beca - News, Features, and Slideshows

News about beca
  • Cisco to buy OpenDNS to boost Security Everywhere initiative

    Cisco is acting quickly on its new Security Everywhere initiative with the announcement that it plans to buy Internet security service provider OpenDNS for $635 million in cash plus other considerations.

    Written by Tim Greene01 July 15 00:57
  • The dirty secrets of project management revealed

    For business systems, the project go-live date really does matter -- and project managers seem willing to sacrifice budget limits more often than they're willing to blow past a scheduled deadline. There are sound business reasons for doing this as bonuses, commissions and stock valuations depend upon the revenues and earnings for the quarter. So you don't want to make any changes that would mess up this quarter's results, but you do want to implement changes as early as possible next quarter.

    Written by David Taber30 June 15 06:09
  • Hijacked medical devices can leave networks exposed

    Hacked medical devices can pose direct dangers to patients but also serve as lairs from which malware finds its way into medical facilities' networks and persists even after initial attacks have been cleaned up, according to a new report.

    Written by Tim Greene16 June 15 21:08
  • Apple, Google and others look to goose mobile payments

    Because of slack buyer interest and other obstacles facing mobile payments in the U.S., Apple and other companies must inject new features and inducements to boost adoption.

    Written by Matt Hamblen06 June 15 06:07
  • Home security demystified: How to build a smart DIY system

    Everyone wants their home to be safe and secure, yet <a href="http://www.safeguardtheworld.com/statistics.html">only 17% of homeowners</a> own a home security system. Why? Because traditional systems cost hundreds of dollars to install, require long-term contracts and mean a lifetime of monthly fees.  

    Written by By Jennifer Tuohy28 May 15 22:34
Tutorials about beca
  • 5 ways to handle comment trolls on social media

    Social media has become a new way to find new customers, provide support, market products, share news and even develop customer relationships. Because of the free-form nature of services like Twitter and Facebook, large companies can enjoy the benefits of frequent personal interaction. Dell can "like" a comment from a happy laptop owner on Facebook, Bristol-Myers can share corporate news directly with their 67,000 followers on Twitter.

    Written by John Brandon15 June 15 23:16
  • How to Pick the Best Browser for Your Enterprise

    Knowing which browser to deploy in a large company is no easy task. The default option is Internet Explorer, but many users balk at this older, more cumbersome browser that seems to attract the most malware. Google Chrome gets most of the attention these days (as proven by a growing market share) and Mozilla Firefox offers good compatibility and speed. To determine which browser is the best for business, it's important to keep tabs of the latest improvements. Here's a look at the Big 3 with an eye on the enterprise.

    Written by John Brandon09 Dec. 14 03:16
  • How to Install Git, Ruby and Jenkins on Windows

    This article provides supplemental instructions to the piece How to Expedite Continuous Testing. Specifically, it explains how to install Git, Ruby and Jenkins on Windows (as opposed to a Mac or Linux environment).

    Written by Matthew Heusser, Jared Short14 Aug. 14 23:59
  • 3 Free Alternatives to Windows for Desktop PCs

    It's an increasingly mobile world -- and the mobile future of Windows is dubious. To better accommodate end users, CIOs would be wise to consider these three alternatives to Windows on the desktop -- Chrome, Android and Ubuntu.

    Written by John Brandon24 March 14 12:56
  • 8 Tips to Deal With Liability When Outsourcing to Multiple IT Vendors

    Parceling out an IT services portfolio among a number of vendors is the new normal for IT outsourcing. However, these multi-sourcing arrangements are complicated -- if things go wrong there's no single provider to blame. Here are eight steps you can take to manage liability in a multi-sourced environment.

    Written by Stephanie Overby21 Feb. 14 19:41
Features about beca
  • Why every CIO needs a cybersecurity attorney

    Cybersecurity has long been one of the main issues keeping CIOs awake at night. Now, with the number of high-profile cyberattacks seeming to increase each month, security is haunting IT leaders during the daytime, too.

    Written by Kacy Zurkus04 Aug. 15 23:30
  • Windows 10 fragmentation? What fragmentation?

    Microsoft's Windows 10 will not have a fragmentation problem, analysts argued, even though its rapid development tempo and a host of update cadences will spin off so many versions that not everyone will be running the same code, or even have the same features, at any one time.

    Written by Gregg Keizer13 July 15 22:04
  • How to hire for personality and train for skills

    Finding talent with the right skillset for your company is not nearly as difficult as finding the right personality fit. As important as skills and technical know-how are, team chemistry is just as important - if not more so. One mismatch can cause a negative ripple throughout the organization -- or worse, it could negatively impact relationships with customers and, eventually, the bottom line.

    Written by Sharon Florentine05 June 15 00:15
  • Why companies opt to insource for IT innovation

    Companies are increasingly taking a multisourcing approach to IT outsourcing, signing shorter, smaller deals with a mix of providers. At the same time, some are pulling certain pieces of the IT portfolio back in-house.

    Written by Stephanie Overby17 March 15 07:21
  • Decisions, decisions: Choices abound as data center architecture options expand

    When the American Red Cross talks about mission-critical systems, it's referring to the blood supply that helps save lives. The non-profit organization manages 40% of the U.S.'s blood supply, so stability, reliability and tight security are of paramount concern, says DeWayne Bell, vice president of IT infrastructure and engineering.

    Written by Esther Shein22 Dec. 14 22:09
[]