adv

Opinions

Mar 14, 2008
Several countries are on the verge of doing what US courts have stopped short of: codifying that breaches of personal information can actually harm people. Why should US companies...
Mar 10, 2008
Back in the days of the USSR, the KGB served as the Soviet Union's premier security agency, secret police, and intelligence agency. They achieved a reputation for ruthless...
Mar 7, 2008
Issue: The CIO's understanding of the company's security posture comes from the metrics provided each quarter. Action plan: Take the time to review the metrics whenever...
Mar 5, 2008
A Hong Kong telco with a four-letter acronym came to my flat last month and hooked me into a massive pipe. I'm talking bandwidth, I'm talking 100 Mbps (their penultimate...
Mar 5, 2008
Chou He and I aren't close. But it's comforting to know we could be.I know I could pick up the phone and dial 0871-3197977 and reach, if not the good man himself, his...
Feb 29, 2008
Privacy control. Personal-information protection. Identity control. All are great-sounding names for features you may have seen in your PC's security suite. But what do they...
Feb 22, 2008
To CIOs and IT executives used to waiting for the first "bug fix" release before adopting new server operating systems, the announcement that Microsoft Windows Server...
Feb 20, 2008
Conventional storage systems work well for local file sharing, but no system I can think of can help you share files outside your organization, unless you commit to cobbling...
Feb 15, 2008
E-mail: we hate it, but we love it and need it. More than 80% of small business owners believe e-mail is a key to the success of their business, according to a recent survey by...