Performance Beyond the Ping
For most companies, performance monitoring consists of the same availability and response-time metrics used during quality-assurance testing. But as anyone who’s lost an online shopping
For most companies, performance monitoring consists of the same availability and response-time metrics used during quality-assurance testing. But as anyone who’s lost an online shopping
In a typical retailer-supplier relationship, the retailer manages stock it owns–it purchases goods from suppliers and settles discrepancies in inventory, invoices and promotions periodically through
Viewing projects as part of a portfolio helps justify potentially risky initiatives. The definition of what’s risky, however, varies from company to company. Take this
Technology projects show a great return on investment (ROI). No, waitthey show very little. Hmm. Maybe it depends on your depreciation schedule? Getting vendors to
Robbing banks is dangerous and unpredictable, and it requires leaving the house. Hacking, on the other hand, has a high success rate, pays well (extortionists
Most organizations only react to security threats, and too often, only after damage has been done. But patching a system won’t recover stolen data, recoup
How much did the marketing department spend on technology products and services last year? If you can’t answer this question, you can be sure of
What is it? A method of identifying the best path between two points on a networkin this case, the Internet. How does it work? Route-control
Build it once and build it big, a director of technology once said of his company’s data center: Better to pay a little extra now