Search Results

Results 1081-1100 of 3283 for Staff

Yahoo CEO’s Fishy Resume Creates Big Stink

Due diligence when hiring staff may seem to be normal practice, especially when the post to be filled is at a high level But that's not necessarily the case, Michael Murphy, a retired a human resources director, told the E-Commerce Times. "It's not uncommon when you're hiring ...

Jury to Decide Winner of Java Copyright Joust

Oracle's argument, presented by attorney Michael Jacobs, is that Google knew it needed a license for Java and ultimately opted not to get one. The proof offered during the trial consisted of emails circulated among Google staff and execs discussing whether licensing should be pursued, as well as Google's attempts to forge a relationship with Sun Microsystems so it would have the right to use Java, among other signs.

Google, FCC Showdown Spotlights Technology Law Lag

"I think they are trying to get this over with. This is an election year, and the DoJ appears to be staffing up to deal with Google more aggressively," Rob Enderle, principal analyst of the Enderle Group, told TechNewsWorld. "Their release puts everything out there rather tha...

OPINION

A New Day Is Dawning for the Technology Market

Apple, the most successful currently, is also the most vertically integrated, down to actually designing some of its own processors. Both Dell and HP have started to massively staff up their own software organizations, which already are crossing over into areas -- like systems management -- where Microsoft has offerings. ...

Anonymous Strikes Most Fear in the Hearts of IT Security Managers

A Fallible Staff This theme of overblown fears --and the subsequent overlooking of real risks -- is not new to the computer security space, security consultant Robert Siciliano told the E-Commerce Times.

BOOK REVIEW

Linux Admin Manual Is a Great Reference Tool That’s Not for Dummies

Linux Administration: A Beginner's Guide by Wale Soyinka is a hands-on manual for IT staffers who must dance with Windows and Linux. It is a practical guide for network admins who deploy and maintain Linux and other free and open source software (FOSS) In this Sixth Edition op...

SPOTLIGHT ON SECURITY

Did Google’s Wardriving Ways Give It a Competitive Edge?

April 18: The University of Hawaii settled a class action lawsuit stemming from data breaches in 2009 and 2011 that exposed personal information for nearly 100,000 students, faculty, alumni and staff. The university agreed to pay for two years of credit monitoring for everyone in the class action...

Ellison Fumbles Testimony in High-Stakes Java Case

As part of its suit, Oracle has produced emails reportedly exchanged among top Google staff, including Page. In those messages, Google Senior Vice President of Mobile Andy Rubin discussed whether Google should license Java or just move ahead without a license. Google said it ...

OPINION

How Outside Experts Can Refine the Customer Experience

Outside experts are often in a position not only to uncover the business insights that a company would likely not be able to discover on its own, but also to prioritize the focus areas that will have the biggest impact on customer loyalty. The parking lot at an apparel store might be dirty, for example, but to have staff spend time cleaning it may not be a wise decision when the shirts on the shelves are in a state of disarray.

EXPERT ADVICE

Taking Digital Analytics to the Limit

In the early days of Web analytics, organizations staffed their teams almost exclusively with internal resources, often building new Web analysts by providing training for employees with a related business intelligence background. Companies that lacked an internal supply of h...

SPOTLIGHT ON SECURITY

Flashback Mac Trojan Sputters and Stalls

April 12: Housatonic Community College in Connecticut reported a data breach that may have compromised personal information of 87,000 members of school's community. Files suspected to be breached contain names, addresses, dates of birth and Social Security numbers for faculty members, students and staff who had spent time at the school since the early 1990s...

GOVERNMENT IT REPORT

US Agency Takes ‘Private’ Approach to Streamlining IT Procurement

However, one of the most recently created government entities, with one of the smallest staffs in federal service, has just launched a program that should simplify the IT procurement process -- a goal that many of the largest agencies are struggling to achieve The Millenium Ch...

Sizing Up CISPA’s Security Bona Fides

The bill provides immunity from civil and criminal prosecution at both federal and state levels for organizations or their staff who use cybersecurity systems to gain information about cyberthreats or provide that information in good faith Support for the Bill...

Best Buy Plot Thickens

Twenty-four hours after that first indication that something was amiss, the unsubstantiated reports of an inappropriate relationship with a female staffer emerged. Best Buy did not respond to our request to comment for this story.

Will a Different Yahoo Be Good Enough?

There will be a Regions division devoted to advertisers and agencies, and staffed by regional sales teams. Regions will also be divided into three subgroups: Americas, APCA and EMEA. A Technology division will address Yahoo's infrastructure and platforms. It will be divided i...

BEST OF ECT NEWS

Selling Sales Pros on CRM

The way the concept of CRM is defined during the sales process can sow the seeds of its ultimate failure. Because the decision makers are often sales managers rather than actual salespeople, the pitch is usually made that CRM makes it easier for the managers to manage their sales staff. Which is true...

GOVERNMENT IT REPORT

Federal Agencies Struggle With Protecting IT Supply Chain

"We found that the Defense Department took a more holistic approach and included the contracting and acquisition process, the user program people, and the IT staff in addressing supply chain risk," Gregory Wilshusen, director of information security issues at GAO, told CRM Buyer...

Microsoft Wields RICO Act to Storm Zeus-Infested Botnet Hives

Escorted by U.S. Marshals, staff of the companies seized command and control (C&C) servers in two hosting locations -- Scranton, Pa. and Lombard, Ill. -- and took down two IP addresses related to the C&C structure Microsoft is monitoring 800 domains secured in the operation to...

OPINION

Meg Whitman vs. Tim Cook by the Numbers

While Apple is outperforming HP, Whitman is clearly a bigger asset to HP than Cook is to Apple. She is clearly improving the mess she started with, while Cook appears to still be doing the job he did at Apple while Jobs was alive and leaving Jobs' unique duties unstaffed. ...

EXPERT ADVICE

12 Steps for Staying 1 Step Ahead of Online Security Threats

News of password-related security breaches has dominated the headlines over the past 12 months, as in the recent T-Mobile incident, when names and passwords of staff members were published. The company's administrators had delegated the same password to each employee. It soun...

What's your outlook for the business climate in 2025?
Loading ... Loading ...

LinuxInsider Channels