quali

Enterprises eye the cloud as a testing sandbox as they make the transition toward iterative software deployments

As enterprises make the transition from occasional massive software upgrades to more continuous live updates using a DevOps model, testing...

January 29th, 2016 Gary Hilson

c12ee0f379643a278198b2086afd3b9c

The next 5 years: possible trends in business software

During the past 25 years, software programs utilized by business underwent tremendous changes. Very likely, the next five years will witness...

January 28th, 2016 Robert Cordray

Canadian flag cropped THINKSTOCK

Securing Canada’s largest healthcare organization: Insight from the CISO of Alberta Health Services

Canada’s healthcare system is one of the best in world and we are fortunate to live here. Often, we take...

January 15th, 2016 Brian Clendenin

620x250-mojo-products-2

AirTight gets its Mojo on with rebranding, cloud-based WiFi subscription service

AirTight Networks, which has built out a portfolio of cloud-first security offerings since 2003, is rebranding itself as Mojo Networks...

January 11th, 2016 Gary Hilson

Differentiate your business with a cloud contact center

Differentiate your business with a cloud contact center

It is critical that they deliver personalized communications in the channels that customers prefer. Businesses should use cloud solutions as...

January 10th, 2016 IT World Canada Team

Screen Shot 2015-10-19 at 7.21.03 PM.png

More thoughts on the digital era

In 2013, I wrote a blog entitled “Thoughts on the digital era” that I thought might be interesting to re-visit....

January 8th, 2016 Don Sheppard

Enterprise Mobility: Securing a Productive and Competitive Future

Enterprise Mobility: Securing a Productive and Competitive Future

Cisco has embraced an “Any Device” vision to allow greater choice in devices while maintaining a common, predictable user experience...

January 1st, 2016 IT World Canada Team

Securing your network and application infrastructure Part 3: Staying ahead of hackers

Securing your network and application infrastructure Part 3: Staying ahead of hackers

Fortinet’s Cyber Security platform can address most of the problems outlined in the essays in this e-book. Our ASIC-powered FortiGate...

December 18th, 2015 IT World Canada Team

Securing your network and application infrastructure Part 1: Building and executing a plan for your network security

Securing your network and application infrastructure Part 1: Building and executing a plan for your network security

For all the attention data security has received in recent years and all the technical advances in risk detection now...

December 18th, 2015 IT World Canada Team