adv

Opinions

Analytics comes home

Analytics is coming home. Right into your own living room.We are moving away from relying on data...
Who's flying the plane? Lessons from United against ignoring security holes

Who's flying the plane? Lessons from United against ignoring security holes

Some things are just so predictable. A retailer is told about a mobile security hole and dismisses...

Sponsored Content

Fact: No two clouds are the same because of their underlying infrastructure. It’s a reality that many cloud IaaS providers tend to overlook or gloss over. Many also severely limit the ability to move...
At the end of Crimea war, the main means of mobility around the battlefield was horses. Indeed, for the first two years of the World War I, horses were still the best option for creating havoc across...
The security industry, by its nature, has always been entrepreneurial, and abundant with start-up companies. While this spirit of entrepreneurship will remain,we’ll see even greater levels of...
Today’s CIOs is the driving force behind innovative products and services helping take the business to the next levelIt is difficult to find any business today that doesn’t make use of information...
Many data centre professionals are pondering what 2015 holds in store. I’ve come up with a list of five trends that I believe will have the greatest impact on our industry in the year ahead.1. Big...

Featured Story

Jack Wood, CIO for home goods e-commerce powerhouse Wayfair, wears many hats and he doffed them all at IT Roadmap in Boston this week.The event's...
IT resume makeover: Just the (pertinent) facts
IT resume makeover: Just the (pertinent) facts
David Thorburn-Gundlach's resume might as well have been covered by a cloak of invisibility, at...
Former CISO of the Israeli Defense Forces Menny Barzilay talks about the ongoing
Enabling innovation with trusted computing
Menny Barzilay is an evangelist of innovation and cyber security strategist—two roles that are very...
Prevent mobile malware in three easy steps
Prevent mobile malware in three easy steps
Looking only at the data provided by security firms, the world appears on the verge of a mobile...

Events