IT Management

Do you have what it takes for Agile?

Do you have what it takes for Agile?

0
Enterprises may be on board with the idea of Agile methodologies, but do they actually have the skill sets in hand to achieve it? David...
Security Image

Know thyself, know thy enemy

0
Sometimes a new lens can show an age-old problem in a clearer light. At least that’s the thinking behind a new white paper from...
Passwords

Are passwords really passé?

0
Future proofing anything is a monumental challenge in the IT world these days. Identification and authentication are areas that are especially problematic. For every...
CL and SAP partnering to drive new analytics opportunity

Held for Ransom

0
Within the past month, several high-profile attacks have brought an increasingly popular form of malware into the public eye. It’s known as ransomware, and...
Ransomeware

The ugly truth about ransomware

0
Recent media coverage of hospitals attacked by ransomware in Ottawa and Norfolk County has alerted everyone to the inherent dangers – and complexity –...
Glass Half Full

The curious case of women in ICT

0
This article first appeared in the January issue of Connections+ magazine, a trade publication devoted to helping ICT professionals understand trends shaping the cabling,...
Windows 10

Stop helping me!

0
When Microsoft announced that Windows 10 would be a free upgrade to systems running Windows 7 and higher, individuals and companies alike smiled, albeit...
women-entrepreneurs

Cisco banking on women entrepreneurs

0
Creative urge, combined with frustration over the glass ceiling in many traditional businesses, has led many women to consider an alternate work path. Female...
HP Sprout Pro

HP grows Pro Sprout

0
What looks rather like a flat screen TV set with a desk lamp grafted on top has the potential to change life for creative...
Inside the Data

Inside the data: IT’s role in supporting innovation

0
  In October, 2015, InsightaaS worked with global research experts Techaisle to conduct a survey of 402 IT leaders, representing Canadian businesses of all sizes. The...
Intelligence Sharing

Serving the common good: intelligence sharing in an era of automation

0
  Vincent Weafer is a long term veteran of the IT industry and cyber security battleground. A former VP of Symantec’s security response unit, as...

SAS takes analytics into the network

0
When Dr. James Goodnight and his partners founded the SAS Institute in 1976 after running almost a decade as a successful academic project at...

FOCUS 15 trains lens on the Threat Detection Lifecycle

0
The proliferation of technology – and how we consume it – are having profound effects on our productivity, work styles and service delivery. But...

IA fighting the good fight against the dark forces

0
Enterprises are constantly faced with battling increasingly sophisticated attacks on their worldly data goods. But as cyber criminals get more sophisticated, IT professionals need...

First world problems

0
As we become more and more dependent on tech, keeping it powered becomes an increasing issue. I attend a lot of conferences, and masses...