adv

Blogs

Picture of blogger

Hong Kong mobilized by tech weapons of mass disorder

 Recent scenes across Hong Kong have shocked and awed local and international audiences. While...
Stefan Hammond

Are password managers secure?

None of us can remember all our passwords. Yes, we know to use strong passwords, and we never use...

Opinions

Digital storytelling is rising in APAC. Are you ready?

Digital storytelling is rising in APAC. Are you ready?

They say a picture is worth a thousand words. But, now there is research to support it.A doctoral...
Should Chief Marketing Officers be involved in security and privacy decisions?

Should Chief Marketing Officers be involved in security and privacy decisions?

In a report by PricewaterhouseCoopers, the management consulting firm urged chief marketing...

Sponsored Content

The interconnect solution provider widens ERP capabilities, lowers IT investment cost, and improves overall reliability.Uncompromised quality has reaped success for SOLERS. It is one of the key...
Alcatel-Lucent Enterprise wants to help customers shift to next-generation enterprise communications solutions as it begins a new chapter as an independent company.Alcatel-Lucent Enterprise (ALUE)...
Running a hotel is a balancing act. You need to find the sweet spot when offering an experience that is uniquely different, while ensuring that the experience meets the needs of a diverse clientele....

Featured Story

Anonymous threatens Hong Kong gov Web sites
As the Computerworld Hong Kong editorial team reviewed the biggest IT-related events that occured in the year of 2014, we picked the top 10 events...
Technologists tend to look at these issues from a technology lens, but it should
StanChart CIO: from fashion and IT to banking on top of the world
Computerworld Hong Kong (CWHK): Where did your interest in IT begin?Ericson Chan (EC): It is an...
Top five smartphone disappointments of the year
Top five smartphone disappointments of the year
The poor design of two different smartphones, a low-resolution front camera with the new iPhone,...
3 low-tech threats that lead to high-profile breaches
3 low-tech threats that lead to high-profile breaches
In an age where data security defenses are getting more and more sophisticated, there will be...

Events