#FollowFriday – People in finance, enterprise strategy and security

For Facebook, there’s sending friend requests, and for Google Plus, you add people to your circles. But as anyone who has a Twitter handle knows, on Twitter, we follow and we tweet at

Share on LinkedIn Share with Google+ Comment on this article Published on: March 6th, 2014 Candice So

The vice that can squeeze IS departments

I’m fascinated by the paradox that IS department budgets are cut during annual budget-setting exercises precisely when the demand for IT service for mobile apps, social media engagement, better security and improved data

Share on LinkedIn Share with Google+ Comment on this article Published on: January 15th, 2014 Yogi Schulz

Who to follow on Twitter on #FollowFriday

For Facebook, there’s sending friend requests, and for Google Plus, you add people to your circles. But as anyone who has a Twitter handle knows, on Twitter, we follow and we tweet at

Share on LinkedIn Share with Google+ Comment on this article Published on: December 19th, 2013 Candice So

Who to follow on Twitter for #FollowFriday

For Facebook, there’s sending friend requests, and for Google Plus, you add people to your circles. But as anyone who has a Twitter handle knows, on Twitter, we follow and we tweet at

Share on LinkedIn Share with Google+ Comment on this article Published on: December 12th, 2013 Candice So

Top CEOs shy away from social networks

Some very well-known high tech executives are among the 70 per cent of CEOs of high profile companies that shun social media sites, according to a recent study conducted by Augure, a developer

Share on LinkedIn Share with Google+ Comment on this article Published on: December 10th, 2013 Nestor E. Arellano

Who to follow on Twitter on #FollowFriday

For Facebook, there's sending friend requests, and for Google Plus, you add people to your circles. But as anyone who has a Twitter handle knows, on Twitter, we follow and we tweet at people.

Share on LinkedIn Share with Google+ Comment on this article Published on: December 5th, 2013 Candice So

Blending the three approaches to big data analytics

In developing an effective big data analytics projects, decision makers need to use a blend of three major techniques to achieve their goal: The ad-hoc approach; batch analytics and real-time analytics. Very often,

Share on LinkedIn Share with Google+ Comment on this article Published on: December 1st, 2013 Nestor E. Arellano

Labatt exec looks back at social media slip up

At first glance, it appeared to be a total branding disaster. A photo of the Luka Magnotta on the Web site of the Montreal Gazette showed the notorious serial killer clutching a bottle of

Share on LinkedIn Share with Google+ Comment on this article Published on: November 28th, 2013 Nestor E. Arellano

Unpatched flaws still favourite attack vector: IBM X-Force

Zero day exploits and custom malware pack deadly punches and frequently grab the headlines, but many cyber criminals are focusing on less sophisticated methods to bypass security, according to a recent report from

Share on LinkedIn Share with Google+ Comment on this article Published on: October 10th, 2013 Nestor E. Arellano