignments through InternationalStaff.net, Bradford said that being a client relations manager at a 250-seat facility allowed for closer client cooperation than might be experienced at large facilities where outsourcing programs are handed off from manager to manager at different phases of a project lifecycle...

EXPERT ADVICE

Extending Investments in Systems and Staff

Regardless of the enterprise model chosen, completely rewriting legacy applications may be unrealistic. Legacy information systems often comprise several million lines of code; the enormity of the cost and time required may be prohibitive. Moreover, rewriting legacy applications entails an enormous loss of value because it means discarding along with the legacy applications all of the assets they embody. These assets include the "tribal knowledge" built into them over the years -- which can never be adequately replaced -- as well as users' and programmers' familiarity with the existing applications. The assets that are lost also include the business processes themselves, which typically must be reengineered in a massive effort when legacy applications are discarded and replaced. Perhaps most costly, replacing legacy applications means replacing programming staff as well -- and losing all of the experience and expertise these people have accumulated over their years with the company...

E-Commerce Times Channels