Here are the influential voices leading the conversations where nonprofits and technology overlap.
Although many have tried to proclaim its impending death, e-mail remains a central force in online communications. And the widespread prevalence of e-mail is also having an impact in the real world as well, with the Post Office reporting a significant drop in mail volume because people opt to receive paperless bills and other communications via e-mail rather than snailmail.
Add Jacob Morgan, principal of Chess Media Group and a writer for CloudAve, to the list of defenders of e-mail. He argues that new collaboration platforms should look to take advantage of the strengths of e-mail rather than try to make the technology obsolete.
Let’s remember that everyone has two single unique identifiers, their e-mail and their phone number, chances are that one of these things can be annotated to everything that someone does from sharing a piece of content, to engaging with a customer, to sending a colleague a message.
So here is the puzzle, knowing that virtually everyone on the planet has two unique identifiers, an e-mail address and a phone number, what would you devise to allow for collaboration and communication among employees and among people in general?
Read more about the long life e-mail has ahead of it in Morgan’s piece on CloudAve.
Business continuity plans are a must for any business operating its own data center. And the same is true of those enterprises that have made the shift to the cloud. SMBs should not be lulled into a false sense of security just because they no longer host their own infrastructure. Like any other technology, the unexpected can hit the cloud at unannounced and inconvenient times, producing damaging operational failures.
Cisco’s Small Business blog has boiled down three simple but distinct steps for avoiding a loss of productivity during a cloud outage:
Read more about planning for business continuity during a cloud outage on the Cisco Small Business blog.
The big domestic VMware show was held in in Las Vegas earlier this year at the end of August through early September. But VMware also puts on a European show for European IT workers.
Duncan Epping, a VMware employee and writer of the Yellow Bricks blog, flew over to Copenhagen, Denmark, for the show and he found the experience to be starkly different — at first. It wasn’t as loud or crowded as the VMworld show in Vegas, but Epping eventually found that the smaller event had its own charms.
I also love the fact that it is relatively “small” show compared to VMworld US and for some reason it also seems that the audience is different. Definitely one thing I noticed during the sessions I attended is that it is difficult to break the ice. Even at the end of the sessions I noticed far less people asked questions then during the sessions I attended in Las Vegas. This had me worried for a while as Chris Colotti, Frank Denneman and I were scheduled for a Q and A.
As Chris stated on Twitter, without Qs there will be no As. Besides a couple of sessions I had a lot of meetings scheduled, the week before VMworld my schedule looked fairly empty but it completely filled up with meetings the days before it started, but I cannot complain as I learned a lot from these meetings as well. Every customer has a different use case/perspective and that helps me again when writing articles or when providing feedback to the Product Managers and Engineers.
Did you attend VMworld in Copenhagen by chance? See any interesting VMworld Europe presentations online? Share them in the comments below.
Read more about Epping’s VMworld Europe experience in his post on Yellow Bricks.
Great minds don’t always think alike, but they can generate lots of wisdom and useful advice when they get together.
Ken Oestreich, an EMC employee, attended his company’s IT Leadership Council in Boston and he pulled together some concise, poignant takeaways from the two-day session that every IT worker should look over.
Here are a few of them below:
Read more of Oestereich’s takeaways from the EMC IT Leadership Council in his post on the Fountain Head blog.
For IT workers tasked with managed enterprise security, getting control and access to all the systems and devices within the network is essential to locking down the entire IT infrastructure. But inevitably, there are simply some portions of your IT network that may be untouchable at times, or even of more concern, all the time.
Tenable Security has identified some of the more common IT security untouchables. Here are a few from their list:
How do you handle IT security untouchables? Do you have any useful workarounds you can share? Leave your feedback below in the comments.
For more on IT security untouchables, read the full post on Tenable Security’s blog.
If your organization is a small business with limited resources for a huge IT security rollout or initiative, there are two simple ways to raise awareness within your company. And they don’t cost much either.
Andy Good of the Intel Open Port IT Community discusses the challenges that smaller companies can face in securing spending for IT security expenses and he has two smart and easy ways to raise the red flag.
Security Awareness Training: This is one area that should not be taken lightly. It is the opportunity to inform the users on how to protect the corporate information assets and what is described in the security policy, why it exists and how to gain further information whenever needed. If this effort does not currently exist, consider an effort to integrate it into the new employee orientation first. Then, after some success can be demonstrated, the training could be provided through WBT’s on an annual or biannual basis. The success may be shown in surveys to users who have taken the training. A Bulletin Area: Such as the corporate intranet site or a monthly newsletter distributed throughout the organization. Including some common threats and techniques for avoiding being a victim is a good way to remind users that their activity plays a factor in the vulnerability equation.
Read more about boosting the profile of IT security internally in Good’s post on the Intel Open Port IT Community.
If you or your organization is new to Microsoft’s Office 365, BizTech magazine has put together a useful guide of the cloud-based productivity suite’s advantages and features.
If you’re unfamiliar with Office 365, the guide serves as a useful gateway into understanding the offering’s capabilities and identifying opportunities for increased efficiencies within your organization.
Check out our guide to Microsoft Office 365 here.
Find great content from the bloggers listed here and other IT blogs by checking out our 50 Must-Read IT Blogs.