Friday, August 12, 2022

Cara Garretson

69 POSTS0 COMMENTS

Vacation interruptus: Don’t let a tech crisis ruin a getaway

Vacations serve as mini tests to prove if a department can function when key players are away. That's the theory, anyway. In reality, IT departments sometimes flunk that test in a big way

Bad IT worker habits: Break them before they break you

Managers are less concerned with peccadilloes like nail-biting and leg-jiggling than with bigger-picture challenges like staying on task, becoming better organized and thinking strategically

The Annotated Feature: Lies my vendor told me

The City of Windsor's executive director of IT offers his comments on a story about vendor relationship management from our U.S. sister publications. Can you trust the firms you work with?

Virtualization solutions will find venture funding

In 2008, venture capital will look to companies building virtualization solutions

’60s cheque forger turned security consultant, during his interview at Computerworld’s Storage Networking World conference.

Is it really possible to develop anti-spam solutions for every spam trick? Almost certainly not. But, without the research that is being carried out today, spam might be a whole lot worse. Here is a list of a dozen research projects that focus on new technology and techniques to stop spam of all kinds. This list contains select papers made public at the Fourth Conference on Email and Anti-Spam (CEAS 2007). The President of CEAS is Gordon V. Cormack, Professor at the David R. Cheriton School of Computer Science at the University of Waterloo.

Identity theft focus of new Senate bill

In light of the increasing number of identity theft victims, the Identity Theft Enforcement and Restitution Act of 2007 was introduced by two U.S. senators last week. The Act proposes adding protections for consumers who fall victim to identity theft to the existing bill focused on data privacy and security that passed the Senate Judiciary Committee in May.

CISOs move up the management ladder

The function of information security is splitting into two, with security technology implementation moving back into the IT department and the administration of information security becoming a management issue.

Security 3.0: Chess, not Whac-A-Mole

Companies that want to spend less of their IT budget on security and improve its effectiveness must

Tech News