Business Operations | News, how-tos, features, reviews, and videos
CIO.com can't reveal his name, but this 30-year veteran of stalking thinks the next generation of cyberstalkers is too spoiled. Between Facebook and Foursquare, it's no wonder, he says.
Heed the warnings from recent legal cases and business scandals. Before you sign that deal with an IT vendor, make sure you know what you'll do if your supplier doesn't keep its promises.
Either the Department of Justice or the Federal Trade Commission will look into potential anti-trust behavior from Apple.
Don't let contractors define their own deliverables. Negotiating detailed statements of work reduces project delays, cost overruns and even the likelihood of failure.
Allowing access to social networking sites can open businesses up to a plethora of security risks. The key to success, Forrester Research says, is a strong acceptable use policy. Here's how to craft one.
Social media policies make sense to protect employees and businesses in the age of Facebook and Twitter. For expert perspective on how to create a social media policy, consider this advice from the team that wrote NASA's rules.
For global companies, forensics applications provide another weapon in the security arsenal.
Apple is taking on HTC in what could be a colorful patent case, if history is any guide. Here, we look back at five of Silicon Valley's most famous patent battles, from the graphical user interface to the BlackBerry.
Cloud services buyers beware: vendors must address security regulations
A recent U.K. court finding against HP's EDS for failing to deliver on its sales pitch could radically change the dynamics of outsourcing everywhere.
Sponsored Links