Cybersecurity: It’s More Than Worms, Hacking and Phishing
And, now the cherry on top, not everything that is a threat is intentional. As if cyber security wasn’t complex…
Transforming IT One Blog Entry At A Time
And, now the cherry on top, not everything that is a threat is intentional. As if cyber security wasn’t complex…
In October of 2009 I was interviewed by GovIT Journal and in that article I presented my view that Cloud…
I had a great lunch discussion today regarding the impact of ownership of SOA within the business. As I have…
Thanks to @jadkins for the colorful ending to that cliched saying, which really got me thinking. Sometimes we just make…
Based on feedback from my last blog entry, “The Busy Executive’s Quick Cloud Computing Reference Guide” the consensus was that people…
As an executive, you may be hearing many different viewpoints about Cloud Computing; some of them promising significant IT cost…
A semi-humorous look at 2009 the year in review for IT and insight into next year's top IT topics.
Additionally, proper inclusion of metering and instrumentation interfaces into you Cloud service means that you have greater control over the…
This past weekend I set out explore some of the extension capabilities of Google Wave. One of the weaknesses that…
Why do I blog? For me it’s a civic duty. I have an ability to identify the real value of…