Last 7 Days

Canada government sign

Shared Services Canada reaches out to ICT sector for help developing IT transformation mandate

It’s been a slow process — nearly five years to be exact — but the federal government has formally embarked...

September 21st, 2016 Ryan Patrick
quantum computing, data

Prepare for threat of quantum computing to encrypted data, Canadian conference told

The race to create new cryptographic standards before super-fast quantum computers are built that can rip apart data protected by...

September 20th, 2016 Howard Solomon
openworld1

Oracle maintains cloud-centric course as enterprise IT budgets remain flat

There’s a feeling of déjà vu permeating the keynotes at this year's Oracle OpenWorld -- the company continues to tout achievements in...

September 19th, 2016 Gary Hilson
The MERIDIAN initiative (Marine Environment Research Infrastructure for Data Integration and Application Network)at Dalhousie University was one several recipients of funding from the Canada Foundation for Innovation.

Latest round of CFI funding focuses on data-rich research

The latest round of funding dispersed by the Canada Foundation for Innovation (CFI) reflects how the nature of research has...

September 19th, 2016 Gary Hilson
teradata2

Teradata repositions itself as an analytics solution firm

ATLANTA — Conference swag is a given for any industry event. Here at the Teradata Partners 2016 user conference, some...

September 14th, 2016 Ryan Patrick
78053730

U.S. Congressional report blames management for huge federal breach

The problem with taking a vacation is that interesting things always happen when you’re away. So I’m playing catch-up on...

September 13th, 2016 Howard Solomon
data, big data, network, code

How Toronto’s Buzz Indexes uses the power of machine learning to mine social media’s big data sets

One Toronto firm is using cognitive artificial intelligence (AI) processes to mine big data sets in social media to help...

September 6th, 2016 Ryan Patrick
Microsoft Cloud and Mobility solutions

Microsoft’s Wim Coekaerts on open source: “The days of a closed Microsoft are over”

When someone widely known as “Mr. Linux” decides to up and go work for Microsoft Corp., you know that we’re...

August 26th, 2016 Ryan Patrick
data, network, database

UWaterloo adds research chair into data cleansing

With enterprises trying to squeeze more out of every bit of data they collect, making sure data from various sources...

September 28th, 2016 Howard Solomon
devops-culture

Cloud is at the heart of digital transformation, make sure DevOps is too

If your organization is embracing digital transformation, then cloud is at the epicenter of that transformation. Your DevOps team should...

September 28th, 2016 Gary Hilson
Feature John Chen BlackBerry CEO

BlackBerry to stop designing, making its own devices – focus pivots to software

BlackBerry Ltd. will exit the hardware business internally and leave development of future smartphones to its partners, according to BlackBerry...

September 28th, 2016 Brian Jackson
SAP webinar

Artificial intelligence: good, evil, or just a great business tool?

It is hard to find any technology article these days that does not have some reference to artificial intelligence (AI)....

September 28th, 2016 Dave O'Leary
Illustration of a keyboard with China flag

Ex-CSIS official backs Canada’s attempt to get cyber promise from China

For several years Western governments have blamed official Chinese or Chinese-government backed groups for hacking into databases of public and...

September 27th, 2016 Howard Solomon
Image by Brilt from Thinkstock.com

Online Fraud: Why Passwords Aren’t Enough

It’s time to plan for the demise of the password. According to Forrester Research, the use of passwords to access...

Sponsored By: Telus
Canadian government in IT matters

Federal data breaches up 16 per cent, Canadian privacy commissioner reports

The number of material data breaches suffered by federal government departments increased 16 per cent to 298 for the 12...

September 27th, 2016 Howard Solomon
Cloud computing, mobile VMware

Measuring cloud maturity: How do you stack up?

IT departments must proactively work with business managers to drive growth if they want the full benefits of enterprise cloud...

September 27th, 2016 Steve Proctor
feature-secure-mobility

One-third of executives with Android devices running old versions of OS: Survey

As many as one-third of executives using Android-powered devices may still be running less than secure versions of the operating...

September 27th, 2016 Howard Solomon
sleeping_businessman

Modernizing standards development

Everyone involved in Information and Communications Technology (ICT) has been exposed to and most likely impacted by standards in one...

September 27th, 2016 Don Sheppard
graphic of data lock

Make this year’s Cyber Security Awareness Month a loud and personal campaign

To: Public Safety Minister Ralph Goodale re: Cyber Security Awareness Month Mr. Goodale In four days it will October, the...

September 26th, 2016 Howard Solomon
Apple MacBook with retina display

Apple MacBooks get updated with MacOS Sierra

Apple is taking the right steps forward updating its operating system. After refreshing iOS to version 10, it released macOS...

September 26th, 2016 Chris Lau
rvh-kronos

Health centre improves employee satisfaction by eliminating the paper trail

The Royal Victoria Regional Health Centre (RVH) was drowning in paper. And that was before it embarked on an expansion....

September 26th, 2016 Gary Hilson
Bitsight Insights Report The rising face of cyber crime: Ransomware

Bitsight Insights Report The rising face of cyber crime: Ransomware

Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Ransomware is a legitimate threat,...

September 25th, 2016 IT World Canada Team
When attackers hold your data hostage: Addressing today’s security threats

When attackers hold your data hostage: Addressing today’s security threats

Security threats are continuously evolving, and so are cybercriminals who are advancing how they can access your private data. It’s...

Sponsored By: Cisco
71080359

Commerce Knowledge Hub: The CMO’s guide to analytics and more

Today’s CMO knows that they either have to learn and adapt to new standards and technologies, or be left in...

Sponsored By: IBM
cio collaboration

Workplace: Tearing down walls builds up collaboration

A successful business transformation involves tearing down walls – literally. Digital transformation is not just about technology. It also requires...

September 23rd, 2016 Mark Burdon
bc-tech-industry-salary-survey-header-1

B.C. tech salaries on the rise, HR Tech Group finds

With a dearth of qualified candidates available to fill an ever-expanding number of positions, tech has a reputation for paying...

September 23rd, 2016 Eric Emin Wood

Meet Humza Teherany: The new president of the CIO Association of Canada

We are at one of the most exciting times in history with innovation in business driving innovation in IT. As...

September 23rd, 2016 Brian Clendenin
greenlines

Managing microservices: How to get big benefits from a small service architecture

Interest in microservice architecture is exploding because of the increased agility demonstrated by several leading companies that use it. “When...

September 22nd, 2016 Cindy Baker
IDC Marketscape Worldwide Virtual Client Computing Software

IDC Marketscape Worldwide Virtual Client Computing Software

As the client virtualization software market has started to enter the maturity phase, many vendors have started to expand their...

September 22nd, 2016 IT World Canada Team
93920033

Failing to understand licensing agreements comes with a cost

No organization can operate without licencing. Yet, many organizations don’t understand what licences they have or how they are used....

Sponsored By: COMPAREX
Red Privacy Button Keyboard

Most makers of IoT devices still don’t explain how personal info is used: Report

Makers of Internet-connected devices are still not being up front enough with buyers about the amount and handling of personal...

September 22nd, 2016 Howard Solomon
Creating a world class supply chain commerce platform

Creating a world class supply chain commerce platform

An outstanding customer experience requires more than just simplifying the order process. Lenovo is looking to automate the freight payment...

September 22nd, 2016 IT World Canada Team
Rosenthal & Rosenthal Case Study

Rosenthal & Rosenthal Case Study

For organizations trying to juggle multiple EDI systems, a centralized solution based on IBM® Sterling B2B Integration Services will enable...

September 22nd, 2016 IT World Canada Team
A Guide to Print Security for Canadian Organizations

A Guide to Print Security for Canadian Organizations

Security breaches don’t only occur in mobile devices and computers, but can find their way into other endpoint devices -...

September 22nd, 2016 IT World Canada Team
IDC White Paper: Flash Accelerated and Cloud Ready: New Storage Requirements for Enterprise Apps

IDC White Paper: Flash Accelerated and Cloud Ready: New Storage Requirements for Enterprise Apps

Did you know that over 77% of all enterprises have adopted a “virtual first” strategy for new server deployment? Virtual...

September 22nd, 2016 IT World Canada Team
All Flash Storage For Dummies Special Edition

All Flash Storage For Dummies Special Edition

All-Flash Storage for Dummies, NetApp Special Edition, explores the expanding role of all‐flash storage in the enterprise. Originally used to...

September 22nd, 2016 IT World Canada Team
BlackBerry Mobility in Financial Services: A Regulatory Compliance Checklist

BlackBerry Mobility in Financial Services: A Regulatory Compliance Checklist

They understand that mobilizing business processes can help improve customer satisfaction and response times; boost employee productivity; increase competitive advantage,...

September 22nd, 2016 IT World Canada Team
6 Tools Users Need for Mobile Files

6 Tools Users Need for Mobile Files

When it comes to email and applications, the solutions are straightforward. Email clients have been delivered by enterprise IT for...

September 22nd, 2016 IT World Canada Team
Ditching Legacy Tokens

Ditching Legacy Tokens

It’s hard to believe they’ve been around for 25 years - and that in that time, they’ve changed little. Why...

September 22nd, 2016 IT World Canada Team
The Mobile Enterprise: Is Ease of Use Overriding Security?

The Mobile Enterprise: Is Ease of Use Overriding Security?

This guide reveals IDG research on lessons learned from enterprises that have mobilized at least one Microsoft application, pros and...

September 22nd, 2016 IT World Canada Team
The CIO’s Guide to EMM

The CIO’s Guide to EMM

Mobility is reaching at an inflection point in enterprise. Not long ago, many organizations looked at it as an isolated...

September 22nd, 2016 IT World Canada Team
Image from  Shutterstock.com (c) Maksim Kabakou

Rising spam a sign that Necurs botnet has returned with new payloads

Noticed the amount of spam your organization is receiving has gone up in the past few months -- particularly email...

September 22nd, 2016 Howard Solomon
idc-debt

IT must communicate liabilities and consequences of technical debt

This summer, Southwest Airlines experienced a chain of failures that led to cancelled 2,300 flights over four days, costing the...

September 22nd, 2016 Gary Hilson
ibm-innovation-space-header-1

IBM’s new Toronto-based innovation incubator targets emerging tech startups

IBM, the 105 year-old computing giant known for its cloud computing services, Watson analytics platform, and a decision to sell its iconic personal computing division to...

September 22nd, 2016 Eric Emin Wood