Internet

Search engine marketing campaigns are not meant to be created and left alone, they must be actively managed, according to Tech/Know columnist Troy Janisch. In fact, "SEM" campaigns should be managed and adjusted as assiduously as investment portfolios, Janisch writes. ...

Municipal governments have to become more dynamic as costs go up for services and people tire of tax increases, observes columnist James Carlini. That starts with not viewing services, old or new, as just another "cost of doing business." ...

Computer security experts note that companies are being hacked all the time, they just don't want customers and government regulators to know it. Whether for fun or for profit, hackers are out to get you, and the current conventional wisdom is to take a comprehensive...

The new products and solutions of 67 companies were on display during the recent DEMOfall 2006 event, raising the bar for the Winter 2007 conference. In this brief edition of DEMO Letter, columnist Chris Shipley points readers to recaps of the event's media coverage, to...

For a variety of reasons, your domain portfolio may not be as impenetrable as you think. In the latest edition of IP Online, columnist Deborah Wilcox provides several principles for domain name protection, and she reminds chief executives to conduct trademark searches to find out...

The recent Milwaukee BarCamp was called the "unconference" for a very good reason. With no formal schedule and about as many keynoters as attendees, technology professionals were free to talk about anything tech related, professional or otherwise. The camp was held in the casual setting...

The roller coaster ride that is Milwaukee's Internet wireless network may have taken its final dip last week when Mayor Tom Barrett decided to go ahead and sign a contract with Midwest Fiber Networks. Unless other snags develop, all Milwaukee businesses and residents will have...

You say you've never heard of wikis, that Web 2.0 component that encourages conversations and draws on the power of social computing? According to the Gartner Group, half of all companies will use them internally by 2009, replacing or supplementing Intranet sites. Buzz Networks columnist...

Until recently, online communities have operated as kind of an inner sanctum, but a former University of Wisconsin computer science professor has joined Yahoo in an attempt to leverage such community interaction into business opportunities. Raghu Ramakrishnan, who is forming a working group to explore...

A number of government laws and regulations require businesses to implement policies, procedures, and training to prevent identity theft. Companies that think they are immune and neglect this potential business risk could face substantial penalties and legal costs, warns guest columnist Joseph Campana....