Blog Posts Tagged with "Information Technology"

69dafe8b58066478aea48f3d0f384820

Vivek Kundra Makes the Case for Government Cloud

September 01, 2011 Added by:Headlines

"...governments around the world are wasting billions of dollars on unnecessary information technology. This problem has worsened in recent years because of what I call the 'I.T. cartel.' This powerful group of private contractors encourages reliance on inefficient software and hardware..."

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

The Dangers of Second Hand Hard Drives

August 24, 2011 Added by:Emmett Jorgensen

Whether you are planning on selling, recycling or throwing away your old hard drives, you should always consider using one of these solutions: destruction, degaussing, or secure data erasure. Otherwise, there's no telling whose hands you data may end up in...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Cryptography for Emerging Technologies and Applications

August 23, 2011 Added by:Headlines

The National Institute of Standards and Technology (NIST) is hosting a workshop on Cryptography for Emerging Technologies and Applications that is intended to identify the cryptographic requirements for emerging technologies and applications...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Compensation Increases for CIOs and IT Workers in 2011

August 20, 2011 Added by:Bill Gerneglia

According to the first-half 2011 IT salary survey from Janco Associates, IT compensation has increased slightly. While overall employment remains lackluster by most organizations across all industries, there is comfort in the fact that more tech jobs are being added than are being cut...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

The Great Cloud Blockage: 80/20

August 16, 2011 Added by:Ben Kepes

The Catch 22 situation – IT cannot free up sufficient dollars to move legacy applications to the Cloud. And because they therefore have to focus a significant proportion of their budget on keeping the lights on, the opportunities for investment in these activities are eroded...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Is Your CIO an Insomniac?

August 09, 2011 Added by:Bill Gerneglia

In many cases they lack the proper staff and dedicated resources to properly battle the daily IT disruptions. They are at times responsible for technology budgets, servers, applications, and IT staff that are outside their control - this leads to stress and often sleep deprivation...

Comments  (1)

Ba5964a1284ac16d4277991e7225699c

Enterprise IT - Surprisingly Repetitive

August 08, 2011 Added by:Jason Remillard

The lines between ‘Internet’ and ‘Enterprise’ are blurry, but I am still amazed at the rapid speed of which this is occurring and the velocity of not just change, but the impact of this change on solutions and integrations for standard equations of IT such as Security...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Informal Cloud Buyers - A Growing IT Problem

August 02, 2011 Added by:Bill Gerneglia

Without central control of purchases, there is no homogeneous IT solution provider across the organization. This leads to inconsistent service, lack of collective purchasing discounts available at higher user volumes, and lack of standard IT policies, making for an IT management nightmare...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

CIOs Should Earn More Money and Respect

July 22, 2011 Added by:Bill Gerneglia

A few years ago when a CIOs responsibilities consisted of running the IT shop efficiently, it was difficult to make the case that they belonged in the top managerial tier or deserved a seat at the executive conference table. That was then. Today CIOs’ responsibilities have grown significantly...

Comments  (0)

F520f65cba281c31e29c857faa651872

CIO: Throw Your Ego Out of the Window

June 15, 2011 Added by:Rahul Neel Mani

CIOs often don’t want to come out of their IT shell. Rather than thinking business, they get immersed into IT. Although a lot of CIOs do have those skills, but they don’t move away from IT. You need a lot of guts to get to the CEO’s position, it’s a totally different ballgame...

Comments  (0)

85612d572d689128ab07f369ff934d02

FIPS 140-2: Just Buzzword Bingo?

June 15, 2011 Added by:Jonathan Lampe

If your IT department intersects with the finance, health care, government or energy sectors, or is subject to regulations such as PCI-DSS, then you should be using FIPS 140-2 validated cryptography now to protect data-in-transit and data-at-rest...

Comments  (2)

0a8cae998f9c51e3b3c0ccbaddf521aa

Solution Architecture: A Critical Service or Sales Talk?

June 08, 2011 Added by:Rafal Los

Over time the term has become widely over-used to the point where meaning is largely lost, and sadly most people on the buyer side of the aisle think it's just some marketing term or a way to get them to buy more of whatever widget is being sold...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Application Software in the Cloud – Power to the People

June 08, 2011 Added by:Danny Lieberman

We all use the term ”IT Governance” as if security of data was dependent on policy. Since we have lots of IT governance and lots of data breaches, we may safely assume that writing procedures while the hackers attack software and steal data is not an effective security countermeasure...

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Focusing on Success or Failure in IT and Infosec

June 01, 2011 Added by:Robb Reck

Information security works differently than IT. Rather than focusing on how to build a system that can meet a requirement, the security-minded will focus on how to build a system that cannot do anything but meet a requirement. The difference is subtle, but critically important...

Comments  (0)

F520f65cba281c31e29c857faa651872

Open Your Box of IT Innovation

May 28, 2011 Added by:Rahul Neel Mani

Innovation and doing more with less are not just buzzwords. That doesn't mean having Systems up and running can take a back seat either. David Awcock, Head of Technology Standard Chartered Bank, shares his ideas in an interview with Minu Sirsalewala Agarwal, on how he manages both...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Predators Using Social Media to Stalk Kids

May 23, 2011 Added by:Robert Siciliano

With the openness of social media, predators know what a kid likes, doesn’t like, who their friends are, and often their phone numbers, where they live, go to school, sports teams they play on etc. The list goes on and on...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »