TITLE

The top three stories of 2007

AUTHOR(S)
Long, Geoff
PUB. DATE
December 2007
SOURCE
NetworkWorld Asia;Dec2007, Vol. 3 Issue 11, p44
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article shares the authors insights on the top three biggest stories in 2007 which is related to information technology. One is virtualization which continues to become a mainstream technology, unified communications and the flow-on of consumer technologies. Another big story is the green computing initiative where there is a business cost as well as an environmental cost when it comes to the use of computing resources.
ACCESSION #
28841235

 

Related Articles

  • Before you take the plunge... Somaini, Justin // SC Magazine: For IT Security Professionals (15476693);Mar2013, Vol. 24 Issue 3, p74 

    The author shares insights for data security professionals on the principles to look at when considering a new job. Knowing the company's standing and health is critical to determining if one is making the right move. He suggests doing a Google search for news and information about the company....

  • Getting it Done. Glass, Brian // Sound & Video Contractor;Sep2005, Vol. 23 Issue 9, p30 

    Ponders on information technology (IT) needs of churches. Challenges in providing IT services to churches; Key attributes of IT services for churches; Examples of IT services needed by churches.

  • Bhagwad Gita Pedagogy for Information Technology Systems' Security. Singhal, Achintya; Srivastava, Navita; Agarwal, Priyanka // ICFAI Journal of Information Technology;Jun2009, p7 

    Mankind has progressed a lot in the last couple of centuries, but a recent development in the field of Information Technology (IT) has revolutionized the whole world. The last two decades saw the world converging into a global village. IT is now very much a taken-forgranted part of everyday...

  • THE PRICELESS VALUE USER EXPERIENCE. Walsh, Lawrence M. // Baseline;Dec2007, Issue 79, p11 

    The article focuses on the importance of user experience for information technology (IT) departments and service providers to always remember that the ultimate value proposition is in the user experience in the U.S. It notes that the success of services such as Google and Saleforce.com is based...

  • Cyber Monday, 2007. Coffee, Peter // eWeek;12/11/2006, Vol. 23 Issue 49, p49 

    The article reports on the preparation for Cyber Monday 2007. The author discusses that the information technology people invest much of their time in prevention of security and other computer related threats. He also discusses the Thanksgiving weekend wherein he mentions that Wal-Mart's systems...

  • Industry events.  // Computer Weekly;11/3/2009, p12 

    A calendar of events related to the information technology industry in Europe in November 2009 is presented, which includes Risk Decision Annual European Conference, Mobilise Your Workforce -free event, and IDC Unified Communications Conference.

  • Jim Rapoza: Emerging Technologies.  // eWeek;5/5/2008, Vol. 25 Issue 14, p57 

    The article offers view of Jim Rapoza regarding six stages of technology flops in the U.S. It reveals that such technology flops go through their own stages, from promising new technology to overhyped beast to oblivion. The author based his assumption on the rise and fall of push technology....

  • Look beyond the ITIL starting point.  // Computer Weekly;9/25/2007, p20 

    The article presents information on the IT Infrastructure Library (ITIL) guidelines, which is the set of best practices, that provides advice on how Information Technology (IT) should be managed, covering areas such as change and configuration management. Since their introduction, the ITIL...

  • A Novel Technique for Embedding Data in Spatial Domain. Viswanatham, V. Madhu; Manikonda, Jeswanth // International Journal on Computer Science & Engineering;2010, Vol. 2 Issue 2, p233 

    Steganography is the science of hiding messages in a manner that only the intended users knows the presence of the secret message. Hiding the information within a computer file also comes under Steganography. In digital steganography these media files are suitable because of their large size....

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics