• The spam-tastic year 2000

    Posted January 10, 2001 - 2:17 pm

    My first workday of each New Year starts with a tradition: deleting last year's e-mail.
  • Master the tele-meeting

    Posted January 10, 2001 - 12:49 pm

    You're working remotely when the boss hands down a new project with a tight deadline. You've got to get the team together pronto, but there's no time to make the trip to the main office. Instead, you'll need to lead a virtual meeting -- either via phone or videoconference -- one that ensures everyone walks away informed of the scope and purpose of the project.
  • How to manage employees remotely

    Posted January 10, 2001 - 12:45 pm

    Telemanaging -- the art of managing employees remotely -- can be an arduous task.
  • Managing remote workers in the real world

    Posted January 10, 2001 - 9:45 am

    What happens when a teleworker needs IT help.
  • Plugging the skills gaps

    Posted January 10, 2001 - 9:40 am

    Bank One finds that skills assessment and training generate impressive returns.
  • How to save thousands of dollars with voice-over-IP

    Posted January 9, 2001 - 6:22 pm

    Aramark has more than 28 facilities plants and 200 offices nationwide. Keeping the voice networks at each site running efficiently and adding new features was a challenge, says Ash Patel, Aramark's director of IT infrastructure.
  • Fire your recruiting department

    Posted January 9, 2001 - 6:04 pm

    Professionals who entered the work force in the 1970s and '80s faced an entirely different job market than the one encountered by today's entry-level workers. At a time when unemployment vacillated between 8 and 10 percent, roughly 15 million individuals were chasing a mere million jobs; essentially, workers were lining up in hopes of being selected and praying for divine intervention.
  • Offer workers menu of handheld options

    Posted January 9, 2001 - 9:48 am

    Gartner Group analysts are recommending that companies set up a cafeteria-style plan for purchasing handheld devices to let workers select the models they want within a certain spending cap.
  • Triggering Trig Functions

    Posted January 9, 2001 - 1:00 am

    * Webcast: Broadband Wireless...Get in the Ring

  • The CIO type

    Posted January 8, 2001 - 5:06 pm

    How do you become a CIO without a technical IT background?
  • Wireless glossary

    Posted January 8, 2001 - 3:56 pm

    Glossary of wireless communications terms
  • 10 myths about knowledge management

    Posted January 8, 2001 - 3:10 pm

    As knowledge management becomes more widely adopted, misconceptions about what it is and isn't have also become more widespread. Author and Communispace Senior Vice President Kathy Curley touches on the top 10 myths about knowledge management in her upcoming book: A Pocket Manager's Guide to Knowledge Management.
  • 10 hidden benefits of Windows 2000 Professional

    Posted January 8, 2001 - 2:46 pm

    Windows 2000 Professional doesn't come with a printed manual, so many users may not have discovered these 10 features that enhance productivity -- but aren't easy to find in the online help.
  • Hiring is still a very long processs

    Posted January 8, 2001 - 2:12 pm

    The behavioral interview is becoming a key part of the hiring process for many companies, as they realize that the best way to hold on to staffers later is to have hired compatible workers in the first place
  • Denial-of-service victims share lessons learned

    Posted January 8, 2001 - 11:20 am

    SAN FRANCISCO -- When online news service ZDNet was hit with a ferocious denial-of-service attack in February, its server was overwhelmed with 50% to 100% more data traffic than its peak load, rendering three-quarters of the site inaccessible for almost three hours. Site managers discovered there was little they could do to halt the first of two attacks that consumed all their available bandwidth.

  • How to draw up an RFP for your e-business

    Posted January 8, 2001 - 10:24 am

    The explosion of the new e-conomy has irrevocably altered the best practices for all businesses, from global Fortune 50 companies to shoestring startups.
  • Taking Control of the Application, Part 2

    Posted January 8, 2001 - 1:00 am

    * Ken continues exlaining CEdit's features COMMUNITY DISCUSSIONS * Webcast: Broadband Wireless...Get in the Ring

  • The best-kept security secrets

    Posted January 5, 2001 - 3:06 pm

    Each year, your risk for a hack attack grows. In 1999, 9,859 security incidents were reported to Carnegie Mellon University's CERT Coordination Center, a premier computer emergency response team. By June 2000, the number had already reached 8,836. Better awareness accounts for some of the increase, but not all: People submitted information on 417 software vulnerabilities to CERT in 1999. By mid-year 2000, that number had already reached 442.
  • How to spend a dollar on security

    Posted January 5, 2001 - 8:57 am

    In order to help companies determine the best use of their resources, Patrick McBride, executive vice president of METASeS, shows how to carve up a single dollar in a first-year security budget.
  • Newsgroups

    Posted January 5, 2001 - 1:00 am

    * An introduction to newsgroups and netiquette COMMUNITY DISCUSSIONS * Does KDE help pave the road from Windows to Linux?

    SERVICES * IT Job Spot: Exclusive opportunities with hot companies
  • A guide to original SYN

    Posted January 4, 2001 - 2:42 pm

    To understand how ports work and the ways they behave, we need to understand how TCP/IP functions.
  • Storms in the network backbone

    Posted January 4, 2001 - 12:54 pm

    Storms are bad. They cause havoc, disrupt people's lives and damage property. Network storms, although rarely life threatening can be equally disruptive.
  • How to stamp out RTF viruses, fix TweakUI, and more

    Posted January 4, 2001 - 10:40 am

    If you thought RTF files were benign from a virus-carrying point of view, you might want to think again. DOC files can be disguised as RTF files, and hacked RTF files can crash an e-mail reader without your even opening at attachment.
  • Regular Expressions Tutorial, Part 4: More Quantifiers

    Posted January 4, 2001 - 1:00 am

    * The last of the single-character quantifier and the bounded quantifier COMMUNITY DISCUSSION * RFP Exchange: Need help with your next e-business project, NOW?

  • Windows users reveal latest tricks

    Posted January 3, 2001 - 4:29 pm

    THIS WEEK MY READERS have once again sent in several excellent tips to make Microsoft Windows easier to use -- or to make it usable at all for some of their programs.
Ask a Question