Bullet-proofing Instant Messaging

  • Source: Symantec
  • Written By:
  • Published:
  • (Originally Published On:) )
As more corporations adopt instant messaging (IM), chief information officers (CIOs) and IT managers are learning that it can be a serious source of liability and security exposure. Users, it seems, simply don’t understand the losses and exposures that can result from incautious IM use. Find out how security software solutions can help you reap the benefits of IM without exposing your company to unnecessary risk.

Featured Software Research:

Can You Really Support Business Continuity Requirements? Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center

Enterprises and service providers are challenged to ensure they have enough compute capacity in their virtualized data centers to support business continuity requirements, while not overprovisioning infrastructure capacity. Learn about the challenges introduced by affinity rules and how to manage them, and how “what-if” hypotheticals can help you plan for, or avoid, future capacity scenarios.  Read More

Five Questions About the Use of Text Messaging for Collections

The mobile phone has become the primary communications device for many people, and text messaging is a key channel. Eighty-three percent of text messages are opened within three minutes, yet few collections organizations leverage the power of this channel. Many collectors have questions about incorporating text messaging into their strategies and how to ensure they stay in compliance with applicable laws and regulations.

In order to contact a debtor on their mobile phone, do you need to... Read More

Performance Feedback beyond the Annual Appraisal: Feedback via Technology Linked to Positive Employee Attitudes

  • Source: IBM
  • Written By:
  • Published:
Effective feedback is critical for employees to improve their work performance, which, in turn, drives business growth. Feedback helps to reduce ambiguity and uncertainty about what goals to pursue, to understand what behaviors are required for success, and to know how others view and evaluate one’s performance.

With workplace communication and collaboration technologies becoming ever more commonplace, and timely face-to-face communication becoming less feasible due to ever-growing virtual... Read More

You may also be interested in these related documents:

Case Study: Hartman Rauta Oy

  • Source: IBM
  • Written By:
  • Published:
Hartman Rauta Oy (Hartman) had been using IBM Lotus Notes V7 software as its legacy e-mail and messaging platform. Although satisfied with the existing system, the company wanted to take advantage of updates and improvements available in the latest version. Hartman also wanted to implement a virtual group working environment to support improved communication and collaboration. Learn how Hartmann managed the update. Read More

Beyond Instant Messaging

Speed and agility are increasingly important elements to success in a wide variety of domains. As a result, the Internet is becoming a more dynamic, user-centric, real-time environment. In this white paper, we explore characteristic technologies of the real-time Internet and how enterprises, governments, service providers, and other organizations can leverage those technologies to build competitive advantage. Read More

Error Proofing with RFID

Carefully tracking components and assemblies throughout the manufacturing process can prevent costly production and sequencing errors, but executing these procedures can be difficult. While bar codes provide accurate, efficient product identification, they are not viable in many common industrial processes. Specialized RFID tags, however, are optimized for use on or around metal, and are an effective and viable alternative. Read More
 
comments powered by Disqus