Do you have what it takes for Agile?
Enterprises may be on board with the idea of Agile methodologies, but do they actually have the skill sets in hand to achieve it?
David...
Know thyself, know thy enemy
Sometimes a new lens can show an age-old problem in a clearer light. At least that’s the thinking behind a new white paper from...
Are passwords really passé?
Future proofing anything is a monumental challenge in the IT world these days. Identification and authentication are areas that are especially problematic. For every...
Held for Ransom
Within the past month, several high-profile attacks have brought an increasingly popular form of malware into the public eye. It’s known as ransomware, and...
The ugly truth about ransomware
Recent media coverage of hospitals attacked by ransomware in Ottawa and Norfolk County has alerted everyone to the inherent dangers – and complexity –...
The curious case of women in ICT
This article first appeared in the January issue of Connections+ magazine, a trade publication devoted to helping ICT professionals understand trends shaping the cabling,...
Stop helping me!
When Microsoft announced that Windows 10 would be a free upgrade to systems running Windows 7 and higher, individuals and companies alike smiled, albeit...
Cisco banking on women entrepreneurs
Creative urge, combined with frustration over the glass ceiling in many traditional businesses, has led many women to consider an alternate work path. Female...
HP grows Pro Sprout
What looks rather like a flat screen TV set with a desk lamp grafted on top has the potential to change life for creative...
Inside the data: IT’s role in supporting innovation
In October, 2015, InsightaaS worked with global research experts Techaisle to conduct a survey of 402 IT leaders, representing Canadian businesses of all sizes. The...
Serving the common good: intelligence sharing in an era of automation
Vincent Weafer is a long term veteran of the IT industry and cyber security battleground. A former VP of Symantec’s security response unit, as...
SAS takes analytics into the network
When Dr. James Goodnight and his partners founded the SAS Institute in 1976 after running almost a decade as a successful academic project at...
FOCUS 15 trains lens on the Threat Detection Lifecycle
The proliferation of technology – and how we consume it – are having profound effects on our productivity, work styles and service delivery. But...
IA fighting the good fight against the dark forces
Enterprises are constantly faced with battling increasingly sophisticated attacks on their worldly data goods. But as cyber criminals get more sophisticated, IT professionals need...
First world problems
As we become more and more dependent on tech, keeping it powered becomes an increasing issue. I attend a lot of conferences, and masses...