Galen Gruman

Articles by Galen Gruman

How to protect your mobile data

The simplest way to protect data on mobile devices is to not store it there in the first place. Encrypting data on mobile devices, or adopting remote access tools to stop information leaving the confines of the data center, are some other ways of protecting data.

Desktop virtualization centralizes apps to manage PCs

The promise of desktop virtualization technology is to centralize applications at the datacentre to make them easier to manage and provision -- stretching hardware resources and keeping nagging software conflicts to a minimum in the bargain. In some cases, the same technology helps accomplish all three, bringing greater control and flexibility to IT without users mourning the loss of "their" beloved desktops.

eFashion dressess up clients with open source Web sites

To deliver branded e-commerce sites for customers such as JLO by Jennifer Lopez, Members Only and OP, eFashion Solutions wanted a platform it could easily customize and enhance, without being chained to custom, homegrown code. Open source was the answer, said Mitch Pirtle, the company

Five essentials to wireless security

Wireless security? Conventional wisdom on wireless networks goes like this: They are inherently dangerous. They can leak your secrets to the outside world, through easily accessible radio waves. You'd be better off carrying around your corporate treasure in a sieve.

Wireless LANs face next challenges

LAN managers and CIOs can breathe a little easier, now that solid security standards are available for wireless LANs (WLANs). Last summer, the IEEE...

Fast track business degrees

Many technology execs want entry-level IT employees to hit the ground running, with concrete skills for real IT work. And they often don't see that in college grads, who typically require on-the-job training or additional certification from vocational technical schools.

Tech News