<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.7.2" -->
<rss version="2.0">
    <channel>
        <title>ICT COMMUNITY PORTAL</title>
        <description>ICT COMMUNITY PORTAL</description>
        <link>http://ict.root-technologies.net</link>
        <lastBuildDate>Sat, 04 Apr 2026 16:31:10 +0100</lastBuildDate>
        <generator>FeedCreator 1.7.2</generator>
        <image>
            <url>http://ict.root-technologies.net/images/rss.gif</url>
            <title>ICT COMMUNITY PORTAL</title>
            <link>http://ict.root-technologies.net</link>
            <description>Feed Provided byICT COMMUNITY PORTAL Click to visit.</description>
        </image>
        <item>
            <title>HTC Reiterates Strong Commitment To MENA Region With Introduction Of Cutting-Edge Smartphone ...</title>
            <link>http://ict.root-technologies.net/OneArticle-358-HTC Reiterates Strong Commitment To MENA Region With Introduction Of Cutting-Edge Smartphone Techonology-ICT COMMUNITY PORTAL.html</link>
            <description>Company’s progression marks new era for HTC in the region with the introduction of six innovative offerings coming in the second quarter of 2011.

</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>2010 Threats Year In Review: Toolkits Dominated The Cybercriminal Scene</title>
            <link>http://ict.root-technologies.net/OneArticle-356-2010 Threats Year In Review: Toolkits Dominated The Cybercriminal Scene-ICT COMMUNITY PORTAL.html</link>
            <description>The rise of toolkits turned non-techies into hackers; pharmaceutical spam and mobile threats took center stage in 2010, according to Trend Micro threat researchers.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Success Story: Human Transport Company Gets A Lift With R&amp;M Solution</title>
            <link>http://ict.root-technologies.net/OneArticle-354-Success Story: Human Transport Company Gets A Lift With R&amp;M Solution-ICT COMMUNITY PORTAL.html</link>
            <description>
Client: Schindler Holding AG

Construction of Five-Story Training Center in Ebikon, Switzerland.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Global Threat Trends – January 2010</title>
            <link>http://ict.root-technologies.net/OneArticle-346-Global Threat Trends – January 2010-ICT COMMUNITY PORTAL.html</link>
            <description>The Top Ten Threats for January 2010 at a Glance.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Success Story: New Cabling At Schiphol Data Center In Amsterdam</title>
            <link>http://ict.root-technologies.net/OneArticle-342-Success Story: New Cabling At Schiphol Data Center In Amsterdam-ICT COMMUNITY PORTAL.html</link>
            <description>Client: Schiphol Group

Data and communications network for a world leader in airport operations, to support air traffic management, airport operations and facilities in airport cities. Compact, high-grade shielded Cat. 6 S/FTP cabling. Installation of prefabricated modules and data center implementation.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Structured Cabling Training A Priority Not An Optional Extra</title>
            <link>http://ict.root-technologies.net/OneArticle-340-Structured Cabling Training A Priority Not An Optional Extra-ICT COMMUNITY PORTAL.html</link>
            <description>Traditionally, training for structured cabling has been viewed as an optional extra in the industry and as a result, there are a number of installers who have had little or no formal training.  </description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Multimedia in the Home  What Infrastructure is Needed</title>
            <link>http://ict.root-technologies.net/OneArticle-338-Multimedia in the Home  What Infrastructure is Needed-ICT COMMUNITY PORTAL.html</link>
            <description>This white paper is intended as a guide to provide arguments for installation decisions involving residential properties.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Power over Ethernet plus</title>
            <link>http://ict.root-technologies.net/OneArticle-332-Power over Ethernet plus-ICT COMMUNITY PORTAL.html</link>
            <description>New White Paper from R&amp;M gives network planners information about cabling requirements and risk factors. More electrical energy through data cables: That will be the result of the forthcoming “Power over Ethernet plus” standard (PoEplus). A new White Paper from the Swiss cabling specialists R&amp;M gives information about the consequences and risks of PoEplus.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>ZTE Anyservice Forum </title>
            <link>http://ict.root-technologies.net/OneArticle-327-ZTE Anyservice Forum -ICT COMMUNITY PORTAL.html</link>
            <description>With the theme &quot;Information, Content, and Entertainment&quot;, ZTE Anyservice Forum arrived in Egypt as a third 9-country value added service forum.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>The Iso 17799 The Definite Guide For Security Geeks (Part 7)</title>
            <link>http://ict.root-technologies.net/OneArticle-326-The Iso 17799 The Definite Guide For Security Geeks (Part 7)-ICT COMMUNITY PORTAL.html</link>
            <description>By: Omar Sherin from Egypt

In this part of the ISO series we will discuss the 8th section of the standard, this section (Communication and Operations Management) deals with how a typical organization should handle its IT operations.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Rfid THE CUTTING EDGE OF SUPPLY CHAIN MANAGEMENT</title>
            <link>http://ict.root-technologies.net/OneArticle-325-Rfid THE CUTTING EDGE OF SUPPLY CHAIN MANAGEMENT-ICT COMMUNITY PORTAL.html</link>
            <description>By: Tamer Abdel Kader from Egypt

For many years, the barcode-based systems have dominated the FMCG &amp; supply chain markets. But many expect this era to dim; as the new Radio Frequency Identification (RFId) is strongly preparing to take this place.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>IT Policy &amp; Security Compliance (Part Two) </title>
            <link>http://ict.root-technologies.net/OneArticle-320-IT Policy &amp; Security Compliance (Part Two) -ICT COMMUNITY PORTAL.html</link>
            <description>
SIEM deployments cut across organizations’ boundaries. In IT you can expect to involve stakeholders in architecture, operations, help-desk, and security functions. Within business management, you may need support from finance, HR, compliance, risk management, and the sponsoring C-level executive. It’s essential that any SIEM project secure buy-in from all stakeholders before work begins in earnest. Once the team is assembled, you are then ready for the 4-step process to perfect SIEM preparation.
</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Home Networks</title>
            <link>http://ict.root-technologies.net/OneArticle-318-Home Networks-ICT COMMUNITY PORTAL.html</link>
            <description>
Although many houses will stand for centuries, a lot of cabling systems won't last a single decade. That's because communications are more demanding nowadays, incorporating voice, entertainment, information and home office applications. You can't get by any more with just a phone socket in the corridor and individual add-on extensions.
</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Egypt: A Hotbed For Mobility</title>
            <link>http://ict.root-technologies.net/OneArticle-315-Egypt: A Hotbed For Mobility-ICT COMMUNITY PORTAL.html</link>
            <description>
The Egyptian telecom industry is one of the fastest growing markets in the Middle East and North Africa. In particular the country is better positioned over regional peers due to the following:</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Cisco Delivers New Unified Communications Solutions </title>
            <link>http://ict.root-technologies.net/OneArticle-314-Cisco Delivers New Unified Communications Solutions -ICT COMMUNITY PORTAL.html</link>
            <description>Cisco introduced a new suite of applications that allow business organizations in the Middle East to use their network as a platform for more enhanced effective and personalized business collaboration. </description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Home Networks (Part Two)</title>
            <link>http://ict.root-technologies.net/OneArticle-311-Home Networks (Part Two)-ICT COMMUNITY PORTAL.html</link>
            <description>By Reichle &amp; De-Massari (R&amp;M)


Although many houses will stand for centuries, a lot of cabling systems won't last a single decade. That's because communications are more demanding nowadays, incorporating voice, entertainment, information and home office applications. You can't get by any more with just a phone socket in the corridor and individual add-on extensions.
The necessary infrastructure has to be planned – for new buildings just as much as for those being renovated. In principle, the same well-proven and tested technologies can be used as in the office world. With intelligent planning, the additional costs are moderate, and the installation increases the long-term value of the building. This article points out the factors that need to be taken into account.
</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>The ISO 17799 The Definite Guide For Security Geeks </title>
            <link>http://ict.root-technologies.net/OneArticle-310-The ISO 17799 The Definite Guide For Security Geeks -ICT COMMUNITY PORTAL.html</link>
            <description>In this part of the ISO series we will discuss the eights section of the standard, the section (Communication and Operations Management) focusing on corporate email.

Email did come a long way till it became the 2nd human communication method after phones. The control 8.7.4 deals with email security and its associated risks. 
</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Getting More From Your Information</title>
            <link>http://ict.root-technologies.net/OneArticle-307-Getting More From Your Information-ICT COMMUNITY PORTAL.html</link>
            <description>
Storage is not just about buying products anymore. It has emerged to be a critical part of the data lifecycle across enterprises. From playing a key role in ensuring business continuity, to information life cycle management, backup of critical data, disaster recovery to meeting compliance norms, storage is a business strategy. In this special FAQ, storage experts from STME, the Middle East’s leading storage integration and implementation player give you expert advice.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Changing The World Again </title>
            <link>http://ict.root-technologies.net/OneArticle-306-Changing The World Again -ICT COMMUNITY PORTAL.html</link>
            <description>By working with governments, industry, individuals, and organisations in 112 countries and over 1,300 cities worldwide, Intel is contributing to economical development, skill development, and opportunity creation and is able to respond to the unique needs of citizens across the globe, making a quantifiable difference to digital inclusion. </description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Backing Up Exchange 2007 Using Veritas 11d</title>
            <link>http://ict.root-technologies.net/OneArticle-305-Backing Up Exchange 2007 Using Veritas 11d-ICT COMMUNITY PORTAL.html</link>
            <description>
Well, most of us had issues with backing up Exchange 2007 using Veritas 11d. I fought for over two months to get it working and finally I did, I found that there is a lot of folks out there who were fighting with it with no luck, but after opening so many cases with Symantec and Microsoft we managed to push it to work. Most of us got the ugly error.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>The Iso 17799 The Definite Guide For Security Geeks (Part 6)</title>
            <link>http://ict.root-technologies.net/OneArticle-298-The Iso 17799 The Definite Guide For Security Geeks (Part 6)-ICT COMMUNITY PORTAL.html</link>
            <description>
In this part of the ISO series we will discuss the sixth and  the seventh section of the standard , The Sixth section ( Personnel Security) talks about the proper hiring process for a company that wants to minimize security risks.

The standard in 6.1 calls for adding security requirements in the employee’s contracts, background checking and screening for employees in critical positions.
</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Mobility: An IT Perspective</title>
            <link>http://ict.root-technologies.net/OneArticle-296-Mobility: An IT Perspective-ICT COMMUNITY PORTAL.html</link>
            <description>Today’s workforce is rapidly becoming mobile. According to a survey conducted by Simpson Carpenter in September 2005, employees spend on average, one third of their time out of the office, and almost half their time in the office away from their desks. And that trend is only growing. IDC projects say that by 2009 there will be more than 878 million mobile workers worldwide.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>IT Policy &amp; Security Compliance</title>
            <link>http://ict.root-technologies.net/OneArticle-294-IT Policy &amp; Security Compliance-ICT COMMUNITY PORTAL.html</link>
            <description>
IT policy compliance provides proactive policy enforcement and remediation, a consolidated view of compliance to multiple regulations and standards in a single assessment, plus automated archiving and data retention. IT policy compliance can help organizations meet their compliance requirements via three-pronged approaches. </description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>IP Telephony Components And Protocols</title>
            <link>http://ict.root-technologies.net/OneArticle-293-IP Telephony Components And Protocols-ICT COMMUNITY PORTAL.html</link>
            <description>
IP Telephony solutions are applicable in all environments in which legacy telephony installations can be found, including home users, SMBs, large enterprises, and carriers. Even though the deployment environment and customer requirements for IP Telephony solutions differ, the design approach remains the same. Topology, performance, and budget considerations drive the choices of equipment and protocols following the identification of the stakeholder requirements. </description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Get The Penguin Power Now!</title>
            <link>http://ict.root-technologies.net/OneArticle-290-Get The Penguin Power Now!-ICT COMMUNITY PORTAL.html</link>
            <description>
Welcome to the article where I shine the rays of the open source movement unto the unbelievers. that was a mouthful, what I meant is that I can imagine many of my readers are still lurking in the dark lands of closed source, chained to their software by the proprietary formats they have been using. They heard about open-source, yet they have no idea why would they make the switch. Worse yet, many IT managers and consultants shy away from the idea. </description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>The Secret of Successful Fiber Optic Cable Management</title>
            <link>http://ict.root-technologies.net/OneArticle-284-The Secret of Successful Fiber Optic Cable Management-ICT COMMUNITY PORTAL.html</link>
            <description>By: Colin Yao

Why is proper fiber optic cable management so critical? 

Service providers have deployed more and more fiber optic cables for their high bandwidth, low costs, greater reliability and flexibility. But just deploying is not enough; a successful fiber network also requires a solid infrastructure based on a professional fiber optic cable management system.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Egypt: A Hotbed For Mobility</title>
            <link>http://ict.root-technologies.net/OneArticle-281-Egypt: A Hotbed For Mobility-ICT COMMUNITY PORTAL.html</link>
            <description>
The Egyptian telecom industry is one of the fastest growing markets in the Middle East and North Africa. In particular the country is better positioned over regional peers due to the following:

• Robust and developed telecom and mobile sector with growing demand.

• Liberalized telecom and mobile sector open to competition. 
</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Single Communications Infrastructure For Voice And Data</title>
            <link>http://ict.root-technologies.net/OneArticle-279-Single Communications Infrastructure For Voice And Data-ICT COMMUNITY PORTAL.html</link>
            <description>By: Mohamed Shaker

In this article we will talk about Single Communications Infrastructure for Voice and Data, The second factor that we have to take in our consideration when designing any kind of an IP Telephony solution.
</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>The Iso 17799 The Definite Guide For Security Geeks (Part 5)</title>
            <link>http://ict.root-technologies.net/OneArticle-275-The Iso 17799 The Definite Guide For Security Geeks (Part 5)-ICT COMMUNITY PORTAL.html</link>
            <description>By: OMAR SHERIN 

In the Fifth part of this series we will discuss how the ISO standard look at the company assets, how should companies classify it, manage the inventory and hold people accountable for it.  

The clause is called Asset Classification and control; it talks about the need to make all the company assets accountable for and to have a named owner.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Parameters For Good Contacts Contact Physics</title>
            <link>http://ict.root-technologies.net/OneArticle-274-Parameters For Good Contacts Contact Physics-ICT COMMUNITY PORTAL.html</link>
            <description>By: Reichle &amp; De- Massari 


Although connection blocks, connectors and jacks are generally considered rather unimpressive and simple to handle connection elements, electro-technical contacting is based on complex physical connections. Therefore, as a matter of good form it must be noted that we will discuss only a few basic aspects here that are helpful in understanding the IDC technology. The point known as the contact transfer is the most important point in the development and production of contacts. All parameters are subject to the electrical resistance of the junction, i.e., the contact resistance.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Change System Restore Volume Size In Windows Vista</title>
            <link>http://ict.root-technologies.net/OneArticle-271-Change System Restore Volume Size In Windows Vista-ICT COMMUNITY PORTAL.html</link>
            <description>
When System Restore was introduced in Windows XP (and less famously, in Windows Me) in 2001, there was concern over how much disk space the System Restore repository was consuming. </description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>The Iso 17799 The Definite Guide For Security Geeks </title>
            <link>http://ict.root-technologies.net/OneArticle-268-The Iso 17799 The Definite Guide For Security Geeks -ICT COMMUNITY PORTAL.html</link>
            <description>By: Omar Sherin


In the Fourth part of this series we will discuss a clause that is causing nightmares for companies that take Information security seriously, this clause deals with (Security of third party access and outsourcing), As we all know it’s now a de-facto in most businesses to “outsource” some of the key business functions, and for some decision makers IT happens to be the easiest choice to outsource. The outsource model has been successful and incredibly cost effective in most of the cases because in my opinion people neglect applying lots of security controls which in their opinion would turn the whole idea cumbersome. But let me ask you a question to rest my case.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>The 3 Ps Policy, Process, And Procedure</title>
            <link>http://ict.root-technologies.net/OneArticle-267-The 3 Ps Policy, Process, And Procedure-ICT COMMUNITY PORTAL.html</link>
            <description>By: Sherief M. Farid

Putting it all Together “IT Governance&quot;

We will discuss the 3Ps and emphasizing on how great they are. A Policy is defining the rules, a Process is taking control and a Procedure is an acronym for success. 

We have seen how they work together to provide us with an efficient way of managing our IT environment. The following diagram summarizes the relationships between the 3 Ps.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Strategies Of Information Management</title>
            <link>http://ict.root-technologies.net/OneArticle-266-Strategies Of Information Management-ICT COMMUNITY PORTAL.html</link>
            <description>By: Mohamed Fekry EL-Nakeb

Managing organizational information is becoming one of the major challenges that faces the organizations. The value of information rises and falls over time, fluctuating according to business operational cycles; whether those are transactions that generate revenue, bi-weekly payroll processing, quarterly financial reconciliations, or annual tax filings. Even unexpected events such as an audit, an acquisition, a new competitive threat, or a disaster can change the information’s value.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>IP Telephony Solutions And Network Availability</title>
            <link>http://ict.root-technologies.net/OneArticle-265-IP Telephony Solutions And Network Availability-ICT COMMUNITY PORTAL.html</link>
            <description>By: Mohamed Shaker

One aspect of voice communications that requires serious consideration during the design stage is a high service availability expectation on the part of telephony users. You need to obtain answers to the following questions:</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Advices For IT Organizations</title>
            <link>http://ict.root-technologies.net/OneArticle-228-Advices For IT Organizations-ICT COMMUNITY PORTAL.html</link>
            <description>Listed below is a list of the mistakes in which wrong decisions can lead to costly project overruns, business disasters, and in the worst cases, lost jobs. Read on, takes notes and avoid.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Storage Area Network</title>
            <link>http://ict.root-technologies.net/OneArticle-210-Storage Area Network-ICT COMMUNITY PORTAL.html</link>
            <description>A storage area network (SAN) is a high-speed special-purpose network or subnetwork that interconnects different kinds of data storage devices with associated data servers on behalf of a larger network of users.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Virtual Commerce</title>
            <link>http://ict.root-technologies.net/OneArticle-195-Virtual Commerce-ICT COMMUNITY PORTAL.html</link>
            <description>Some people use the term &quot;virtual commerce&quot; or &quot;v-commerce&quot; as a synonym of the term e-commerce. Literally, virtual commerce is an application, a service or a product feature that is used by companies to design websites that are intended for the buying and selling of different products through the Internet.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Ip Telephony … It Is The Time …</title>
            <link>http://ict.root-technologies.net/OneArticle-191-Ip Telephony … It Is The Time …-ICT COMMUNITY PORTAL.html</link>
            <description>After ten years of development, IP Telephony Solution is finally a grown-up technology. IP Telephony Solution is based on end-to-end Voice over Internet Protocol (VoIP) technology, which allows the integration between voice calls and data applications over IP-based data networks and the Internet. For the last century, telephone technology has largely been proprietary. The interoperability with desktop and other applications, if not impossible, was tremendously expensive, very rare and hard to implement. Phone and data networks have been distinct separate technologies, each with their own equipment, software and requiring their own support personnel. Now, the introduction of open standards IP Telephony changes all this and promises something new.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>SAN</title>
            <link>http://ict.root-technologies.net/OneArticle-178-SAN-ICT COMMUNITY PORTAL.html</link>
            <description>What is SAN?

Storage Area Network (SAN) is a dedicated network for storage data flow. SAN provides the data communication infrastructure needed for the most advanced and most cost-efficient computer mass storage systems. SAN minimizes the total cost of ownership for both large and small storage systems. SAN technology supports the management features and I/O price/performance demanded in today’s competitive IT environment, and offers the storage component investment protection needed to minimize capital expenses.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Tsmobiles Terminal Service Client For Mobiles</title>
            <link>http://ict.root-technologies.net/OneArticle-151-Tsmobiles Terminal Service Client For Mobiles-ICT COMMUNITY PORTAL.html</link>
            <description>TSMobiles is an essential mobile client based on Windows Remote Desktop Protocol (RDP) which allows you to access any Windows OS computer via Terminal Service or Windows Remote Desktop through your mobile phone.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Online Data Storage</title>
            <link>http://ict.root-technologies.net/OneArticle-133-Online Data Storage-ICT COMMUNITY PORTAL.html</link>
            <description>Though hard drives, CD-R and tape backup are getting cheaper day by day, the need for online data storage is increasing. Online storage serves as an additional flexible source of data storage, provides a backup mechanism, and functions as an easy way to share data with others.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>ERP Challenges</title>
            <link>http://ict.root-technologies.net/OneArticle-124-ERP Challenges-ICT COMMUNITY PORTAL.html</link>
            <description>ERP systems are systems designed to improve any organization's business capability needed to deliver value to its customers. By implementing ERP systems, any organization can handle the clients' problems as well as demands in a very efficient and effective way. In spite of it's efficiency, ERP implementers-organizations' CIOs-have three major challenges to face</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>LOCATION BASED SERVICES</title>
            <link>http://ict.root-technologies.net/OneArticle-110-LOCATION BASED SERVICES-ICT COMMUNITY PORTAL.html</link>
            <description>Nowadays, a growing number of 3G phones and PDAs incorporate GPS chips that can be used to determine and map geographic location, thus, mobile operators are now getting serious about LBS mobile applications for individuals and businesses.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>IT In Critical Business</title>
            <link>http://ict.root-technologies.net/OneArticle-93-IT In Critical Business-ICT COMMUNITY PORTAL.html</link>
            <description>In today’s business world we're delegating to IT more responsibility for carrying out the day-to-day functions that keep our businesses, governments and schools working. Thus the importance and the value of IT have been raised till it reached almost the importance of the business itself. For instance, a vehicle, which is just a means of transportation, is so valuable as it carries human beings. Nowadays-out of the importance and value of IT-we use the new expression “Business Continuity”.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Ideal IT Organizations</title>
            <link>http://ict.root-technologies.net/OneArticle-65-Ideal IT Organizations-ICT COMMUNITY PORTAL.html</link>
            <description>The perfect IT environment is designed to exceed the enterprise's strategic goals while nurturing the individual to achieve exceptional productivity and job satisfaction. An ideal IT environment should have clear objectives that are completely aligned for success. Besides, it should set strategic decisions that can easily and effectively cope with the changing business environment. It should be cost effective and should adapt a culture where honesty, mutual respect and job satisfaction flourish.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Business Intelligence</title>
            <link>http://ict.root-technologies.net/OneArticle-49-Business Intelligence-ICT COMMUNITY PORTAL.html</link>
            <description>Companies seeking BI standardization often struggle with vendors. To define an effective BI standardization, an organization should be fully aware of its needs, have a long-term vision, consider the pricing models and know how to negotiate with vendors in order to sign up for a contract that best meets the organization's requirements. In this article we will discuss some tips that could lead to a better deal.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Choosing A Low-End Nas Product</title>
            <link>http://ict.root-technologies.net/OneArticle-40-Choosing A Low-End Nas Product-ICT COMMUNITY PORTAL.html</link>
            <description>Although many low-end NAS products are designed for home office use, some are suitable for certain SMB or even enterprise-level applications. Here's what to consider before deploying a low-end NAS product.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Business Mobility: Put A Cherry On Top</title>
            <link>http://ict.root-technologies.net/OneArticle-29-Business Mobility: Put A Cherry On Top-ICT COMMUNITY PORTAL.html</link>
            <description>What is business mobility? If you ask a CEO, it’s the ability to respond to pending emails while on the way to the airport. If you ask a sales representative, it’s the ability to access important information during a customer visit. For a knowledge worker on a virtual team, it’s the ability to be in a seminar but still receive and respond to an urgent request to review a document by the end of the day.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Seven Stupid Mistakes Made By Small Business Owners</title>
            <link>http://ict.root-technologies.net/OneArticle-18-Seven Stupid Mistakes Made By Small Business Owners-ICT COMMUNITY PORTAL.html</link>
            <description>Opinions differ as to what the top seven stupid mistakes are made by small business owners. But one must remember that a business, no matter how large or small, lives or dies by its ability to stay profitable. When a small business owner makes an unwise choice it is because he or she is not thinking in terms of profitability and calculated risk. They are taking risks but leaving the calculated part out. Basically this means that the risks the small business owners are making are not well thought out and can have disastrous results on a small business. Here are some common stupid mistakes made by small business owners that reflect unwise decisions at the moment:</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Stop Investing In Wan Bandwidth, Think About Wan Optimization</title>
            <link>http://ict.root-technologies.net/OneArticle-16-Stop Investing In Wan Bandwidth, Think About Wan Optimization-ICT COMMUNITY PORTAL.html</link>
            <description>By: Ashraf Taifour

As corporate applications become more and more critical to the survival and growth of the business' bottom line, IT departments face tough decisions about how to deliver more applications with better performance to all of the end users across the wide area network system. These concerns have slowly grown to be huge challenges for IT managers and directors over the past 2 years.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>The Pillars Of Modern Web Protection</title>
            <link>http://ict.root-technologies.net/OneArticle-9-The Pillars Of Modern Web Protection-ICT COMMUNITY PORTAL.html</link>
            <description>Today’s rapidly evolving web threats and the instant exploitation of any vulnerability by malware authors means that it is simply not enough for businesses to protect their email and endpoint systems. They need to act now to ensure that surfing the web at work poses no threat to IT security, to network resources or to staff productivity. In addition to good preventive practice such as rigorous patching and educating users about the risks of browsing, it is vital that organizations implement a comprehensive web security solution, comprising three key pillars of protection which are:</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>The Most Disruptive Technologies</title>
            <link>http://ict.root-technologies.net/OneArticle-7-The Most Disruptive Technologies-ICT COMMUNITY PORTAL.html</link>
            <description>Here's a look at the technologies Gartner analysts voted most likely to succeed at changing the face of business.

Gartner analysts at the Gartner Symposium/ITxpo 2008 in Las Vegas discussed what they believe will be the most disruptive technologies through 2012. Disruptive technologies are those that force changes in industry models, business processes, vendor types, products and services, as well as the all-important user model. Take a look at this list and tell us whether you think something has been omitted or just plain doesn't belong. This list is ranked in order from least disruptive to most disruptive.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Five Ways To Improve Your Company's Efficiency</title>
            <link>http://ict.root-technologies.net/OneArticle-4-Five Ways To Improve Your Company's Efficiency-ICT COMMUNITY PORTAL.html</link>
            <description>Small and medium-sized business (SMB) customers and suppliers are increasingly savvy, with high expectations for immediate and personalized service and support. Expectations are rising and yet SMBs are also under pressure to do more with the same or fewer resources.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
        <item>
            <title>Five Tips For Staying Employed In IT Through 2010</title>
            <link>http://ict.root-technologies.net/OneArticle-3-Five Tips For Staying Employed In IT Through 2010-ICT COMMUNITY PORTAL.html</link>
            <description>One of the perils of toiling in high tech is that you're working in a world of constant change. By definition, IT changes every couple years as businesses roll out upgraded (or totally new) infrastructures.

The challenge is huge for tech professionals who need to keep up with relentless change. Staying employed in an environment in which the rules of the road are continually rewritten requires foresight. When's the next curve coming my way?

To provide some clue as to what the IT job landscape will look in a few years downstream, we spoke with Gartner analyst Diane Morello. Morello is the author of &quot;The IT Professional Outlook: Where Will We Go from Here?&quot; The study looks at the tech workplace through 2010, forecasting key developments that will profoundly affect IT personnel.</description>
            <author>ICT COMMUNITY PORTAL</author>
        </item>
    </channel>
</rss>
