IT Management

IT Management

Happy International Women’s Day!

On International Women’s Day it’s important to draw attention to the ongoing need to protect and promote women’s equality. This need is global, but...

Unhelpful help

In the beginning was the manual. There had to be – there was no online help, or even much assistance embedded in software. You...

Betakit – An Open Letter from the Canadian Tech Community: Diversity is our Strength

“The Canadian tech community comprises many different nationalities, religions, sexual orientations, gender identities, mental and physical abilities, and perspectives. We believe that this diversity...

Citizen everything

We live in a world where lines are blurring between professionals and amateurs. Except we're no longer calling them "amateurs" – they're now "citizen"...

Lenovo Yoga Book review

There are many laptops and convertibles on the market, and they're all variations on a theme. These days, that theme includes skinny and light...

Improved into oblivion

There was a day when computers and other devices connected happily to accessories, and ease of connection mattered. It appears that those days are...
How Linux took over the world

How Linux took over the world

The computing world is never a dull place, and sometimes the most innocuous-seeming things turn into monsters. Consider, for example, the Linux operating system. Twenty-five...
FIDO progress on passwords

FIDO progress on passwords

Since the early iterations of user names and passwords, the road to creating a simple but secure online experience has been a long and...
Year of the bots

Year of the bots

When most of us hear the term ‘bot’, we think of the infamous botnets that bombard us with malware-laden spam or deliver automated denial...
Do you have what it takes for Agile?

Do you have what it takes for Agile?

Enterprises may be on board with the idea of Agile methodologies, but do they actually have the skill sets in hand to achieve it? David...
Security Image

Know thyself, know thy enemy

Sometimes a new lens can show an age-old problem in a clearer light. At least that’s the thinking behind a new white paper from...
Passwords

Are passwords really passé?

Future proofing anything is a monumental challenge in the IT world these days. Identification and authentication are areas that are especially problematic. For every...
CL and SAP partnering to drive new analytics opportunity

Held for Ransom

Within the past month, several high-profile attacks have brought an increasingly popular form of malware into the public eye. It’s known as ransomware, and...
Ransomeware

The ugly truth about ransomware

Recent media coverage of hospitals attacked by ransomware in Ottawa and Norfolk County has alerted everyone to the inherent dangers – and complexity –...
Glass Half Full

The curious case of women in ICT

This article first appeared in the January issue of Connections+ magazine, a trade publication devoted to helping ICT professionals understand trends shaping the cabling,...

Research and Resources