Tech Decision Maker

The IT leadership source that will supply you with the knowledge you need to choose technology and best practices that will map to your company's strategic goals.

  • Toni Bowers // April 22, 2008, 6:08 AM PST

    Hiring help at your fingertips

    If you don't have the funds to shell out for one of those "all inclusive" hiring kits that are really much more than you actually need, take a look at the hiring kits offered by TechRepublic Pro.


  • Tricia Liebert // April 22, 2008, 8:59 PM PST

    Court rules that laptop searches at borders is okay

    The Ninth circuit court has ruled that Customs agents need no probable cause to search your laptop or storage devices when crossing a border. This means that they may browse the contents of your laptop, cell phone, or PDA simply because you have those devices when you enter the country.


  • Change Solutions // April 23, 2008, 10:28 PM PST

    Examine group behavior to identify causes of nonperformance in your IT department

    Much is being discussed, written, and applied regarding the IT value chain and the best practices in IT management that focus on three fundamental dimensions: people, process, and technology. However, IT executives must look deeper into their organizations to identify, understand, and address the true source of their successes and failures: the collective behavior of their people.


  • Toni Bowers // April 24, 2008, 11:43 PM PST

    Beware the unmanaged risk of e-mail and IM

    One in five U.S. companies has had employee e-mail subpoenaed in the course of a lawsuit or regulatory investigation. Here are some of the sad outcomes of such lawsuits and what you can do to avoid one with your company.


  • Tricia Liebert // April 27, 2008, 9:14 PM PST

    AMD seeks presence in small to medium business

    AMD announces that they are looking for greater penetration into the small and mid sized business environments. By offing a unique platform, new chip set, and possibly most importantly, platform stability for two years and a three year warranty to replace the customary one year, they might just succeed.


  • Scott Lowe // April 28, 2008, 2:19 PM PST

    Securing the network or invading someone's space? What would you do?

    Scott Lowe describes a hypothetical situation in which a user is guilty of a security lapse. How do you strike a balance between overreacting and maintaining tight security?


  • Jim Wray // May 6, 2008, 10:02 PM PST

    Combine decision strategies to maximize results

    Business Intelligence (BI), Business Process Management (BPM), and Business Rule Engines (BREs) provide value when used as stand-alone technologies. Combined, they can provide even greater value to organizations. Jim Wray shows how you can make them work together.


  • Scott Lowe // April 30, 2008, 7:09 AM PST

    Keeping up with technology changes. How do you do it?

    The other day, I was spending a little daytime downtime with a couple of my staff members to unwind before tackling the rest of the day. Both of these guys, as well as I, have been in IT for quite some time meaning 15 years or more. My network guy is the epitome of a "gray beard" as he's a retired IBMer with vast mainframe experience and he even has the gray beard to go along with it! We were discussing the rate of change in IT and commenting that the rate of change in the field has been accelerating at a must faster pace than it used to. [...]


  • Toni Bowers // April 30, 2008, 12:14 AM PST

    Control shadow IT in your organization

    When renegade departments install new apps or programs without the IT department's knowledge or consent, IT managers can be left with a messy network situation. Read how TechRepublic members manage the problem of shadow IT.


  • Toni Bowers // April 30, 2008, 5:19 AM PST

    How to deal with an unhappy employee


  • Theresa ONeil // May 6, 2008, 10:40 PM PST

    Strategies for enabling more effective IT-Business collaboration with business rule technology

    This blog examines how a Business Rule Engine (BRE) can improve Business Process Management (BPM) by delivering more agile business processes, provide practical approach to a Services Oriented Architecture (SOA), and enable effective collaboration between business and IT. In exploring these topics, we will discuss how technology alone cannot change the way an organization does business.


  • Scott Lowe // April 30, 2008, 11:47 AM PST

    Security vs. relationships. What readers would do when security is breached.

    The other day, I posted a blog entry that asked readers how they would respond to a real world security problem and presented five options. In short, the scenario revolved around the failure of an end-user to secure a list of passwords that could be used to access an organization's ERP system; the password list was left in plain sight on the person's desk.


  • Toni Bowers // April 30, 2008, 11:52 PM PST

    Dealing with employees who want to run the show

    What do you do if you manage a team whose members think they know more than you do, who make their own rules and have double standards. Here are the implications of such behavior and what you can do to change it.


  • Tricia Liebert // May 4, 2008, 8:04 PM PST

    Should I leave the laptop at home? That should be a policy decision

    Business travelers should consider what electronic devices they really need when crossing international borders and leave anything they DON'T need back at the office or packed in checked luggage. With the new rules, border agents can download any of the information contained on your device, or simply confiscate it.