IT Management

IT Management

Spinning off or building up?

When Hewlett Packard Enterprise (HPE) announced a year ago that it was spinning off its enterprise services (ES) business and merging it with CSC...

Getting them young

We keep hearing that millennials want to work with tools that are familiar, as though that were something new. It's not. Everyone leans towards...

New tools for new breach reporting

Information professional professionals across the country have been considering the ramifications of new requirements in Canada’s Digital Privacy Act legislation slated to come into...

Competition or cyber security co-opetition

Competitors in many industries quietly cooperate when it makes sense, even if it's only by establishing and adhering to standards. Just think what the...

Happy International Women’s Day!

On International Women’s Day it’s important to draw attention to the ongoing need to protect and promote women’s equality. This need is global, but...

Unhelpful help

In the beginning was the manual. There had to be – there was no online help, or even much assistance embedded in software. You...

Betakit – An Open Letter from the Canadian Tech Community: Diversity is our Strength

“The Canadian tech community comprises many different nationalities, religions, sexual orientations, gender identities, mental and physical abilities, and perspectives. We believe that this diversity...

Citizen everything

We live in a world where lines are blurring between professionals and amateurs. Except we're no longer calling them "amateurs" – they're now "citizen"...

Lenovo Yoga Book review

There are many laptops and convertibles on the market, and they're all variations on a theme. These days, that theme includes skinny and light...

Improved into oblivion

There was a day when computers and other devices connected happily to accessories, and ease of connection mattered. It appears that those days are...
How Linux took over the world

How Linux took over the world

The computing world is never a dull place, and sometimes the most innocuous-seeming things turn into monsters. Consider, for example, the Linux operating system. Twenty-five...
FIDO progress on passwords

FIDO progress on passwords

Since the early iterations of user names and passwords, the road to creating a simple but secure online experience has been a long and...
Year of the bots

Year of the bots

When most of us hear the term ‘bot’, we think of the infamous botnets that bombard us with malware-laden spam or deliver automated denial...
Do you have what it takes for Agile?

Do you have what it takes for Agile?

Enterprises may be on board with the idea of Agile methodologies, but do they actually have the skill sets in hand to achieve it? David...
Security Image

Know thyself, know thy enemy

Sometimes a new lens can show an age-old problem in a clearer light. At least that’s the thinking behind a new white paper from...