technicity thumnail lan

Focus on IoT – Lan Nguyen, deputy CIO for the City of Toronto

ITWC partnered with the City of Toronto to co-host Technicity this past December. The day brought together leadership within the...

February 5th, 2016 Brian Jackson
Image by Allanswart from  Thinkstock.com

Deception technology enhances honeypots for cyber defence

Intellectual property can be as valuable as gold for some companies. And for those firms, leading-edge cyber security can also...

February 5th, 2016 Howard Solomon
Rocana

Rocana looks to make big data analysis for IT operations more affordable

Enterprises shouldn’t have to cherry pick which data to analyze, so one vendor wants to make it easier and affordable...

February 5th, 2016 Gary Hilson
93998195

Why software teams need disciplined structure to reduce security bugs

An athletics footware manufacturer has a slogan that says, "Just do it." It's also a command that leaders of some...

February 4th, 2016 Howard Solomon
CIO being cut out of C-suite

Long live the “new” CIO — but don’t forget the lessons from the past

We live in interesting times. The pace of change and new opportunities available by digital technologies are exciting to say...

February 4th, 2016 Gary Davenport
technicity thumnail gabriel

Focus on IoT – Gabriel Woo, VP of innovation at RBC

ITWC partnered with the City of Toronto to co-host Technicity this past December. The day brought together leadership within the...

February 4th, 2016 Brian Jackson
savvius

Packets still rule when it comes to useful network traffic analysis

It seems obvious to say that network traffic is growing in volume and speed. And of course, it means that...

February 4th, 2016 Gary Hilson
apple-iphone-smartphone-desk

How Apple’s computers fit in the enterprise

Apple makes great hardware. Known for its attention to aesthetics, from computers to phones to tablets, Apple ensures its designs...

February 3rd, 2016 Chris Lau
Image from Shutterstock.com

Study dismisses police worries encryption will end their surveillance capabilities

Changes in technology -- including the increased use of commercially-available encryption by criminals and terrorists -- has partly made it...

February 3rd, 2016 Howard Solomon