adv

Blogs

Picture of blogger

Hong Kong mobilized by tech weapons of mass disorder

 Recent scenes across Hong Kong have shocked and awed local and international audiences. While...
Stefan Hammond

Are password managers secure?

None of us can remember all our passwords. Yes, we know to use strong passwords, and we never use...

Opinions

Why I will live with an NFC chip implant for a year

Why I will live with an NFC chip implant for a year

There are days when even your wife thinks you're crazy. In my case one those days was when I told...
Fire your mobile app programmer and build it yourself

Fire your mobile app programmer and build it yourself

This vendor-written tech primer has been edited by Network World to eliminate product promotion,...

Sponsored Content

HKT is the long established leader in the Hong Kong telecommunications market, but the carrier is keen to point out that it does not take its status for granted.While HKT sees itself as a technology...
IT is fast becoming a driver for modern businesses to transform and innovate, especially when it comes to meeting the increasingly dynamic demands of customers.DevOps initiatives are growing...

Featured Story

6 ways to maximize your IT training budget
Although the economy is picking up ever so slightly, IT departments remain on the lookout for ways to do more with less -- fewer people, fewer...
Planning for an effective security tabletop test
Planning for an effective security tabletop test
Tabletop exercises enable organizations to analyze potential emergency situations in an informal...
Where should the CISO department reside?
Where should the CISO department reside?
If we look at the headlines surrounding recent data breaches, we might conclude that the role of...
Top CIOs start the journey to the 'digital enterprise'
Top CIOs start the journey to the 'digital enterprise'
Back in 1980, the woman who now runs the data center at State Street Bank started her career there...

Events