Article archive for 2008 – Page 2

Wednesday, October 1, 2008

Thriving in a changing economy, understanding the economic upheaval

Many of you know that some years back Editor-in-Chief David wrote a pretty well-received book called The Flexible Enterprise, which was all about how businesses can manage and thrive in a changing economy. Over the past week, we’ve gotten a bunch of letters from readers asking about how all the economic fuss we’ve been experiencing will affect their jobs, their businesses, and the world of tech. In this important article, David shares with you some background that can help you understand the situation better. He also provides some coping strategies that will help you make it through this thing and come out solid on the other side.

Read More→
Wednesday, October 1, 2008

Fighting back against cybercrime

In this all-new book review shootout, we put five books to the test. Read on to learn how Crimeware: Understanding New Attacks and Defenses by Markus Jakobsson and Zulfikar Ramzan, Internet Forensics by Robert Jones, Phishing Exposed by Lance James, Aggressive Network Self-Defense by Neil R. Wyler, Bruce Potter, and Chris Hurley, and Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft by Eric Cole and Sandra Ring stand up to our editorial review.

Read More→
Monday, September 1, 2008

Separating fact from fiction: Sarah Palin’s email problems exposed

Wednesday morning, the phone started ringing here at ZATZ HQ and it didn’t stop for the next two days. Members of the media were feeding on the news that Republican Vice Presidential nominee Sarah Palin’s Yahoo email account may have been hacked, and since our own David Gewirtz is one of the nation’s leading experts on the issue of Presidential email, he was being asked to comment. The following article by John Oram of the IT Examiner is the result of one such interview. John and his publisher Mike Magee have graciously granted us permission to reprint John’s article.

Read More→
Monday, September 1, 2008

Differentiating between internal and external emails when applying an Outlook signature

In this fascinating article, Rex Weston tells us how he created the Signature-Switch Outlook add-on. It’s a great insight into product design and development and is a must-read for any product developer and anyone who uses products developed by others.

Read More→
Monday, September 1, 2008

Five rules for successfully switching to Exchange without tears

Switching to Exchange proved to be quite the learning experience and, from it, Adrienne Gonzalez developed five important rules for anyone planning to make the jump. In this article, she explains each rule. Somehow, she manages to make an article on switching to Exchange both informative and entertaining.

Read More→
Monday, September 1, 2008

Some tips for finding missing Outlook Express files

Mike and Judy (oh, I so hope Mike’s nickname is "Punch") wrote us in the hopes of finding some lost Outlook Express email messages. This article provides some tips that might help them find those messages.

Read More→
Friday, August 1, 2008

The coming cyberwar

In addition to his job here at ZATZ, David Gewirtz is also the Cyberterrorism Advisor for the International Association for Counterterrorism and Security Professionals and a columnist for The Journal of Counterterrorism and Homeland Security International. As you probably know, Russia has attacked Georgia (Tblisi, not Atlanta) with tanks and troops. However, before the physical attack, there was a cyberattack against many of Georgia’s online resources. First indications seemed to imply the cyberattack originated as a Russian offensive, while later analysis by some sources dispute that, claiming that "script kiddies" are behind the assault. David wrote this article for the current issue of Counterterrorism. Given the timing of the Georgia attack, we felt it’d also be of interest to our Computing Unplugged and OutlookPower readers and are reprinting it here with permission.

Read More→
Friday, August 1, 2008

Ten ways to remove the roadblocks to change

A few weeks ago, we ran the first part of Brothers in arms: change management and project management. In that article, we explained how change management and project management work together to accomplish change. In this article, we’ll look at ten ways to remove the common roadblocks that get in the way of change being realized.

Read More→
Friday, August 1, 2008

Brothers in arms: change management and project management

Change management can’t be successful without project management, because project management enables change management, and change management, by its very nature, actually creates projects. In this helpful article, we’ll look at how these two management disciplines might help manage IT projects in the organization.

Read More→
Friday, August 1, 2008

How to make rules stop processing

This week, we have a question from Mike Cottle. He’s baffled about how to stop processing rules. For once, the answer is easy and quite doable.

Read More→