August 05, 2012

Build your leadership library
with these specials on over 225 115 titles you may have missed. All titles are at least 40% off the list price and are available only in the quantities shown. These are new and not used books. More titles will be added as they come available.

Calculating Cloud ROI: From the Customer Perspective 
Marketing hype claims that cloud computing can help any enterprise meet most IT service needs at a lower total cost of ownership (TCO) and higher return on investment (ROI). ... To determine whether the cloud is a viable option, it is necessary to separate the hype from reality.

What will Facebook look like in 2022?
Facebook won’t always exist. Sure, a company named Facebook will exist and sure, it will have a social network that is hosted on Facebook.com. But Facebook as our go-to social network has a finite lifespan.


The Economist Examines Supply Chain Risk
If you are part of senior management in any company, you probably spend a lot your time mitigating risk. Is the economy going to help or hurt our bottom line? Is our turnover rate too high? Will our innovative new product ship on schedule?

Two Business "Mistakes" Every Company Should Make
Two of the seven “mistakes” John names are actually strategic weapons I’d suggest every company–especially in its early and growth stages–consider strongly.

The next chapter in the ultrabook saga: 'Haswell'
Haswell is probably the first mainstream PC-class chip from Intel designed with really thin, small PCs in mind from the get-go. It will also probably pack a mean graphics punch (i.e., bigger performance uptick than usual).

After defeat of Senate cybersecurity bill, Obama weighs executive-order option
Senate Republicans recently blocked cybersecurity legislation, but the issue might not be dead after all. The White House hasn't ruled out issuing an executive order to strengthen the nation's defenses against cyber attacks if Congress refuses to act.

The Next IT Revolution: Bring Your Own ID
Nearly everywhere, the network ID – from username and password to the security card – remains firmly under the control of central IT. Why, in the second decade of the 21st century, is this still the norm? And more importantly, is this status quo about to change?



Quote for the day:

"Concentration comes out of a combination of confidence and hunger." --Arnold Palmer