The convenience and ubiquity of wirless internet access ensures that an ever-increasing number of people have a tablet, smartphone or other personal electronic device with them just about everywhere they go. And using those tools in the performance of everyday workplace tasks has become so common that we have an acronym for it: BYOD, or Bring Your Own Device. …Read Article
Gradually, imperceptibly, beneath your very fingers on the keyboard, the internet is becoming something different. Many users may never even notice the change, especially since it’s not intended to effect what you see so much as what goes on beneath the surface that lets you see it. Since 1997, the internet has hummed along on …Read Article
Organizations around the country lost over 250 million records in data breaches during 2013 alone. This startling statistic, compiled by the Privacy Rights Clearinghouse, corresponds to more than one record for every adult American. Those records include credit card numbers, health information, employment data and other sensitive information that may lead to identity theft for …Read Article
This feature first appeared in the Spring 2014 edition of Certification Magazine.
“Boss, I think that someone got into my system.” Those are words that no computer user ever wants to utter, and no manager ever wants to hear. Unfortunately, they are heard in offices around the world every day. Last year, the Center for Strategic …Read Article
Recently I was asked whether a person pursuing a career as an Oracle database administrator needs to have knowledge of scripting languages. One answer to that question could be no — if the potential DBA is someone who really likes performing the same basic tasks over and over, day in and day out. Said person …Read Article
A survey shows employees use their personal devices to access work data even if there’s a policy against it.Read Article