The 10 most influential leaders in business technology in 2008



The 10 most influential leaders in business technology in 2008

Tech Sanity Check

Technology continues to be a powerful force for transforming business, when used wisely and correctly. Here is a list of the top 10 visionaries and executives who made the biggest impact on the business technology world in 2008.

Subscribe to Tech Sanity Check RSS


The Future of Business Intelligence: Download your eBook now!

Enterprises look at Business Intelligence as the next frontier after deploying ERP, Financial Management and other IT Systems. So the future role of IT Departments will be to enhance the Finance and Business Value Chains with BI. Download your eBook Now to learn more about the Future of BI.


New zero-day IE7 exploit is in the wild
A new IE7 exploit is now making the rounds. It has already been incorporated in toolkits that install information-stealing trojans. Read on to learn more.

Does offensive spam open us up to a lawsuit?
In general, only a fraction of spam gets through filters, but can those spam filter failures create legal liability for an organization?

New solutions to remotely secure a stolen laptop
In the past, a lost laptop automatically meant a compromise of whatever confidential data it contained. This is changing for the better, however. Paul Mah discusses the latest developments on the anti-theft front, featuring remote management or deletion of data for laptops that are lost or stolen.

The 10 Cisco IOS Router file management commands you must know
David Davis
goes over the Cisco IOS commands you must know to manipulate files on your Cisco router flash, nvram, or other filesystems, allowing you to back up your configuration, upgrade your router, or just maintain the IOS file system.

Poll: How do Netbooks fit into your business' IT roadmap for 2009?
ZDNet correspondent Sumi Das talks with Editor in Chief Larry Dignan about Netbooks, the "mini-me" of laptops. Dignan discusses the gadget's intended use vs. the everyday reality and how Netbook sales are shaping up this gloomy shopping season.

Next-generation firewall...really
Jay Rolllins: My shop has been combating some pretty nasty battles with P2P file sharing, anonymizers like TOR and Hopster, Web-based e-mail, Google Docs, IM clients that you can attach files to. Could this new generation firewall from Palo Alto Networks be the answer?

How do you contribute to open source?
Even if you don't write code for open source software projects, there are many ways to help out on these projects. Take this poll to let us know how you contribute to open source.

Return to your last editing location when you open a Word document
Finding your way back to the spot where you left off can be tricky, especially in a long document. Here's a keyboard shortcut that will take you there when you reopen a document -- plus a nice bunny macro that will do it automatically.

CRM via snail mail: Things IT needs to look for
The key to good one-to-one marketing via the postal system or post card sign-ups is linking the outbound campaign data with the inbound data captures.

Check out Today in Blogs on TechRepublic.

Frenemies: The 12 most complicated relationships in tech
The technology world is full of strange bedfellows - companies that have tenuous partnerships based on common goals while also competing heatedly against other for the hearts (and dollars) of users in certain markets. See a list of the top 12 "frenemies" in tech.