Last 7 Days

Big Data Drives Marketing

Check out these videos from leading experts to better understand how big data and analytics can fuel your business strategies and create a sustained competitive advantage. Discussions highlight why analytics are the new

Sponsored By: IBM

C4 Seminar

  From Cloud Illusions to Cloud Realities: Cutting through the Hype September 23, 2014, 9:00 a.m. – 3:00 p.m. If you believe all the marketing hype about the Cloud, you might think that

Published on: September 2nd, 2014 IT World Canada Event Staff

Six tips for taming Shadow IT

Cloud computing offers advantages to enterprises, but only when done through a well-defined IT strategy. When done by individuals or lines of business – the so-called Shadow IT – unmonitored IT activity could

Published on: September 2nd, 2014 Howard Solomon

Dealing with IT setbacks

After working through some challenging management problems, a staffer came to me and reported a setback to which I uttered “Rats, Bats and Alley Cats”. The stupefied employee retorted – “Say what?”  I

Published on: September 2nd, 2014 Ken Metcalfe

Will Microsoft be found in contempt?

CIOs, CSOs and risk managers concerned about the reach of U.S. courts into data stored in foreign jurisdictions will be interested to note that Microsoft appears willing to risk being found in contempt

Published on: September 2nd, 2014 Howard Solomon

When meeting the IT security standard isn’t enough

There's a price to be paid for organizations that aren't on the leading edge of security -- they usually get caught. That's the lesson from an incident a Canadian penetration tester ran into

Published on: September 1st, 2014 Howard Solomon

Warning issued for watering-hole attack

Crackers use a number of techniques to get into corporate systems, including reconnaissance through s0-called watering-hole attacks. This appears to be behind the discovery by a California unified threat management company called Alien

Published on: September 1st, 2014 Howard Solomon

Suspicion over celebrity photo hacks pointed at Apple’s iCloud

It was a long weekend for more than 100 international celebrities, and not because of Labour Day. On Sunday someone published nude photos of a number of well-known performers including Jennifer Lawrence, Rhianna,

Published on: September 1st, 2014 Howard Solomon

#FollowFriday: 3 analysts at VMworld

These days when a reporter goes to an IT conference not only do we keep an eye out for industry analysts on the show floor, we also have to watch what they’re tweeting.

Published on: August 28th, 2014 Howard Solomon

HP expands BI consulting services

As organizations accumulate tens of gigabytes and more of data, they may feel they don’t have the resources to craft a strategy for leveraging it. They may even have some business intelligence capabilities,

Published on: August 28th, 2014 Howard Solomon

Nominations still open for CIO award

Nominations for the first CIO of the Year award have been extended to Sept. 6. A partnership between the Information Technology Association of Canada (ITAC) and CanadianCIO magazine, the award will recognize an outstanding

Published on: August 28th, 2014 Howard Solomon

US space agency now in the cloud

Think your organization is too big to move to the cloud? Not so -- take a look at the U.S. space agency (NASA), which in the past 18 months moved about 110 applications and websites

Published on: August 28th, 2014 Howard Solomon

Hewlett-Packard gives peek at upcoming Gen9 servers

We have good news and bad news: First the good news -- a peek at the upcoming Gen9 ProLiant servers Hewlett-Packard will release in less than two weeks. The bad news is we

Published on: August 28th, 2014 Howard Solomon

How much is too much IT security?

Usually security implementers are aware of all the red tape they create, and evaluate the trade-offs against the value of what they are guarding. Usability and efficiency are certainly important, but it is

Published on: August 27th, 2014 Donna Lindskog

A book on innovation worth keeping

The Innovator’s Method - Bringing the Lean Startup Into Your Organization Nathan Furr and Jeff Dyer Harvard Business Review Press The best thing about this book is that there isn’t much new in

Published on: August 27th, 2014 Jim Love

Security rules strain Canadian, U.S. IT contractors looking for federal work

News last week that a cyber attack at a third-party firm that performs background checks for U.S. government employees had compromised data of at least 25,000 bureaucrats is just the latest illustration of how attackers can gain

Published on: August 27th, 2014 Howard Solomon

Revenue Canada issues tax app

Some CIOs have trouble talking to chief financial officers about technology -- those routers, IP addresses, software licences, service-oriented architectures, virtual machines do have a way of making the eye glaze over. So

Published on: August 27th, 2014 Howard Solomon

Think your corporate search engine is big? Look at the NSA’s

It was in the mid 1980s that I read James Bamford's inside look at the National Security Agency, The Puzzle Palace, which outlined how the NSA vacuums up huge amounts of electronic data.

Published on: August 27th, 2014 Howard Solomon

To delete or not to delete? That is the federal question

Almost everyone working for an organization has an overflowing email inbox. Some employers have standards on keeping the size down, while others don't care. But when the federal government issues an advisory to public servants to

Published on: August 27th, 2014 Howard Solomon

Video from VMworld: Interview with BlueCat Networks’ CTO

All user group conferences have huge trade shows where partners can strut their stuff. VMworld 2014 in San Francisco is no exception. This week ITBusiness.ca editor Brian Jackson, who's covering the conference for

Published on: August 27th, 2014 Howard Solomon

Slaying the digital dragon

Ken McGee, VP and Gartner Fellow for Gartner Inc. What is a digital strategy and do we really need it? (Part 1 of 2) In the first of a two part series, Jim

Published on: August 27th, 2014 Jeff

Telus to offer cloud-based mobile device management

There's no shortage of on-premise and cloud-based mobile device management on the market, which isn't surprising considering how many organizations want to equip staff so they can do work out of the office.

Published on: August 27th, 2014 Howard Solomon

Talent and Leadership in the Digital Age

Mike Rollings, Research VP for Gartner Inc. Are Non-Technical skills really as important or more important than Technical Skills? (Part 1 of 3) In the first of this three part series, Jim Love,

Published on: August 27th, 2014 Jeff

The New World of Adaptive Sourcing

Francis Karamousiz, VP and Distinguished Analyst and Gartner Fellow, Gartner Inc. Built to adapt" - A new approach (Part 1 of 2) In the first of a two part series, Jim Love, CIO

Published on: August 27th, 2014 Jeff

IT Optimization, Benefits Realization and the Digital Transformation 

Kurt Potter, Vice President and Distinguished Analyst for Gartner Inc. IT Optimization - the precursor to Digital Business? (Part 1 of 3) In the first of a three part series, Jim Love, CIO

Published on: August 27th, 2014 Jeff

VMware offers ‘just-in-time’ desktops with new Workspace Suite

SAN FRANCISCO — VMware Inc. released a new desktop/mobile management suite that will bring together cloud platforms it has recently acquired and its own cloud layer technology into a single console. At its

Published on: August 27th, 2014 Brian Jackson

The rise of the Internet of Things: Reality or conspiracy?

It's only August but the balloting is near for describing the year in technology. Is 2014 the year of the data breach, or the year of the  so-called Internet of Things? Columnist Gil

Published on: August 27th, 2014 Howard Solomon

HP, VMware team on software-defined networking solution

There's almost no end to the partnerships that have been announced this week in San Francisco at VMware's annual VMworld conference. A collaboration with Hewlett-Packard on a software-defined networking solution is one of

Published on: August 26th, 2014 Howard Solomon

The demise of excess access: A eulogy for traditional VPN

Once upon a time, in a world where mobile meant "laptop" or "remote home PC", Corporate network connectivity came in two flavours: dial-up modem, with it's clunky protocols and achingly slow speeds, and

Published on: August 26th, 2014 Michael Ball

Bell kicks LTE speeds up for faster data downloads

When the country's three biggest wireless carriers launched LTE service several years ago, their initial download data speeds were nowhere near the technology's potential high. Slowly, however, as their network expanded and they

Published on: August 26th, 2014 Howard Solomon

Huawei drops WinPhone, Tizen

The smart phone market's ability to support more than three operating systems has taken a hit with the decision by China's Huawei to close the door on devices running Windows Phone. The word

Published on: August 26th, 2014 Howard Solomon

HP recalls 6 million laptop power cords that could catch fire

IT administrators with Hewlett-Packard laptops in their inventory should be checking the devices' AC power cord following a huge recall announcement from the company. It said Tuesday that some 6 million cords on

Published on: August 26th, 2014 Howard Solomon

Windows 9 rumors increase

For some time industry analysts have speculated that Microsoft wants to collapse the number of platforms Windows runs on. There's the standard version for xx6 processors, Windows RT for ARM processors and Windows Phone for smart

Published on: August 26th, 2014 Howard Solomon

Video interview: Check Point Software’s Amnon Bar-Lev

Let’s face it: 2014 has been a miserable year for IT security professionals. Every week, it seems, an organization somewhere around the world confesses its systems have been broken into and data has

Published on: August 26th, 2014 Howard Solomon