Last 7 Days

technicity thumnail lan

Focus on IoT – Lan Nguyen, deputy CIO for the City of Toronto

ITWC partnered with the City of Toronto to co-host Technicity this past December. The day brought together leadership within the...

February 5th, 2016 Brian Jackson
Image by Allanswart from

Deception technology enhances honeypots for cyber defence

Intellectual property can be as valuable as gold for some companies. And for those firms, leading-edge cyber security can also...

February 5th, 2016 Howard Solomon

Rocana looks to make big data analysis for IT operations more affordable

Enterprises shouldn’t have to cherry pick which data to analyze, so one vendor wants to make it easier and affordable...

February 5th, 2016 Gary Hilson

Why software teams need disciplined structure to reduce security bugs

An athletics footware manufacturer has a slogan that says, "Just do it." It's also a command that leaders of some...

February 4th, 2016 Howard Solomon
CIO being cut out of C-suite

Long live the “new” CIO — but don’t forget the lessons from the past

We live in interesting times. The pace of change and new opportunities available by digital technologies are exciting to say...

February 4th, 2016 Gary Davenport
Image from

Study dismisses police worries encryption will end their surveillance capabilities

Changes in technology -- including the increased use of commercially-available encryption by criminals and terrorists -- has partly made it...

February 3rd, 2016 Howard Solomon

Panzura pinpoints files with Google Maps

It’s fair to say that Google Maps is the most popular interface for most people looking for directions, so when...

February 3rd, 2016 Gary Hilson
Image by Brilt from

NASA breach shows again that brute force password attacks work

It isn't uncommon for hackers to boast about their exploits; it adds a bit of credibility to their work. So...

February 2nd, 2016 Howard Solomon
Microsoft's Project Natick Researcher Team

Microsoft’s Project Natick looks at the feasibility of the undersea datacentre

Microsoft wants your data to take a dip. While the traditional data centre has been located on land — and...

February 2nd, 2016 Ryan Patrick

Here’s why container adoption is on the rise

Containers are here to stay, it seems. Four in five CIOs will be increasing their investment in the technology, according...

February 2nd, 2016 Danny Bradbury
iStock image from

Is software really eating the world?

Marc Andreessen of Mosaic, Netscape fame and an investor in many well-known Internet companies, stated in a New York Times...

February 1st, 2016 Don Sheppard
technicity thumnail ritesh

Focus on IoT – Ritesh Kotak, Toronto Police Services

ITWC partnered with the City of Toronto to co-host Technicity on Dec. 3, 2015. The day brought together leadership within...

February 1st, 2016 Brian Jackson
cloud security

Make finding security solutions to Shadow IT a priority, CISOs warned

CISOs have to be more open to new security solutions to meet the challenge of staff signing up for cloud...

January 29th, 2016 Howard Solomon

Enterprises eye the cloud as a testing sandbox as they make the transition toward iterative software deployments

As enterprises make the transition from occasional massive software upgrades to more continuous live updates using a DevOps model, testing...

January 29th, 2016 Gary Hilson
cio collaboration

5 ways to confront the collaboration imperative

Fifty per cent of Canadian CIOs see enterprise collaboration as a technology to have a “significant impact” over the next...

January 28th, 2016 Jim Love
Stethescope Health Check

The “EHR for all Ontarians” Progress Report

In 2009, amidst the numerous eHealth boondoggle stories and negative sentiment, I began writing a blog for ITWorld. In one...

January 27th, 2016 Aaron Blair
BYOD graphic

Mobile device management goes broader, more application focused

The Bring-Your-Own-Device (BYOD) phenomenon has quickly gone from emerging trend to par for the course in most organizations, but the...

January 26th, 2016 Gary Hilson

DragonWave boosts long-haul wireless communications offering

Enterprises that need their own high-speed long range communications often lease them from telcos, but in some cases, it may...

January 25th, 2016 Danny Bradbury
Ten tips for more secure sofware

IT not doing enough to secure Active Directory, says expert

It's long been known that members of IT teams often don’t speak to each other. Just as data can be...

January 21st, 2016 Howard Solomon

Analytics trends for 2016

Several interconnected trends in analytics capability are causing companies to advance their analytics efforts in pursuit of competitive advantage. The...

January 20th, 2016 Yogi Schulz
technicity thumnail gabriel

Focus on IoT – Gabriel Woo, VP of innovation at RBC

ITWC partnered with the City of Toronto to co-host Technicity this past December. The day brought together leadership within the...

February 4th, 2016 Brian Jackson

Packets still rule when it comes to useful network traffic analysis

It seems obvious to say that network traffic is growing in volume and speed. And of course, it means that...

February 4th, 2016 Gary Hilson

How Apple’s computers fit in the enterprise

Apple makes great hardware. Known for its attention to aesthetics, from computers to phones to tablets, Apple ensures its designs...

February 3rd, 2016 Chris Lau

Precedent needed to be sure private messages stay private

Email and texting may seem private, but we need some legal precedents to be sure. BBC news is reporting that...

February 3rd, 2016 Donna Lindskog
Compliance stamp

HPE keeps financial firms compliant with analytics

Hewlett Packard Enterprise (HPE) released a product this week designed to help financial institutions minimize the risk of regulatory fines....

February 3rd, 2016 Danny Bradbury

ServiceNow adds identity management to the mix through Centrify integration

Enterprises are always looking to automate as many processes as possible, or at least simplify them, while maintaining security. ServiceNow...

February 2nd, 2016 Gary Hilson
slide4 IoT network Shutterstock

Infoblox predicts what will happen on your network

DNS security firm Infoblox is getting into the reporting and analytics market. The company has teamed up with log analysis...

February 1st, 2016 Danny Bradbury
Red Privacy Button Keyboard

Canadian privacy expert critical of spy agencies’ handling of metadata

Privacy expert Ann Cavoukian has criticized the federal government for not better protecting the telecommunications metadata two Canadian intelligence agencies...

February 1st, 2016 Howard Solomon

Cloud computing standards update (ISO JTC1/SC38)

My last update on the progress of cloud standardization in the ISO was April 2014, so I’m overdue for another...

February 1st, 2016 Don Sheppard