Mary O. Foley


Big IT Lessons Small Businesses Can Learn

What are the key technology lessons that small and mid-sized businesses can learn from large enterprises?  Read story

Off-shoring IT: Time to Reconsider?

Did outsourcing your business' IT functions just get riskier? Obama's pledge to tax companies that move jobs overseas, the economic downturn, and the tragic ...  Read story

Do-it-Yourself Web Design for Small Business

Small businesses can save money on Web design by doing it themselves with a variety of new online applications such as Wix, Sprout, and Weebly.  Read story

What 2009 Rings in for IT Budgets

What will the financial crisis mean to your business' IT budget? Will there be pressure to make existing IT systems go farther? On the other hand, is this a ...  Read story

10 Hot Technologies for 2009

What are the new technologies that stand to change the way you do business in 2009 and beyond? Here are at 10 to consider.  Read story

A Network Tune Up for Tough Times

The financial crisis will mean less capital and credit available for small businesses, so existing networking equipment and systems will have to last longer....  Read story

Budget Cuts? Telecom May Be a Place to Trim

Does everyone in your office really need a BlackBerry? Is it time to consider VoIP? With economic storm clouds brewing, this might be the time to take a good...  Read story

Multiple Locations? MPLS Is a Networking Key

Multiprotocol label switching is an Internet protocol-based service that can tag and prioritize voice, video, and Internet traffic for your business.  Read story

Can Outsourcing Better Protect Customer Data?

If your business stores customer data, you may be subject to laws and regulations regarding the proper protection of this data. Some businesses are now outso...  Read story

What Can Managed WAN Offer?

Managed WAN networking can help small and mid-sized businesses take advantage of the latest communication technologies and achieve the same level of service ...  Read story

Does Business Need Its Own Search Engines?

Business-to-business (B2B) vertical search engines allow businesses to search for partners, suppliers, and customers without having to sort through the run o...  Read story

Avoid Security Pitfalls with Subcontractors

Increased reliance on outsourcing IT and data services has left businesses vulnerable if the subcontractor suffers a data breach. Ground rules can keep subco...  Read story

10 Steps to Database Security

Most small and mid-sized businesses that build and administer databases focus on performance and availability. Security is usually an afterthought. Until you...  Read story

Targeted Search -- How to Optimize It

Businesses that advertise online have been thrown another loop. Just when they had search engine optimization figured out, now they can target their advertis...  Read story

Minimize Security Threats from IM

Whether your business condones it or not, employees are probably going to use instant messaging products. IMing can be a productivity saver, but first addres...  Read story

Fight Spam in Six Steps

Unwanted and unsolicited junk e-mail currently makes up about two-thirds of all e-mail received, but there are some simple ways your business can cut down on...  Read story

Will Open Cell Phone Networks Mean Business Benefits?

Cellular phone networks have traditionally been "closed" or proprietary networks, locking your business into carriers for years using the phones they certify...  Read story

Accounting and More: New Financial Software

Move over, Quickbooks. There are new options in financial software for small businesses that can serve all parts of a business – not just the bean counters.  Read story

E-mail Alternatives: Time to Ditch Outlook?

Several new e-mail products give users the look and feel of Microsoft's Outlook but are actually Web-based. They provide the functionality and ease of access...  Read story

Tech to Track Workers: Pros and Cons

A growing number of wireless technologies -- such as GPS and RFID – let businesses to track workers, deliveries of time-sensitive information, and even com...  Read story

Don't Fear the Wiki! Business Can Benefit

Fear is one of the obstacles keeping businesses from realizing productivity gains by using internal wikis. But the business gains -- collaboration, informed ...  Read story

Putting the Kibosh on Internal Spam

The latest source of unwanted e-mail in the workplace is coming from an unlikely corner – inside the business. Here's how to deal with so-called "internal ...  Read story

Managing IT through a Business Relocation

Small and mid-size businesses relocate to new office space every few years or so, experts say. How does this impact IT? Here are tips on how to relocate IT s...  Read story

Dialing for Dollars: Open Source or Virtual PBX?

Voice over Internet protocol (VoIP) has created new options for the private branch exchange (PBX) that connects business offices with the public telephone ne...  Read story

The Great IT Outsourcing Debate: How to Decide

Even small businesses can benefit from outsourcing some technology functions, whether these involve human resources, finance, accounting, or customer service...  Read story

ERP for Small Business: The Time is Ripe

Small and mid-size businesses often have unique requirements for enterprise resource planning software that demand full capabilities without complexity. They...  Read story

Online Travel Expense Reporting Takes Off

The travel expense reporting process used to be a manual, time-consuming, and inefficient process for most small and mid-size businesses. Technology may hold...  Read story

The Network for Your Future Business Needs

The decisions you make today regarding your business's network infrastructure may impact greatly what types of applications your business will be able to run...  Read story

The Urge to Purge: When to Dump Data

When business data is saved on magnetic media, traces are often left on disks and tapes -- even when employees hit the delete button. But technology is avail...  Read story

Getting Staff Buy-In to Adopt New Tech

A host of workplace tools now give employees more ways to work together and help your business cut costs. But you only experience the gains if your staff wil...  Read story

New Technologies to Thwart Laptop Theft

As laptops become hot items on the black market and to perpetrate identity theft, notebook computers are increasingly being targeted. Here are some new tools...  Read story

Guarding Against the Threat from Within

Most businesses have made sure to protect computer systems and networks from hackers. But the majority of data leaks or breaches of sensitive company informa...  Read story

VoIP: What Are You Waiting For?

Small and mid-size businesses have been suspicious of Voice over Internet Protocol (VoIP), according to surveys. Here are reasons why the time is right to sw...  Read story

Tech Tools to Manage the Back End

From barcoding to "smart" tags, a host of new technologies has become available to help small and medium-sized businesses manage inventory and supply chains.  Read story

Locking Down the Network to Block Malware

Small and mid-size businesses often don't have the resources to protect business computers from spyware and other malicious code. Here are tips to help.  Read story

Human Resources: A Self-Service Application

Paper-based time off requests, beneficiary updates, and pay stubs are becoming a thing of the past. Technology has made HR a self-service function in the sma...  Read story

Email Recovery Services: For Disasters Large and Small

Outages of email from such events as floods, fires, earthquakes, and even more minor disasters, such as virus attacks, are driving businesses to email disast...  Read story

Do You Need Utility Software for Your Business?

Operating systems offer basic utilities, but are they enough for the security of your business or do you need to spring for protection against viruses, spywa...  Read story

How Fast Should Your Network Be?

Speeds for business wide-area networks can range depending upon your provider, your budget, and how big you want your business to be.  Read story

Waiting for the Next Wireless Standard

Despite a series of delays, the next generation wireless -- 802.11n -- will eventually make it to market. But for the very small, there may be no need to wait.  Read story

  • 1
  • 2