'Net Buzz: Twitter limits searches on site … why? Two Twitter questions have been nagging at me: Why on Earth would Twitter limit the number of searches a user may conduct -- a typical, relatively new user, such as me, not some piggy third-party app or bot? 'Net Insider: U.S. export controls: Ensuring obsolescence and declining economic competitiveness The United States places a thicket of controls on the export of high-tech knowledge and products, and numerous restrictions on non-U.S. researchers in U.S. research centers. In recognition of the stupidity of these controls, the National Research Council is calling on the new administration to dramatically change the rules. Small Business Tech: New Year's Resolution 2: Better sales compensation management Figuring a good sales compensation plan is like making oil and water blend smoothly. Sales people always think management is cheating them out of commissions. Management always thinks sales people are stealing them blind. Owners of smaller companies who manage the sales people themselves often focus on the dollar paid in commission rather than thinking of the associated $20 of company revenue. Gearhead: Finding music online and driving IMAP Mark Gibbs discusses a cool utility for finding and recording just about any music you like and sings the praises of scripts that are really useful with GMail. Guest Column: Can Mozilla Prove Firefox Is the Most Secure Browser A little over a year ago, I challenged some of the security claims asserted by Mozilla that Firefox "won't harbor nearly as many security flaws as those that have Microsoft's Internet Explorer" with an Internet Explorer and Firefox Vulnerability Analysis. Of course, the publication of my report was quickly followed by a vigorous rebuttal from Mozilla's Mike Shaver (please do read it, so you have his viewpoint). Eye on the Carriers: Eye on 2009: Telecom predictions for the New Year Johnson Last week we looked at how well the Eye of the Carrier predictions held up for 2008. This week, let's peer into the crystal ball for 2009. You'll notice a few similarities — and a couple of key changes — for this year. Insider Threat: How to tell which employees are more of a security risk Recently I have read quite a bit about "insider threats" and the potential for losing customer data. But not everyone is bad, so how can I tell if I need to pay attention to certain employees? Cool Tools: Four things to watch post-CES As the dust settles from the 2009 Consumer Electronics Show, here are four trends worth looking at based on some products that were announced at the show. Guest Column: Connect to Customers with Twitter Either your customers already use social networking tools or you have an untapped, online audience. So get out there and network on Facebook, MySpace, and any of the other popular destinations. But do it on your own terms with whatever feels right; everyone can see through a business trying to co-opt new media. Here's how to make the most of one of the current favorites, Twitter. Talking Tech: Surges, outages, and blackouts -- oh my! Ever been relaxing at home, in front of the television or working on your computer when suddenly the power went out? It's annoying to miss a favorite show or lose a project, but what is merely an annoyance in our personal lives can be costly and even fatal to the livelihood of small and midsize businesses (SMB). |
No comments:
Post a Comment