The list offers a nice point-counterpoint of why your IT department considers something a risk, how you can bypass their roadblocks and do it anyway, and perhaps more importantly how to get around it in a manner that won't completely freak out your IT department. (I'm not saying it won't just a little.)
read more | digg story