IT execs doubt businesses are exploiting their data

IT execs doubt businesses are exploiting their data

LONDON - The overwhelming majority of European IT executives feel their organization is not fully exploiting the competitive advantage of...

February 4th, 2008 Computerworld UK staff

Defence initiative gives Canadian Forces IT ammunition

Defence initiative gives Canadian Forces IT ammunition

OTTAWA - Canada's Department of National Defence has embarked on a five-year consolidation and rationalization initiative that will see the...

October 17th, 2007 Mari-Len De Guzman

IBM enters master data management market

IBM enters master data management market

LAS VEGAS -- IBM's Information on Demand kicked off Monday with a keynote address from general manager of information management...

October 15th, 2007 Briony Smith

Information management comes to the table

Information management comes to the table

Canadian government I&IT executives recognize that data disorder in the public sector is unsustainable. "Information management bubbled up near the...

June 6th, 2007 Rosie Lombardi

Thwart scope creep before it can begin

Thwart scope creep before it can begin

When you’re on a diet, you can have the best intentions in the world. But if you end up at...

May 10th, 2007 Kathleen Sibley

IT360 – Four risk categories and how firms can respond

IT360 – Four risk categories and how firms can respond

COMMENT ON THIS ARTICLEWhile enabling novel ways of interacting and conducting business, pervasive connectivity is also heightening the risk factor...

May 2nd, 2007 Kathleen Lau

HP restructures with renewed emphasis on BI

HP restructures with renewed emphasis on BI

COMMENT ON THIS ARTICLEIn the midst of a companywide restructuring effort, Hewlett-Packard Co. has taken the next step in an...

January 17th, 2007 China Martens

Same old problems plague IT

Same old problems plague IT

As the information technology function at corporations continues to win bigger budgets and more resources, core problems relating to IT’s...

October 31st, 2006 No Author

Building security into applications

Building security into applications

One Canadian security expert believes the key to thwarting threats of all types lies in the organization’s ability to define...

July 2nd, 2006 Mari-Len De Guzman