Extract: Managing internal change when crowdsourcing 
By Ross Dawson | Dec 13, 2011 | Comment Now 
Chapter Six from "Getting Results from Crowds".
 
Cloud, meet crowd 
By Nate Cochrane | Nov 4, 2010 | Comment Now 
There's a world of IT professionals out there ready to work for next to nothing.
1
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  65%
 
Advanced persistent threats
  5%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1392

Vote