- Welcome Guest
- Sign In
Data management rules and regulations have become a major concern for businesses, due in large part to increasing oversight that often requires organizations to invest in new technologies in order to address compliance issues. However, the promise of enterprise technologies as a solution to the dema...
Identity theft, a cyber-crime causing inestimable damage for scores of ordinary citizens, has prompted passage of the federal FACT Act Identity Theft Red Flags Rule, issued this year. Part of the FACT Act, the rule aims to combat the scourge of identity theft, which each year victimizes 8.3 million...
When it comes to properly managing and protecting critical enterprise data and information resources, Corporate America is stuck between two strongly opposing forces. The U.S. is world "cyber-crime" headquarters, according to the Internet Crime Complaint Center 2007 Internet Crime Report. The term c...
The hottest gadgets of today will look old and tired a year from now. Sellers of mobile handsets, smartphones, MP3 players, gaming consoles, camcorders, digital cameras and laptops constantly push the latest and greatest technology, leaving yesterday's choice items in the dust. Then there's the fact...
One interpretation of the term "green computing" focuses on the machine's energy consumption. The less power a computer needs, the less harm to the environment it does -- and the less the owner has to spend on energy costs. Are those energy savings enough of a reason to make major enterprise buying ...
"Every action has an equal and opposite reaction," said Sir Isaac Newton. While he made that observation centuries before the dot-com boom and bust, his words remain quite relevant today. After large corporation executives took advantage of their positions and wreaked financial havoc, the federal go...
The European Union, as a bloc, may be backing Digital Video Broadcasting Handheld as its preferred mobile TV technology, but whether European consumers embrace that platform remains to be seen. There are other options that could in the not-too-distant future enable consumers to access TV in individu...
Over the past five years, 42 of the technology companies that Mercury Ventures has invested in have made the transition from publicly traded to private firms. That is part of a larger trend among smaller publicly traded companies, for whom the benefits of being public no longer clearly outweigh the ...
Working with online car sales leads since the early part of the dot-com era, the cofounders of the Detroit Trading Exchange saw firsthand the inefficiencies in the market and set out to address them. The result is a robust and active trading exchange where car dealers and others bid to buy more than...
What is the biggest difference between shopping online and shopping in a store? In a store, customers can wander from place to place until they find something that appeals to them. Online, they usually need to have a good idea of what they are looking for in order to locate it. A small but growing n...
E-commerce suppliers face a difficult challenge. They must cultivate loyal customers, but that is becoming more difficult as the Internet enables consumers to roam freely from retailer to retailer. Now more than ever, the customer is in control, and that change is forcing many e-tailers to turn to c...
Even in a post CAN-SPAM world, where legal protections and technological advances give consumers more control than ever over their inboxes, e-mail remains a key component of many interactive marketing strategies. Commercial e-mail remains a cost-effective way to reach consumers, especially for busin...
Social Media
See all Social Media