The role of the Purchasing/Procurement Manager is to plan, execute, and finalize purchasing and procurement strategies for technology spend across the organization.
|
|
The role of the Vendor Portfolio Manager is pivotal in the IT department's interactions with suppliers of services, hardware, and software. The portfolio manager provides...
|
|
Over 50% of security breaches are a result of end-user error, oversight, and ignorance. IT security training is an effective method of reducing end-user related security...
|
|
There are many factors that affect an organization's IT security training needs and goals: environment, specific security threats, and end-user perceptions and knowledge....
|
|
In order to create an effective IT security training program, you must make a series of key decisions based on information gathered during the Establishing Training...
|
|
A data center relocation can be best described as a controlled disaster that involves high risk and requires rigorous and thorough planning. Over 29% of IT professionals...
|
|
There are times when something critically important is being missed by not only the larger, non-specialist community involved, but even by those at the core of the...
|
|
A little jostling for market share is always a good thing, and the occasional sector blowup or segment technology revolution keeps everyone on their toes and healthy. But...
|
|
Intel Corporation and McAfee, Inc. announced a definitive agreement for Intel to purchase McAfee. The purchase price is currently set at USD$7.68 billion where Intel will...
|
|
Many enterprises will elect to have Wireless LAN (WLAN) vendors perform an on-site demonstration to help them better understand solution capabilities and constraints....
|
|