Blog Posts Tagged with "Information Technology"


Vivek Kundra Makes the Case for Government Cloud

September 01, 2011 Added by:Headlines

"...governments around the world are wasting billions of dollars on unnecessary information technology. This problem has worsened in recent years because of what I call the 'I.T. cartel.' This powerful group of private contractors encourages reliance on inefficient software and hardware..."

Comments  (0)


The Dangers of Second Hand Hard Drives

August 24, 2011 Added by:Emmett Jorgensen

Whether you are planning on selling, recycling or throwing away your old hard drives, you should always consider using one of these solutions: destruction, degaussing, or secure data erasure. Otherwise, there's no telling whose hands you data may end up in...

Comments  (2)


Cryptography for Emerging Technologies and Applications

August 23, 2011 Added by:Headlines

The National Institute of Standards and Technology (NIST) is hosting a workshop on Cryptography for Emerging Technologies and Applications that is intended to identify the cryptographic requirements for emerging technologies and applications...

Comments  (0)


Compensation Increases for CIOs and IT Workers in 2011

August 20, 2011 Added by:Bill Gerneglia

According to the first-half 2011 IT salary survey from Janco Associates, IT compensation has increased slightly. While overall employment remains lackluster by most organizations across all industries, there is comfort in the fact that more tech jobs are being added than are being cut...

Comments  (0)


The Great Cloud Blockage: 80/20

August 16, 2011 Added by:Ben Kepes

The Catch 22 situation – IT cannot free up sufficient dollars to move legacy applications to the Cloud. And because they therefore have to focus a significant proportion of their budget on keeping the lights on, the opportunities for investment in these activities are eroded...

Comments  (0)


Is Your CIO an Insomniac?

August 09, 2011 Added by:Bill Gerneglia

In many cases they lack the proper staff and dedicated resources to properly battle the daily IT disruptions. They are at times responsible for technology budgets, servers, applications, and IT staff that are outside their control - this leads to stress and often sleep deprivation...

Comments  (1)


Enterprise IT - Surprisingly Repetitive

August 08, 2011 Added by:Jason Remillard

The lines between ‘Internet’ and ‘Enterprise’ are blurry, but I am still amazed at the rapid speed of which this is occurring and the velocity of not just change, but the impact of this change on solutions and integrations for standard equations of IT such as Security...

Comments  (0)


Informal Cloud Buyers - A Growing IT Problem

August 02, 2011 Added by:Bill Gerneglia

Without central control of purchases, there is no homogeneous IT solution provider across the organization. This leads to inconsistent service, lack of collective purchasing discounts available at higher user volumes, and lack of standard IT policies, making for an IT management nightmare...

Comments  (0)


CIOs Should Earn More Money and Respect

July 22, 2011 Added by:Bill Gerneglia

A few years ago when a CIOs responsibilities consisted of running the IT shop efficiently, it was difficult to make the case that they belonged in the top managerial tier or deserved a seat at the executive conference table. That was then. Today CIOs’ responsibilities have grown significantly...

Comments  (0)


CIO: Throw Your Ego Out of the Window

June 15, 2011 Added by:Rahul Neel Mani

CIOs often don’t want to come out of their IT shell. Rather than thinking business, they get immersed into IT. Although a lot of CIOs do have those skills, but they don’t move away from IT. You need a lot of guts to get to the CEO’s position, it’s a totally different ballgame...

Comments  (0)


FIPS 140-2: Just Buzzword Bingo?

June 15, 2011 Added by:Jonathan Lampe

If your IT department intersects with the finance, health care, government or energy sectors, or is subject to regulations such as PCI-DSS, then you should be using FIPS 140-2 validated cryptography now to protect data-in-transit and data-at-rest...

Comments  (4)


Solution Architecture: A Critical Service or Sales Talk?

June 08, 2011 Added by:Rafal Los

Over time the term has become widely over-used to the point where meaning is largely lost, and sadly most people on the buyer side of the aisle think it's just some marketing term or a way to get them to buy more of whatever widget is being sold...

Comments  (0)


Application Software in the Cloud – Power to the People

June 08, 2011 Added by:Danny Lieberman

We all use the term ”IT Governance” as if security of data was dependent on policy. Since we have lots of IT governance and lots of data breaches, we may safely assume that writing procedures while the hackers attack software and steal data is not an effective security countermeasure...

Comments  (0)


Focusing on Success or Failure in IT and Infosec

June 01, 2011 Added by:Robb Reck

Information security works differently than IT. Rather than focusing on how to build a system that can meet a requirement, the security-minded will focus on how to build a system that cannot do anything but meet a requirement. The difference is subtle, but critically important...

Comments  (0)


Open Your Box of IT Innovation

May 28, 2011 Added by:Rahul Neel Mani

Innovation and doing more with less are not just buzzwords. That doesn't mean having Systems up and running can take a back seat either. David Awcock, Head of Technology Standard Chartered Bank, shares his ideas in an interview with Minu Sirsalewala Agarwal, on how he manages both...

Comments  (0)


Predators Using Social Media to Stalk Kids

May 23, 2011 Added by:Robert Siciliano

With the openness of social media, predators know what a kid likes, doesn’t like, who their friends are, and often their phone numbers, where they live, go to school, sports teams they play on etc. The list goes on and on...

Comments  (0)

Page « < 4 - 5 - 6 - 7 - 8 > »